关于区块链技术您可以信任的数据2017年(11页)

ID:23202

大小:0.12 MB

页数:11页

时间:2022-11-29

金币:20

上传者:战必胜
Summer 2017 | 91
Views
Data You Can Trust
Blockchain Technology
Col Vincent Alcazar, USAF, Retired
Disclaimer: e views and opinions expressed or implied in the Journal are those of the authors and should not be construed as carrying
the official sanction of the Department of Defense, Air Force, Air Education and Training Command, Air University, or other agencies or
departments of the US government. is article may be reproduced in whole or in part without permission. If it is reproduced, the Air
and Space Power Journal requests a courtesy line.
They say that coming events cast their shadows before. May they not some-
times cast their lights before?
—Augusta Ada King–Noel, Countess of Lovelace
e Case for Change
America’s military continues its wait for network-centric warfare (NCW) break-
throughs to deliver technological leadership and war-fighting advances that revolu-
tionize the American way of battle. Instead, in the past decade the US military got
artifacts: Internet access, laptop computing, the introduction of smartphones, and
so forth. The artifacts of technological advancement are often misidentified as the
anticipated NCW breakthroughs. At their core, those artifacts are iterative device
and machine productivity improvements. If NCW has an insidious weakness, it is
its hardware orientation. The focus on artifacts begs a question: what about the data
that is transported within the hardware, devices, networks, and associated infra-
structure? Despite advancements in technologies and processes, today’s software
and hardware shells—the things that surround and distribute data—remain chronically
vulnerable. Among history’s recurring insights is that a military’s vulnerabilities—
hidden or acknowledged—can become linchpins in an opponent’s campaign of sur-
prise. However, surprise need not be strategic to impede the American way of battle.
What is to be done?
Against the backdrop of US data vulnerabilities and potential susceptibility to cyber-
space surprise, warriors and warrior leaders need a different approach, a big idea—
a viable technology that can mitigate the weakness in the DOD’s paradigm of central-
ized data protection. The better (big) idea should not be a continued near-exclusive
focus on iterative military computing machine improvements. Instead, this better
idea ought to outline a design for the enhanced security of what military informa-
tion technology (IT) equipment processes, stores, and distributes: data. The better
idea exists; it is blockchain technology. Concisely stated, blockchain is a technology
that stores data in a way that makes it incorruptible, doing so via its integrated data
ledgers. The reasons to adopt blockchain’s leap-ahead technology are twofold:
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭