- Growth in exports is mitigating the impact of domestic cuts
- Balancing squeezed budgets with information superiority
- Leveraging the IT evolution, adapted to military environment
- Moving from silos to an integrated forces approach
- Terrorist activity increased by 80% in 2014
- World military expenditure was estimated at $246 per person in 2014
- Global electronics warfare market is expected to reach $24.25 billion by 2020
- Global military robots market is projected to grow to $21.11 billion by 2020
- CUSTOMER EXPERIENCE
- To stay one step ahead of today’s asymmetric threats, our armed forces and intelligence services need ready access to the latest advances in technology. Speed of development and deployment, along with ease of use, are critical success factors in the increasingly complex and fast-moving landscape.
- BUSINESS REINVENTION
- Defeating today’s asymmetric threats demands cooperation between national organizations and allies, placing interoperability at the top of the agenda. New open and more integrated approaches that enable defense and industry organizations to work together effectively will stimulate innovation.
- OPERATIONAL EXCELLENCE
- As information superiority becomes the defining metric, defense organizations must master the data and information flood flowing out from both operational and IT sources. The rapidly changing operational environment also demands higher levels of agility, adaptability and scalability.
- TRUST AND COMPLIANCE
- To maintain strategic advantage, armed forces and intelligence agencies need to secure the entire information value chain. And as cyber space joins the classic realms of military operations, people, assets and infrastructure must be secured from threats across both physical and virtual worlds day and night.
Head of Defense & Aerospace Market
Faced with squeezed budgets and a real need for turning information into strategic and tactical advantage, Armed Forces need to rely more and more on the power of IT technology evolution, provided it’s fully adapted to the specific military environment.
|Technology||x||y||x (phone)||y (phone)||Impact||Range||Section||Keys||Description|
|App stores||88||33||84||55||Early Adoption||2017||Low||experience||As consumer market waterproof smartphones and tablets are encrypted and adapted for military use, private and audited app stores provide access to bespoke mobile applications.|
|3D printing||61||45||64||60||Adolescent||2018||Medium||excellence||Back at base in combat scenarios, the vast engineers’ store rooms that were once full from floor to ceiling with parts of all different shapes and sizes are virtually nowhere to be seen. Modern 3D printing technology has virtually wiped them out. When an engineer is assigned to a job, any parts needed are created there and then.|
|5G networks||37||40||60||35||Emerging||2019+||High||experience,excellence||Tactical information systems deliver real superiority in combat. People and ‘things’ are better connected and better informed than ever before. Whether man or machine, they can access online resources, communicate and share their insight wherever and whenever they need to. Today’s easy-to-deploy standalone LTE networks may be superseded by low power, extended range 5G networks in the future.|
|Advanced data visualization||79||23||77||40||Early Adoption||2017||Medium||experience||Combined with advanced data analytics, immersive 3D visualization technologies bring clarity to underlying complexity. They allow defense organizations to identify underlying structures and otherwise hidden meanings across increasingly diverse and apparently disparate data sources, amplifying intelligence, surveillance and recognition systems.|
|Augmented reality||90||13||77||40||Mainstream||2016||Medium||experience||Out in the battlefield augmented reality improves situational awareness within the field of view. In operations it supports tele-maintenance and tele-operations, enabling engineers to access vital information hands-free through modern wearable devices, improving productivity and safety.|
|Autonomous vehicles||83||10||50||40||Mainstream||2016||High||business,excellence,trust||Advanced security robots and unmanned aerial vehicles (UAVs) are increasingly supporting surveillance, protection, detection, rescue from objects, infrastructure destruction and people violation activities.
Security robots undertake dangerous actions without jeopardizing military forces and act in areas that are either extremely difficult or impossible for humans to access autonomous they can self-organize and reach certain level of independent decision making.
|52||56||68||55||Emerging||2019+||Medium||experience||Novel brain-computer interfaces promise not only to revolutionize prosthesis for those injured on the battlefield, they offer an opportunity to accelerate learning, enable faster and better neural communications in hostile environments, improve analysis of imagery for detecting potential threats and more.|
|Cloud Service Integration||66||39||70||45||Adolescent||2018||Medium||excellence||As cyber space joins the increasingly diverse mission spectrum, the identities of people and things within the IoT are managed through electronic identification (e-ID) technologies. Cloud-based federated identity services simplify the extension of identity and access management across new IoT-based services. In the future trusted information brokers will act as the central verification service to avoid the need for individual registration and authentication of each service.|
|DevOps||87||20||67||67||Early Adoption||2016||Medium||excellence||The Agile development methodology accelerates development by presenting early mock-ups, allowing military personnel to express their needs and desires early in the design process. To accelerate deployment, defense organizations are adopting a DevOps approach to development. It reduces time-to-market and cost while improving quality by enhancing collaboration between software developers and IT operations.|
|Distributed analytics||70||33||62||70||Adolescent||2017||Medium||business,excellence||New research programs around distributed analytics will address future coalition operations in the congested, cluttered, contested, connected and constrained battlefield.|
|Edge computing||75||31||66||43||Adolescent||2017||Medium||excellence||Information gathering and analysis at the edge and enabled by edge computing will allow restrictive and valuable bandwidth to be conserved as only immediately pertinent information will need to be transmitted centrally.|
|High-performance computing||73||13||72||23||Early Adoption||2017||High||business,excellence,trust||Growing volumes of data are being turned into critical military intelligence – Military Intelligence 4.0. With the volumes, variety and velocity of data accelerating, high-performance computing (HPC) ensures military personnel can run the complex simulations and analyses that deliver vital intelligence. By combining HPC computation infrastructures, networks and the last mathematical models they can predict behaviors, prevent cyber or terrorist attacks and more.|
|Hybrid clouds||92||26||89||26||Mainstream||2017||Low||experience||Cloud computing is helping defense organizations ensure data is accessible whenever and wherever it’s needed, improving mobility and flexibility. Sensitive data, such as the position of peers and foes, is stored in private clouds. Hybrid clouds allow combat personnel to enhance sensitive insights with publicly available data such as maps or weather forecasts.|
|60||5||50||10||Early Adoption||2017||Transformational||excellence||By promoting Internet of Things (IoT), Industry 4.0 technologies are enabling the liquid operational intelligence and control called for in today’s continually evolving theatre of war and terrorism. Connected objects and vehicles integrated to the heart of the action zone ease information collection and processing directly in the field.|
|Innovation value webs||72||50||76||47||Early Adoption||2018||Medium||business||With collaboration within a wider ecosystem of peers and partners key in the fight against an enemy without borders, innovation value webs are empowering network centric warfare and intelligence. Value webs ensure processes are supported along their entire paths, with dynamic and both synchronous and asynchronous participation all supported. In addition these webs are able to process diverse and unpredictable metadata formats.|
|65||9||63||12||Early Adoption||2017||Transformational||experience,business||By promoting Internet of Things (IoT), Industry 4.0 technologies are enabling the liquid operational intelligence and control called for in today’s continually evolving theatre of war and terrorism. Connected objects and vehicles integrated to the heart of the action zone ease information collection and processing directly in the field.
Sensors and geo-location technologies embedded in mobile devices and smart vehicles continually transmit intelligence to a central control center. Any individual or vehicle needing assistance can be found easily, their status understood in advance of reaching them.
|Machine learning||64||21||42||50||Adolescent||2017||High||business,excellence||Behind military robots lies a complex set of automated processes, with no room for error. The wrong information or the wrong outcome of an analysis may lead to automated responses with real life consequences. Machine learning will play a key role in that decision-making.|
|57||42||56||57||Adolescent||2018||Medium||excellence||Operations research falls under the category of prescriptive analytics. Its first application was in planning and managing organizational operations during World War II when human and material resources were scarce and managing war logistics was a daunting task.|
|Quantum computing||22||10||50||16||Emerging||2019+||Transformational||trust||With communication security critical on the battle field, quantum computing promises to deliver new levels of protection. What’s more, quantum computers threaten to break today’s encryption methods. Their substantial increase in computing power could be a game-changer in intelligence, surveillance and reconnaissance.|
|Robots||92||5||84||13||Mainstream||2016||High||business,excellence||Security robots undertake dangerous actions without jeopardizing military forces and act in areas that are either extremely difficult or impossible for humans to access. Autonomous, they can self-organize and reach certain level of independent decision making.|
|Self-adaptive security||43||26||41||42||Adolescent||2018||High||trust||Advanced Security Operations Centers (SOC) and Security Information and Event Management (SIEM) are integral to new security strategies. Organizations have deployed real-time controls in a proactive security approach that is helping to prevent cyberattacks. Trusted probes are being deployed within secure environments to look for evidence of specific suspicious behaviors. These pre-emptive security technologies help agencies anticipate threats. Behind the scenes streaming analytics and HPC analyze millions of events in real time.
Self-adaptive security approaches that can, for instance, automatically adapt to a fast-changing context would heighten security in self-organizing ad-hoc and sensor networks.
Meanwhile distributed analytics in combination with HPC supports vital forensic analysis after an incident is detected. They help organizations quickly identify where the attack started, who is behind it and how it was carried out.
|Semantic technologies||77||37||69||73||Adolescent||2017||Medium||excellence||In defense, semantic technologies help organizations unleash the hidden value of data, develop shared common databases and simplify the management of military intelligence reference data. They help intelligence systems to understand the relationships within and across data.|
|Social media analytics||81||11||40||38||Mainstream||2016||High||experience,business||Defense organizations are employing social media analytics to gain additional insight into how situations are developing. This will also provide Open Source Intelligence (OSINT) to complement established methods already in place. OSINT enhances situational awareness. In a non-combatant evacuation operation it can provide valuable insight for those preparing to deploy or who have deployed, for example.|
|Software-defined technologies||85||8||60||29||Mainstream||2016||High||trust||Build over the wire and software defined techniques improve deployment speed and safety. Software-defined networking (SDN), for example, provides the agile network that helps forces communicate, train and operate together better. Military personnel can create dynamic links between locations and dynamically apply appropriate quality-of-service and bandwidth allocation to those links.|
|Streaming analytics||68||20||54||38||Early Adoption||2017||High||business,excellence||The vast volumes of data available today coupled with today’s advanced analytics allows the military to move from a reactive to a proactive position by enabling real-time situational awareness and rapid decision-making. Streaming analytics, for example, allow organizations to extract intelligence that can be detected and acted on at a moment’s notice from data in motion. In addition, streaming analytics can be used to analyze geo-location information in real time to provide a comprehensive, up-to-the-minute view on the location of all mobile assets.|
|Swarm computing||50||30||49||42||Adolescent||2018||High||business,excellence||Part of the wider IoT, sensors, robots and other devices together make up the intelligent dust that can detect light, temperature, vibration, magnetism, chemicals and more. Operating wirelessly within a network it provides invaluable data.|
|Wearable computing||88.5||7||72||21||Mainstream||2016||High||experience,business||On the battlefield, wearables connect military personnel with their peers and operational headquarters. Electronics and sensors that can be worn or placed in uniforms provide real-time monitoring of their location, vital signs and the environment around them.|