Militaries like enterprises are excited about opportunities surrounding “big data” and the internet of things (IoT) because knowledge is generally accepted to be a source of power that provides a competitive edge. According to this theory, in war, a military should look to capture as much data as possible to plug into decision-making models, or mathematical formulas, that are predictive based on past data. The more data a model incorporates, the more accurate the results should be. However, these models have numerous flaws and their employment is not widespread and tends more to be a piece of the puzzle, not a complete answer. For example, weather is a huge consideration when planning military operations and models are used to predict weather events. These models pulling together numerous statistics then inform a less model-based decision-making process that must incorporate other considerations such as monetary cost, international relations, logistics, etc. In this way, data-driven decision-making is evolving and is nowhere near complete owing to complications such as missing data and an inability to predict future events based on historical data. Information is nonetheless an advantage and militaries intend to employ to the best of their abilities.
Sensors, computers, mobile devices, and cameras all play a crucial role in capturing, storing, and analyzing data that can inform decision-making. Of course, raw data does not lend itself well for human interpretation and for
The historical battle of Harpers Ferry was a pivotal point during the Civil War. While the battle was a clear victory on the Confederate front, Union forces could have changed the outcome with little efforts. This paper analyzes the battle with the intent of identifying how the application, utilization, or availability of intelligence assets could have resulted in an alternate outcome. With the proper use of All Source Intelligence analysis on the Union front, the Battle of Harpers Ferry would have played out completely different. While the results of this battle may not have changed the outcome of the Civil War, it would have affected the timeline of follow-on battles. The structure of this paper is simple, we cover the basics of the battle and follow up with relevant facts on how proper use of terrain analysis and troop capabilities affects the outcome of the battle.
IO seeks to integrate and synchronize information related capabilities with maneuver to target the enemy’s decision-making cycle
The objective is data predominance in this way expanding the velocity at which choices are made, while acquiring adversary decisions and approaches. The clash of Tannenberg WWI in the middle of Germany and Russia gives the same bits of knowledge the United States Military utilized against
Military intelligence extensions have been greatly successful while operating in different nations with the utilization of various types of intelligence: Human Intelligence (HUMINT), Geospatial Intelligence (GEOINT), Measurement and Signature Intelligence (MASINT), Open Source Intelligence (OSINT), Strategic Intelligence (STRATINT), Signals Intelligence (SIG- INT), and Technical Intelligence (TECHINT). Essentially expressed, and diminished to the most reduced shared element, intelligence is data of the world about
In the past, leaders often relied on their intuition and pursued a hypothesis driven approach to strategic decision making. Field of data science has entirely shifted this paradigm. The advent of machine learning and pattern recognition techniques, in conjunction with the growth of cloud storage and parallelized computational capabilities has given business leaders enormous flexibility to boil the ocean and make decisions entirely based on data.
The authors of [1] aim to dispel some of the current hype surrounding big data, mainly the misnomer that it is all about technology and the process is automated. In fact there are three critical elements requiring human expertise 1) the data must be the right kind, of sufficient quantity, and clean 2) a specific process must be followed for success starting with the identification of the objective 3) expert humans who know how to use the technology, execute the big data process, and perform the mining tasks which require significant mathematical calculations.
With the emphasis on determining the centers of gravity that the insurgents use to gain freedom of movement, the planning becomes one within the national security and military strategy.(Richter 2009, 2) The political and military connections between themselves lay in how the military objectives are seen and similarly how the national security objectives are seen as well, in supporting the allies of the United States.(Richter 2009, 2) The connection between national security as well as the armed forces objectives are seen in the information that is collected as well as the collection capabilities. (Crystal N.D.,2) Information Superiority is one that allows for decision makers as well as military commanders to plan operations with more information to ensure the success of Information operations. (Crystal N.D.,3) The shift in technology as well as the concepts of operations will only become more sophisticated in the future, leading to more emphasis on Information Operations to secure a success on a military objective or a political objective. (Crystal N.D.,3) In the coming future, the need for information operations to become more widely accepted and advance with the technology of the times, will determine the success or failure of political intentions or military
Foster Provost and Tom Fawcett. Big Data, Data Science and its Relationship to Big Data and Data-Driven Decision making,” http://online.liebertpub.com/doi/full/10.1089/big.2013.1508
Sensing and effecting require detailed understanding of corresponding physical behaviors that generate and utilize data, as well as effective means for storage, retrieval, and manipulation of data using high power computing platforms. As project manager I was able to orchestrate experts in this arena to improve the combatant commanders employment of C4ISR equipment to match the adversarial behavioral of the enemy in a specific area, this research focused passive electromagnetic, radar, mechanical wave and weather environmental sensing. This required an architecture update to information system, sensing platforms and architectural update to devices such as jeeps, heavy trucks, and in some cases aircraft. I was able to also focus on System Intelligence and Intelligent Systems research, which exploits interactions between information and intelligent systems, such as mechanical devices and software components, whereas information is transformed between different levels of abstraction and roles within the system’s cognitive processes – recognition, reasoning, predictions, and decision-making. Other research, especially for Cyber Security, was a focus on Networks and Communications research. This concentration focus on understanding and exploiting information’s interactions with socio-technical
The promise of data-driven decision-making is now being recognized broadly, and there is growing enthusiasm for the notion of ``Big Data.’’ While the promise of Big Data is real -- for example, it is estimated that Google alone contributed 54 billion dollars to the US economy in 2009 -- there is currently a wide gap between its potential and its realization.
Today, data is a growing asset that various businesses are having difficulty converting into a powerful strategic tool. Companies need help turning this data into valuable insight, which can diminish risk and enhance returns on investments. Companies are struggling to make sense and obtain value from their big data. Superior and reliable
In today 's military, leaders are continuously seeking ways to incorporate new technology to take the place of human soldiers. It has long been an important goal to be able to remove the human element from the modern battlefield, thus enabling high risk or sensitive political operations to be conducted without the fear of capture or exploitation of US military personnel. One such incident occurred during the Cold War, on May 1, 1960, during the presidency of Dwight D. Eisenhower and during the leadership of Soviet Premier Nikita
The sudden growth in IT investment is linked with the growth of IOT and therefore naturally an era of increased investment comes with increased business opportunities. The following section describes some of the applications of the internet of things and the opportunities in which they will bring.
The Internet of Things (IoT) is changing how most industries do business and promises a significant return on investment (ROI) in operational efficiency, improved customer experience, risk mitigation, and enabling entirely new business models. The sheer volume of new devices on the network driven by IoT will evolve the scale and range of deploying devices and managing data. Further, recent advances for employing Artificial Intelligence (AI) and Machine Learning (ML) within IoT are creating many new opportunities to enhance data analysis and better decision-making. Although the notion of computing based on sensor data from things was not born yesterday, the meteoric rise of IoT has recently become practical because of smaller, faster,
With the click of a button or a tap on a screen, you can discover profound knowledge, it navigates you to where you need to go, or it even tells you miscellaneous things such as which place to go to get the best pumpkin spice latte. The Internet of things has significantly impacted everyday lives and continues to develop throughout generations. It refers to pertinent things such as the ever-growing networks of everyday physical objects, and other internet-enabled systems and devices which process and analyze large and fast-moving data set along each other. To sum it up, the internet of things is a fast growing network of materials where everything is synced and can collect as well as exchange data using sensors that are embedded in devices. Although individuals believe that the Internet of Things (IoT) consequently, will strip every one of privacy and security, the internet of things ought to be utilized in society as it positively transforms the way you live and relate to our environment to make it more productive and useful for us.