{"id":10631,"date":"2022-08-16T08:50:09","date_gmt":"2022-08-16T11:50:09","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10631"},"modified":"2022-08-16T08:50:09","modified_gmt":"2022-08-16T11:50:09","slug":"las-lecciones-de-la-industria-tecnologica-pueden-frenar-el-fratricidio-digital-en-el-campo-de-batalla","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10631","title":{"rendered":"Las lecciones de la industria tecnol\u00f3gica pueden frenar el fratricidio digital en el campo de batalla"},"content":{"rendered":"<p>Cuanto m\u00e1s se apoya el ej\u00e9rcito estadounidense en las redes inal\u00e1mbricas, m\u00e1s congestionadas se vuelven. Desafortunadamente, el campo de batalla moderno est\u00e1 experimentando interrupciones cr\u00edticas del sistema, con tropas cada vez m\u00e1s en riesgo, porque generan interferencias en las propias redes, debido a que las aplicaciones exceden la capacidad o ancho de banda de las redes. Este fratricidio digital no es un problema que pueda resolverse con disciplina radial o racionando el acceso de los comandantes.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The more the U.S. military leans on wireless networks, the more congested they become. Unfortunately, the modern battlefield is experiencing critical system outages \u2013 with troops increasingly at risk \u2013 because we are unintentionally jamming our own networks.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">This digital fratricide is not a problem that can be solved by radio discipline or rationing commanders\u2019 access to live video feeds.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Instead, the solutions need to be baked in from the start by Department of Defense acquisition staff that demand products be designed and built to intelligently sip, not guzzle, precious bandwidth.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">On America\u2019s frontlines, the internal\u00a0<a href=\"https:\/\/www.defenseone.com\/technology\/2019\/10\/weapons-makers-unveil-herd-robotanks-army-worries-about-battlefield-bandwidth\/160618\/\" target=\"_blank\" rel=\"noopener\">battle over bandwidth<\/a>\u00a0has reached a critical mass. In response to Russia\u2019s invasion of Ukraine, every military branch is pouring an immense amount of money into high-tech drones with high-definition cameras. Unfortunately, every time a General wants to see the enemy in 4K HD video, mesh networks become so congested that frontline warfighters cannot communicate with each other on conventional radios. Fortunately, American tech companies have already deployed commercial solutions to solve the problem.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Self-driving cars, for example, generate far more data than even the most reliable 5G network can handle. In the early days of autonomous vehicles, software engineers had to hand-carry large hard drives on and off the cars on a \u201csneakernet\u201d just to be able to analyze a day\u2019s route. In time, engineers advanced a concept known as \u201cdata decimation\u201d where only the relevant data segments and alerts would have to be extracted from a car, thus becoming more efficient with the network\u2019s scarce resources.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Beyond autonomous vehicles, the video game industry has already partnered with hardware manufacturers to bring the power of the Cloud into disconnected devices, which eliminates another tax on networks. Industry calls this method \u2018edge computing\u2019 and Pentagon leadership\u00a0<a href=\"https:\/\/www.defense.gov\/News\/News-Stories\/Article\/Article\/2665133\/dod-budget-request-focused-on-innovations-for-warfighter-hicks-says\/\" target=\"_blank\" rel=\"noopener\">frequently speak about<\/a>\u00a0the need for greater intelligence at the tactical edge. But both the defense and tech world are talking about the same solution: the objective is to avoid bandwidth overload by colocating artificial intelligence and machine learning software within handheld devices, robots, and sensors.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">There are equally impactful operating system techniques, like \u201ccompute orchestration,\u201d that effectively turn a dozen cell phones into one single supercomputer when linked on a secure platform. These practices need to be enforced as a technological standard for the battlefield internet of things; however, such techniques are only now being considered in the Department of Defense.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">There are three major obstacles preventing these solutions from being adopted in time to maintain America\u2019s competitive advantage in the AI arms race.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The first is the assumption that old techniques can solve new battlefield problems. Senior leaders and prime vendors\u00a0<a href=\"https:\/\/breakingdefense.com\/2021\/11\/networks-as-center-of-gravity-project-convergence-highlights-militarys-new-battle-with-bandwidth\/\" target=\"_blank\" rel=\"noopener\">appear surprised<\/a>\u00a0that the network is suffering through major bandwidth constraints, and current mitigation measures are focused on the promise of\u00a0<a href=\"https:\/\/www.cto.mil\/5g\/\" target=\"_blank\" rel=\"noopener\">5G<\/a>. Even so, it is prohibitively difficult and expensive to deploy new cell towers in austere environments. Furthermore, those towers won\u2019t help much when communications are actively contested by a highly effective, $100 radio jammer.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The second obstacle is awareness. The Pentagon must have an understanding of the problems already solved by America\u2019s innovative tech experts so the commonplace solutions can be fed into the Defense Department\u2019s requirements process. The National Security Commission on AI\u2019s\u00a0<a href=\"https:\/\/www.nscai.gov\/wp-content\/uploads\/2021\/03\/Full-Report-Digital-1.pdf\" target=\"_blank\" rel=\"noopener\">Final Report<\/a>\u00a0made it very clear that the Department is not moving fast enough, and the widening gap between what\u2019s revolutionary in U.S. Defense and what\u2019s common in the tech industry has reached a crisis point.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">More specifically, it has taken 10 years for the Defense Department to get savvy on the \u201c<a href=\"https:\/\/www.defenseone.com\/feature\/clouds-of-war\/\" target=\"_blank\" rel=\"noopener\">Clouds of War<\/a>.\u201d But even though those programs are just starting to get organized on their requirements, the industrial world has already started to shift computing back to the tactical edge, and we cannot afford to wait another 10 years for the Pentagon\u2019s buyers to catch up.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The final obstacle is the incongruity of software and the Defense Department\u2019s procurement system. The U.S. government has spent decades optimizing procurement around physical things and billable hours. As a result, the best GovTech software today ends up being bundled in hardware or a \u201cblack box\u201d (like a slick new drone).<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Unfortunately, the natural side-effect has been an explosion of vendor lock-in and data silos, which prevents the best software from getting into the hands of the warfighters at the point of need. Instead, program executive offices tasked by Congress to procure these essential technologies should strive to unbundle hardware and software so that interoperability can liberate the tactical edge from data silos.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Everyone close to the Defense Department\u2019s data challenges understands the features of digital fratricide. A solution is within reach if we can build consensus and drive action to deploy industrial techniques like data decimation, edge computing, and compute orchestration to protect the networks that our warfighters rely upon. And it is incumbent on the Pentagon\u2019s acquisition officials to empower those serving at our nation\u2019s frontlines.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\"><i>Ian Kalin is the Chief Executive of TurbineOne. He spent the last twenty years focused on modernizing government technology and was the first Chief Data Officer for the U.S. Department of Commerce.<\/i><\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/opinion\/2022\/08\/12\/lessons-from-tech-industry-can-curb-digital-fratricide-on-battlefield\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cuanto m\u00e1s se apoya el ej\u00e9rcito estadounidense en las redes inal\u00e1mbricas, m\u00e1s congestionadas se vuelven. Desafortunadamente, el campo de batalla moderno est\u00e1 experimentando interrupciones cr\u00edticas&hellip; <\/p>\n","protected":false},"author":1,"featured_media":10632,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10631"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10631"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10631\/revisions"}],"predecessor-version":[{"id":10633,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10631\/revisions\/10633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/10632"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}