Skip to main content

Compendium Article 5: Fueling the Future - The Impact of Technology on Military and Aviation Fuel in the Defense Industry



Computers' Roles in the Defense Industry

    To defend a nation's interests and population, the defense sector creates and maintains the military and security forces' equipment, technologies, and services. This comprises military systems' study, design, development, and construction. Also included in defense services are logistics, training, and maintenance. Cybersecurity, unmanned systems, artificial intelligence, and machine learning are becoming increasingly crucial to the defense business.

Importance of Computer Literacy in the Military

    To account for products and run and maintain complex technological systems, military personnel must be computer literate and able to perform tasks such as creating Excel spreadsheets. These technologies generate data and information that must be analyzed and utilized to make crucial national defense decisions affecting our wonderful nation.

    The military has always been at the forefront of modern technology, such as GPS and ARPANET. Defense programs and financial regulations are constantly seeking to reduce the number of employees to save military expenditures. In the future, computer technology will enable the military to conduct operations with fewer personnel by automating more tasks.

Historic Technology Trends and Future Predictions in the Defense Industry

    Technology, such as self-service and sales lanes, can eliminate the need for increased customer service cashiers, as it does also in the military. The military follows a cycle of increasing and then decreasing workforce numbers. Security at the gate had to validate each military ID. Networks and systems in the military required frequent password and login changes. These ID cards now feature biometrics and PKI multi-factor authentication, enabling speedier verification.

    Additionally, the military viewed pilots as its most important employees, who were compensated extra per diem for crossing foreign borders. As pilots demand higher pay, it becomes increasingly challenging to retain them. However, as drone technology develops, these same pilots may find themselves operating remote-controlled aircraft, for which they will likely be compensated less. When I first entered the military, only higher-ranking personnel used email sporadically and the majority of work was handled on paper. Suppose the Senate and President's goal of replacing military fuel consumption non-tactical vehicles with electric vehicles becomes inescapable. In such situation, a drop in numbers may occur sooner, reducing the number of people needed in my line of work of fuel distribution and storage. Are you thinking I-Robot? In "I-Robot," Detective Del Spooner (Will Smith) rides a gas-powered motorcycle. Spooner can chase suspects and avoid danger on the motorcycle, which is swift, agile, and can easily manage heavy traffic. The motorcycle contributes to the futuristic setting of the movie while Spooner's traditional police work contrasts with the technological advancement of the robots. A quick Internet search reveals that the military has initiated work on creating fuel from air, allowing aircraft to require just emergency fuel reserves. When I first began working as a Fuel Laboratory Technician, we utilized a significant amount of conventional laboratory equipment that has now been replaced with automated equipment. The United States Department of Defense is the world's largest consumer of fossil fuels.

Preparation H (Hybrid)

    Future military computers will automate and enhance the decision-making process. UAVs and drones may be piloted with computers. Without human participation, computers can operate missiles and other weapons. Now that computers can analyze satellite photos and telecom intercepts, the number of analysts has been reduced. Artificial intelligence and machine learning could enable computers to make decisions autonomously. In the coming decade, hardware, operating systems, and networking will all evolve. Defense will be capable of analyzing more data, commanding more advanced military systems, and simulating more complex battle situations. 5G and edge computing will increase the communication and control of autonomous vehicles and drones, which may impact military intelligence and missions such as the Mars Rover.

In Conclusion

    We arrived at various shared understandings after I voiced my reservations and my peers' concerns were heard. There are some worries that fossil fuel demand will decrease as autonomous vehicles and aircraft become more ubiquitous. So, as the 2F military AFSC gradually shrinks, they see themselves being reclassified or transferred to another AFSC in the USAF, performing POL duties in addition to their existing responsibilities. There was also discussion about the dangers of hacking into military systems and the potential for other nations to do the same. Concerns have been raised about the growing reliance on electronic administrative processes, payroll systems, and health records. The use of unmanned ships and other examples of cutting-edge technology in the navy was also discussed. Responses They also cited a breach in which an incident was purposefully created aboard a ship and had adverse effects. In addition to wondering what other nations might do to the United States, the consensus was that similar hacking occurrences could happen with the US military. They were nonetheless upbeat about the industry's prospects because weapon systems are still in use. In the end, they still remained firm and optimistic regarding the direction of the US armed forces as a whole.

    Technology always risks being less effective and more error-prone than human decision-making. Because lives are at risk, it is imperative to retain a specific number of military personnel. As a result, but with less engagement, military personnel will still be required for decision-making, computer system monitoring, training, maintenance, and repair. The military has insisted that its goal is to "do more with less" ever since I enlisted.



Comments

Popular posts from this blog

Compendium Article 9: A Newbie's Introduction to Object-Oriented Programming, Java, and tutorial links to keep you motivated

            Hello fellow Java noobs! As my journey continues further into the world computing and specifically programming, we’ve now arrived at Object-Oriented Programming (OOP) and Java. The names alone sound intimidating, but don’t worry! I'm here to explain what Ive learn to your ------from one beginner to another. Getting Started 1.       Go to the Oracle website or OpenJDK to get the Java Development Kit (JDK). 2.       Pick the JDK version that matches your computer (Windows, macOS, Linux) and download it. 3.       Open the downloaded file and follow the on-screen setup instructions. 4.       To check if Java is installed, type java -version in your command prompt or terminal. If you see a version number, you're all set! 5.       For writing Java code, you'll need an IDE (a program where you’ll write the code)....

Compendium Article 4: Roots to Routes - Understanding How Your Requests are Traced and Analyzed

Tracing Your Requests: A Journey Through Ping and Trace Commands      For many years, network hops and latency have been measured by ping and traceroute. Network engineers and administrators have benefited from using these tools to analyze and track network performance. Information is now more accurate and current thanks to modern tools. Because both experts and everyday users use these tools to identify and resolve network problems, they are crucial to the infrastructure of the modern internet. What is Ping Routing and Trace Routing? Ping      A Ping measures packet round-trip time and IP host reachability. It sends the target host a request and waits for a reply. If the host responds, the round-trip time is determined. You can analyze internet connectivity (Hoffman, 2017). Traceroute      Traceroute shows how IP packets travel. A request is also sent from the host. When hosts send the message, IP addresses between the host and destination ...

Compendium Article 6: The Digital Guardian - Securing Information and Systems in the 21st Century

  Network Protection    Safeguarding confidential and sensitive information      Information and system security are vital for the success of any business or organization. To maintain a competitive edge as technology advances and the digital world becomes more interconnected, it is essential to safeguard private and sensitive information against unauthorized access and theft. Businesses must take a proactive approach to increase information and system security by developing a customized information security policy, developing secure and manageable passwords, remaining current on the latest technology security threats and vulnerabilities, configuring network security measures to prevent unauthorized access, infiltration, and data theft, and installing anti-virus software and other malware protection on all company-owned devices. This paper will present basic information on the importance of information and system security in today's digital age, as well as p...