Review: The Dynamics of Military Revolution, 1300-2050

5 Star, Asymmetric, Cyber, Hacking, Odd War, Change & Innovation, Information Operations, Information Technology, Military & Pentagon Power

Amazon Page
Amazon Page

5.0 out of 5 stars The Heart of Asymmetric Advantage is NOT Technology,

October 28, 2001
MacGregor Knox
This is the only serious book I have been able to find that addresses revolutions in military affairs with useful case studies, a specific focus on whether asymmetric advantages do or do not result, and a very satisfactory executive conclusion. This book is strongly recommended for both military professionals, and the executive and congressional authorities who persist in sharing the fiction that technology is of itself an asymmetric advantage.

It merits emphasis that the author's first conclusion, spanning a diversity of case studies, is that technology may be a catalyst but it rarely drives a revolution in military affairs–concepts are revolutionary, it is ideas that break out of the box.
Their second conclusion is both counter-intuitive (but based on case studies) and in perfect alignment with Peter Drucker's conclusions on successful entrepreneurship: the best revolutions are incremental (evolutionary) and based on solutions to actual opponents and actual conditions, rather than hypothetical and delusional scenarios of what we think the future will bring us. In this the authors mesh well with Andrew Gordon's masterpiece on the rules of the game and Jutland: we may be best drawing down on our investments in peacetime, emphasizing the education of our future warfighters, and then be prepared for massive rapid agile investments in scaling up experimental initiatives as they prove successful in actual battle.
The book is noteworthy for its assault on fictional scenarios and its emphasis on realism in planning–especially valuable is the authors' staunch insistence that only honesty, open discussion among all ranks, and the wide dissemination of lessons learned, will lead to improvements.
Finally, the authors are in whole-hearted agreement with Colin Gray, author of Modern Strategy, in stating out-right that revolutions in military affairs are not a substitute for strategy as so often assumed by utopian planners, but merely an operational or tactical means.
This is a brilliant, carefully documented work that should scare the daylights out of every taxpayer–it is nothing short of an indictment of our entire current approach to military spending and organization. As the author's quaintly note in their understated way, in the last paragraph of the book, “the present trend is far from promising, as the American government and armed forces procure enormous arsenals only distantly related to specific strategic needs and operational and tactical employment concepts, while continu[ing], in the immortal words of Kiffin Rockwell, a pilot in the legendary First World War Lafayette Escadrille, to ‘fly along, blissfully ignorant, hoping for the best.'”

Lest the above be greeted with some skepticism, let us note the 26 October 2001 award of $200 billion to Lockheed for the new Joint Strike Fighter calls into serious question whether the leadership in the Pentagon understands the real world–the real world conflicts of today–all 282 of them (counting 178 internal conflicts) will require the Joint Strike Fighter only 10% of the time–the other 90% of our challenges demand capabilities and insights the Pentagon is not only not capable of fielding, it simply refuses to consider them to be “real war.” Omar Bin Laden beat the Pentagon on 11 September 2001, and he (and others who follow in his footsteps) will continue to do so until we find a military leadership that can lead a real-world revolution in military affairs…. rather than a continuing fantasy in which the military-industrial complex lives on regardless of how many homeland attacks we suffer.
Vote on Review
Vote on Review

Review: Making the Cisco Connection–The Story Behind the Real Internet Superpower

5 Star, Information Society, Information Technology
Amazon Page
Amazon Page
5.0 out of 5 stars Helpful Guide to 1990's and 2010's,
February 24, 2001
David Bunnell

I bought this book because Vint Cerf says the Internet will go from 3.5M users today to 3.5B users in 10-15 years, and that means that businesses involved in Internet infrastructure–and especially multi-media multi-lingual narrowcasting–have a growth (or implosion) prospect on the order of 1000X.

The book tells a helpful story about CISCO's growth in 12 years, and I for one found it both well-written and fascinating. I am especially impressed by the CISCO rules for successful acquisitions, by the CISCO distinctions between core competencies and outsourced manufacturing, and by the CISCO implementation of its enterprise information system and related web sales and service sites.

As for the future, I agree with John Chambers that telephone calls will be free in the future. Arthur Clarke said this 20 years ago. Chambers' vision for a global multi-service (voice and data) offering that easily integrates wireless, fiber-optic, and other forms of transmission is inevitable, but CISCO is not necessarily pre-ordained as the dominant enterprise.

Corporate and national information strategies must have four components: connectivity, content, coordination of standards and investments, and communications/computing security. CISCO, as described by the book, has a superficial interest in encryption but does not really understand the urgency of establishing “deep encryption” that is embedded in all data (including data in storage) and unencumbered by the retarded US and European policies seeking to give their spies an easy back door to use.

CISCO also appears to be overlooking two major opportunities for future expansion: first, in leading a much broader coordination of standards such as transparent and stable Application Program Interfaces (API) that would permit the remote integration of applications and multi-media data; and second, in exploring all aspects of data classification, indexing, and visualization, both in terms of data access and automated filtering, and in terms of pattern analysis across the network.

There are so many over-hyped books on the Internet Revolution that I found this book to be a real pleasure. Whether for entertainment or for business lessons or for insights into the future, it is a solid 5.

Vote on Review
Vote on Review

Review: Virtual Reality–The Revolutionary Technology of Computer-Generated Artificial Worlds – and How It Promises to Transform Society

5 Star, Asymmetric, Cyber, Hacking, Odd War, Change & Innovation, Complexity & Resilience, Consciousness & Social IQ, Culture, Research, Decision-Making & Decision-Support, Education (General), Future, Information Society, Information Technology

Amazon Page
Amazon Page

5.0 out of 5 stars Sacred and Scary Reflections on Neo-Biologicial Civilization,

December 29, 2000
Howard Rheingold
First published in 1991, this is a gem that should be one of the first readings of anyone contemplated the sacred and the scary aspects of how humans, machines, and software are being changed by emerging information technologies. While there is a lot of focus on “cool tools” and all the paraphenalia of “virtual reality” qua artificial sensation and perception, the rock bottom foundation of this book can be found in Howard reflections on what it all means for the transformation of humans, business, and society in general.
Vote on Review
Vote on Review

Review: Lifting the Fog of War

4 Star, Information Technology, Intelligence (Government/Secret), Military & Pentagon Power

Amazon Page
Amazon Page

4.0 out of 5 stars Expensive, Ineffective, Unrealistic, But Interesting,

August 29, 2000
William A. Owens
This is a well-intentioned book and the best available manifesto for the “system of systems” that can integrate intelligence, precision strike, and communications technologies by exploiting the Revolution in Military Affairs (RMA). On balance it provides several important contributions, but its core assumption that technology can be a substitute for people is flawed, as is its completely insupportable assumption that our allies might be willing to follow us down this very expensive and dubious interoperability trail. Perhaps even more troubling, the school of thought represented by this book suffers from the severe delusion that everything that needs to be seen can be seen by national technical means, and processed in time to be relevant to the commander. Nothing could be further from the truth-fully 90% of what is needed to succeed in today's environment is not in digital form, not in English, and not collectible by technical means. The most important point made in the whole book, and here I give the author high marks, is its compelling description of why military reform cannot be achieved from within: because there is no decision process by which a “joint” leadership can determine force structure and weapons acquisition without fear of service politics. His approach to reform, shifting from a focus on system stovepipes to joint mission areas, is valuable and could be helpful in defense transformation if it were cleansed of its unhealthy obsession with expensive technology and forced to face the fact that three-quarters of our challenges in this new century are Operations Other Than War (OOTW) that call into question virtually every dollar being spent under existing RMA auspices. The book is also helpful in pointing out the redundancy between the four services, the 12:1 support ratio in personnel, and the need to embed information handling capabilities in all future mobility and weapons systems. Perhaps most disappointingly, this book by a distinguished Admiral and apparent out-of-the-box thinker fails to outline a force structure, including a 450-ship Navy, capable of dealing effectively with all four levels of war in every clime and place.
Vote on Review
Vote on Review

Review: Unleashing the Killer App–Digital Strategies for Market Dominance

4 Star, Best Practices in Management, Information Society, Information Technology, Strategy

Amazon Page
Amazon Page

4.0 out of 5 stars Twelve Step Guide To Good Business in New Economy,

May 29, 2000
Larry Downes
Twelve principles of killer app design: 1) Outsource to the customer, 2) Cannibalize your markets; 3) Treat each customer as a market segment of one; 4) Create communities of value; 5) Replace rude interfaces with learning interfaces; 6) Ensure continuity for the customer, not yourself; 7) Give away as much information as you can; 8) Structure every transaction as a joint venture; 9) Treat your assets as liabilities; 10) Destroy your value chain; 11) Manage innovation as a portfolio of options; 12) Hire the children.
Vote on Review
Vote on Review

Review: Business @ the Speed of Thought –Using a Digital Nervous System

4 Star, Information Operations, Information Society, Information Technology

Amazon Page
Amazon Page

4.0 out of 5 stars 900 Lb Gorrilla Writes Book, Essential Reading,

May 29, 2000
Bill Gates
No doubt largely written by staff assistants, this book can be considered a watered-down version of Microsoft's game plan for taking over the world, i.e. being the operating system for everything. Each chapter has a useful figure that sums up business lessons and methods for diagnosing one of the aspect's of one's digital nervous system. This is a great airplane book. Like him or not, when the 900 lb digital gorrilla writes a book, we all have to read it.
Vote on Review
Vote on Review

Review: Silicon Snake Oil–Second Thoughts on the Information Highway

5 Star, Crime (Corporate), Information Society, Information Technology
Amazon Page
Amazon Page
5.0 out of 5 stars From the Top Cyber-Sleuth, A Cold Shower on Cyber-Hype,
May 29, 2000
Clifford Stoll
When Cliff Stoll, the brilliant man who caught the top East German electronic criminal, speaks on the failures of our cyber-culture, we must listen carefully. “Our networks are awash in data. A little of it's information. A smidgen of this shows up as knowledge….The Internet, that great digital dumpster, confers not power, not prosperity, not perspicacity…Our networks can be frustrating, expensive, unreliable connections that get in the way of useful work. It is an overpromoted hollow world, devoid of warmth and human kindness. The heavily promoted information infrastructure addresses few social needs or business concerns. At the same time, it directly threatens precious parts of our society, including schools, libraries, and social institutions.”
Vote on Review
Vote on Review