The Digital Age and Joint Targeting
Aug14

The Digital Age and Joint Targeting

By Daniel Landry The Canadian Armed Forces (CAF) prides itself on being ready. Operational plans are always in the works to meet the need of the day, and this planning process is an endless endeavour where options are devised for all manner of contingencies in this unpredictable world. So it will be no surprise that a committed Defence team has...

Read More
Cyber is the most significant single threat to current and future IT enabled weapons platforms
Jul19

Cyber is the most significant single threat to current and future IT enabled weapons platforms

By Nicholas Scheurkogel This powerful statement is often repeated across the defence industry, and within the Department of National Defence (DND) and Canadian Armed Forces (CAF); so often over the past few years that many have come to believe that it is true. Why would it not be true? Computer hackers and foreign states can manipulate vulnerabilities in the...

Read More
Forget everything you know about HF
Jul12

Forget everything you know about HF

By Thaddeus Zeglen It’s ancient, hard to use, has limited bandwidth and requires huge black boxes. Its reliability and throughput issues make it greatly inferior to SATCOM for data communications. When you’re talking about high-frequency (HF) communications, you’re also talking about low expectations. These are typical associations with HF technology in the age of SATCOM – so it might...

Read More
Defence platform sustainment: From Traditional options to UK’s PPPs and to JSF International Scheme
Jul05

Defence platform sustainment: From Traditional options to UK’s PPPs and to JSF International Scheme

By Ugurhan G. Berkok A rule of thumb for the sustainment cost of military platforms is that the sustainment-acquisition costs ratio is in the order of two to three – more like three for land systems and then two for air and naval systems. Beyond such budgetary implications, since sustainment is as crucial an input as the equipment itself...

Read More
Threats in the Hyper-Connected World
Jun26

Threats in the Hyper-Connected World

By Valarie Findlay For as much as “white-hat” technologists (the good guys) have made advancements, it has become abundantly clear that the risks remain and go beyond technological vulnerabilities and remedies. In other words, cyber-threats have become much more than surreptitious, malicious software that attack our assets; likewise fighting cyber-threats doesn’t always require a technical safeguard. Formed decades ago, the...

Read More
Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Youtube