Power To The Edge: Difference between revisions

From P2P Foundation
Jump to navigation Jump to search
(removed dead links)
 
(7 intermediate revisions by 2 users not shown)
Line 1: Line 1:
Information Age Transformation Series
Book and security-related concept.


Power to the Edge


Command... Control... in the Information Age
'''Book: Power to the Edge. Command... Control... in the Information Age. David S. Alberts , Richard E. Hayes ,with a Foreword by John Stenbit. U.S. Department of Defense. Command and Control Research Program, 2003. 300+ pages, pdf '''


David S. Alberts , Richard E. Hayes ,
URL = http://www.dodccrp.org/files/Alberts_Power.pdf
with a Foreword by John Stenbit


300 + page pdf




link = http://www.dodccrp.org/files/Alberts_Power.pdf


= Definition =




From the Wikipedia [http://en.wikipedia.org/wiki/Power_to_the_Edge]


= Related Wikipedia Article Exerpts =
'''Power to the Edge refers to the ability of an organization to dynamically synchronize its actions; achieve command and control (C2) agility; and increase the speed of command over a robust, networked grid. The term is most commonly used in relation to military organizations, but it can equally be used in a civilian context.'''
(http://en.wikipedia.org/wiki/Power_to_the_Edge)




== Power to the Edge ==
=Discussion=




http://en.wikipedia.org/wiki/Power_to_the_Edge
Network-centric warfare:  


'''Power to the Edge refers to the ability of an organization to dynamically synchronize its actions; achieve command and control (C2) agility; and increase the speed of command over a robust, networked grid. The term is most commonly used in relation to military organizations, but it can equally be used in a civilian context.'''


"Power to the Edge" is an information and organization management philosophy first articulated by the U.S. Department of Defense in a publication by Dr. David S. Alberts and Richard E. Hayes in 2003 titled: "Power to the Edge: Command...Control...in the Information Age." This book was published by the Command and Control Research Program and can be downloaded from the Program's website.
"Power To The Edge's radical ideas had been under investigation by the Pentagon since at least 2001. In UIAW, the concept of peer-to-peer activity combined with more traditional hierarchical flow of data in the network had been introduced.''' Shortly thereafter, the Pentagon began investing in peer-to-peer research, telling software engineers at a November, 2001 peer-to-peer conference that there were advantages to be gained in the redundancy and robustness of a peer-to-peer network topology on the battlefield. Colonel Robert Wardell said "You have to empower the fringes if you are going to... be able to make decisions faster than the bad guy".
 
Network-centric warfare/operations is a cornerstone of the ongoing transformation effort at the Department of Defense initiated by former Secretary of Defense Donald Rumsfeld. It is also one of the five goals of the Office of Force Transformation, Office of the Secretary of Defense."
(http://en.wikipedia.org/wiki/Network-centric_warfare)
 
 
=Principles=
 
Power to the Edge advocates the following:
 
* Achieving situational awareness rather than creating a single operational picture
 
* Self-synchronizing operations instead of autonomous operations
 
* Information Pull rather than Broadcast Information Push
 
* Collaborative efforts rather than individual efforts
 
* Communities of Interest (COIs) rather than stovepipes
 
* "Task, post, process, use" rather than "task, process, exploit, disseminate"


* Handling information once rather than handling multiple data calls


==Network-centric warfare==
* Sharing data rather than maintaining private data


* Persistent, continuous information assurance rather than perimeter, one-time security


http://en.wikipedia.org/wiki/Network-centric_warfare
* Bandwidth on demand rather than bandwidth limitations


* IP-based transport rather than circuit-based transport


Power To The Edge's radical ideas had been under investigation by the Pentagon since at least 2001. '''In UIAW, the concept of peer-to-peer activity combined with more traditional hierarchical flow of data in the network had been introduced.''' Shortly thereafter, the Pentagon began investing in peer-to-peer research, telling software engineers at a November, 2001 peer-to-peer conference that there were advantages to be gained in the redundancy and robustness of a peer-to-peer network topology on the battlefield. Colonel Robert Wardell said "You have to empower the fringes if you are going to... be able to make decisions faster than the bad guy".[3]
* Net-Ready KPP rather than interoperability KPP


Network-centric warfare/operations is a cornerstone of the ongoing transformation effort at the Department of Defense initiated by former Secretary of Defense Donald Rumsfeld. It is also one of the five goals of the Office of Force Transformation, Office of the Secretary of Defense.
* Enterprise services rather than separate infrastructures


=Excerpted Graphs=
* COTS based, net-centric capabilities rather than customized, platform-centric IT


Power to the Edge
(http://en.wikipedia.org/wiki/Power_to_the_Edge)


http://www.dodccrp.org/files/Alberts_Power.pdf
=Excerpted Graphs=


''Portions of this publication may be quoted or reprinted without further permission, with credit to the DoD Command and Control Research Program, Washington, D.C. Courtesy copies of reviews would be appreciated.''


----
==Interoperability==


page 138
page 138
Line 53: Line 73:
[[Image:Interoperability.jpg]]
[[Image:Interoperability.jpg]]


Interoperability, the ability to work together,
'''''Interoperability, the ability to work together, needs to simultaneously occur at a number of levels to enable entities to communicate, share information, and collaborate with one another'''.''
needs to simultaneously occur at a number of
levels or layers1 to enable entities to communicate,
share information, and collaborate with one another.  


The degree to which forces are interoperable
''The degree to which forces are interoperable directly affects their ability to conduct network-centric operations.''
directly affects their ability to conduct network-centric operations.


Interoperability must be present in each of the four
''Interoperability must be present in each of the four domains: physical, information, cognitive, and social.''
domains: physical, information, cognitive, and social.


----
==Developing Situational Awareness==


page 139
page 139
Line 70: Line 85:
[[Image:Developing_Situational_Awareness.jpg]]
[[Image:Developing_Situational_Awareness.jpg]]


LEVELS OF INTEROPERABILITY Interoperability can be understood as a spectrum of connectedness that ranges from unconnected, isolated entities to fully interactive, sharing enterprises
LEVELS OF INTEROPERABILITY :


'''''Interoperability can be understood as a spectrum of connectedness that ranges from unconnected, isolated entities to fully interactive, sharing enterprises.'''''






Line 80: Line 94:




[[Category:Governance]]


[[Category:Governance]]
[[Category:Intelligence]]

Latest revision as of 08:51, 26 October 2007

Book and security-related concept.


Book: Power to the Edge. Command... Control... in the Information Age. David S. Alberts , Richard E. Hayes ,with a Foreword by John Stenbit. U.S. Department of Defense. Command and Control Research Program, 2003. 300+ pages, pdf

URL = http://www.dodccrp.org/files/Alberts_Power.pdf



Definition

From the Wikipedia [1]

Power to the Edge refers to the ability of an organization to dynamically synchronize its actions; achieve command and control (C2) agility; and increase the speed of command over a robust, networked grid. The term is most commonly used in relation to military organizations, but it can equally be used in a civilian context. (http://en.wikipedia.org/wiki/Power_to_the_Edge)


Discussion

Network-centric warfare:


"Power To The Edge's radical ideas had been under investigation by the Pentagon since at least 2001. In UIAW, the concept of peer-to-peer activity combined with more traditional hierarchical flow of data in the network had been introduced. Shortly thereafter, the Pentagon began investing in peer-to-peer research, telling software engineers at a November, 2001 peer-to-peer conference that there were advantages to be gained in the redundancy and robustness of a peer-to-peer network topology on the battlefield. Colonel Robert Wardell said "You have to empower the fringes if you are going to... be able to make decisions faster than the bad guy".

Network-centric warfare/operations is a cornerstone of the ongoing transformation effort at the Department of Defense initiated by former Secretary of Defense Donald Rumsfeld. It is also one of the five goals of the Office of Force Transformation, Office of the Secretary of Defense." (http://en.wikipedia.org/wiki/Network-centric_warfare)


Principles

Power to the Edge advocates the following:

  • Achieving situational awareness rather than creating a single operational picture
  • Self-synchronizing operations instead of autonomous operations
  • Information Pull rather than Broadcast Information Push
  • Collaborative efforts rather than individual efforts
  • Communities of Interest (COIs) rather than stovepipes
  • "Task, post, process, use" rather than "task, process, exploit, disseminate"
  • Handling information once rather than handling multiple data calls
  • Sharing data rather than maintaining private data
  • Persistent, continuous information assurance rather than perimeter, one-time security
  • Bandwidth on demand rather than bandwidth limitations
  • IP-based transport rather than circuit-based transport
  • Net-Ready KPP rather than interoperability KPP
  • Enterprise services rather than separate infrastructures
  • COTS based, net-centric capabilities rather than customized, platform-centric IT

(http://en.wikipedia.org/wiki/Power_to_the_Edge)

Excerpted Graphs

Interoperability

page 138

Interoperability, the ability to work together, needs to simultaneously occur at a number of levels to enable entities to communicate, share information, and collaborate with one another.

The degree to which forces are interoperable directly affects their ability to conduct network-centric operations.

Interoperability must be present in each of the four domains: physical, information, cognitive, and social.

Developing Situational Awareness

page 139

LEVELS OF INTEROPERABILITY :

Interoperability can be understood as a spectrum of connectedness that ranges from unconnected, isolated entities to fully interactive, sharing enterprises.