advanced technologies applied to the modern...
TRANSCRIPT
cyberspace secure. The nations that achieve cyberpower will
economically, culturally, militarily, and politically in the decades ahead.
military systems. Older industries
The cyber revolution is just the
“creative destruction” that arise when
innovations spawns new industries,
in the process, creates new sources
military power.cyberpower,
the ability to master and exploit
ADVANCED TECHNOLOGIES APPLIED TO THE MODERN LOGISTICS OF MILITARY
SYSTEMS/EQUIPMENT
*Armaments Department**Control and Inspection Corps
ahead. Military cyberpower is the application of the domain of cyberspace to
Key words:
maturity, and decline, Figure 2.
industries evolve. Incubation occurs when innovations are still in the
where use is limited to early adopters.
phase and stands ready to enter the
cyber be by 2020, and what is the
Communications Techn
Internet and a new domain called
how individuals, businesses and
These waves create new industries,
Figure 1.These new waves included the
Fig.1.
comprehensive and includes policy
operations, human capital, and
used to access cyberspace have
architectures, Figure 3.
Cyberspace
hardware, and other devices
and business processes that power the economy and allow individuals to connect and collaborate across
borders. More importantly, while the
and operations, cyberspace is more
Fig. 2.
Fig. 3. Cyberspace – Opportunities and Trends
These and other developments
2.0 saw the
Twitter, which connected people
a century and lead to massive wealth creation. Nanotechnology is an
Figure 4.
the ICT wave, we can expect dramatic
devices” and inexpensive laptops
Fig. 4.
Military robots are used
one is Multifunction Utility / Logistics and Equipment Vehicle (MULE)
troops with water and power sources Figure 5.
Enabled by distributed clouds, the
collected.Military cyberpower is
cyberspace to operational concepts to accomplish military objectives
Military administration, personnel
Fig. 5.
Army plans.
proFigure 6) implied some important
The characteristics in the evolution
embedded autonomous service, smart
Figure 7).
members will be able to order the
the operation. Otherwise, the vehicle
MULE can communicate with and sometime, deploy unmanned aerial
the MULE which recently received
MULE is expected to mature into a
Fig. 6.
no reliable connection to a central control system.
not only to provide autonomous
presented in Figure 8.
Autonomous logistics processes
Fig. 7.
modules.
The Watchdog Agent is a toolbox
machines and components. This
system, Figure 9
Fig. 8.
Fig. 9.
personnel to become available and proper downtime to be scheduled.
Infotronics Technologies
and enable autonomous business
Figure 10.
Analysis, in addition to others.The Next Step: Self-
Maintenance.a machine to adjust its own
Fig. 10.
and reliability, availability, maintainability, testability,
Figure 11)
Figure 12) involves the approach
Fig. 11.
Fig. 12.
Figure 13.
Fig. 13.
-
Military
REFERENCES
Robots,
The
, Christopher
The
,University Cooperative
.