The Ultra I&C Information Advantage

Welcome to the Ultra I&C Information Advantage Blog; your source for up-to-date topics from our technical and leadership team on intelligence and communications trends, announcements and insights.

Post Pandemic Days – Pivoting to Create an Environment that Reconnected My Team

I write this knowing that I am stating my experience and I am certain there are many effective ways leaders are tackling this transition: reconnecting teams in a post pandemic world. Before I share what I did and what I learned, let me start by giving you a little background, which might sound familiar to many of you. Read more...

Multi-Domain Sense Making – Real World Use Cases

 

It’s commonly stated that operators and analysts who rely on data to perform their mission often spend as much as 80% of their time gathering and sifting through data, sometimes across multiple systems and networks, allowing only about 20% of their time performing analysis. Read more...

Solving the Data Intelligence Gap

The increasing leanness of tactical intelligence platforms, systems, and processes has pushed the emphasis for intelligence products to the strategic level, to satisfy requirements for trends and analysis, strategic planning, and wide operational level targeting. Read more...

What Home Buying and Hiring Talent Have in Common: It’s Crazy!

If you have been trying to buy a house recently you know the market has been crazy, homes are selling faster and for more money than ever. Today’s candidate market is not much different. We are seeing candidates being offered higher salaries than in the past due to companies competing for talent. Read more...

​Secure The Edge To Protect The Core​

The first step in any system security design is a risk analysis to answer fundamental questions about external interfaces and operating threats. While encrypted communication and user authentication controls are straightforward enough, a system security architecture quickly becomes complex when answering the question, “How does a system ensure software is trustworthy?”​ Read more...

Visualizing the Future – The Emerging and Converging Role of Interface and Cognitive Assistance in Training and C2

In the science fiction movie Oblivion, Victoria (played by Andrea Riseborough) uses a powerful computer interface to direct the activities of autonomous drones, monitor the spectrum, and control an array interconnected systems. She seamlessly communicates with orbital, airborne, and ground-based assets, and has direct access to telemetry and real time sensor data. Read more...

Tomorrow's Wars Are Here Today

Despite the decade-old plus prediction of “swimming in sensors and drowning in data in the near future”, progress within the community has been slow in achieving what was at one point termed the third offset. The Third Offset aimed to draw on U.S. advanced technologies to offset China’s and Russia’s technological advances—especially China’s. Read more...

Six Tips for Women in Engineering

I was asked by a coworker what my experience was like as a female engineer over the years. Her daughter was considering majoring in it. She wanted to know if she would have a difficult time in such male dominated career and if I had any tips for success. The quick answers were: maybe and, yes I do. Read more...

Freedom, by Degrees: Achieving Battlefield Dominance with RF Degrees of Freedom

Imagine yourself hunkered down in a WWI trench surrounded by your compatriots. It’s cold, you’re tired, and you’re covered in mud and grime. The battle is at a standstill – the front isn’t moving because the trenches aren’t moving. The doldrum days drag on, gray as the clouds overhead. Read more...

Building a Resilient Network to Defeat Advanced Adversaries

Resiliency – the ability to recover from adversity – is a trait we all admire in our fellow humans, but it also has direct implications for the battlefields of the future. As the military shifts its focus from counterinsurgency wars to peer conflicts, the opportunities for expanding networking reach in the operational theatre are becoming a reality. Read more...

Ultra: Ahead of the Curve on 5G-Compliant Radar Altimetry

If you’ve been following aviation news since 2020, you have probably noticed a battle of sorts has been waging between the FAA and the FCC over the activation of 5G wireless transmitters and its possible interference with radar altimeters (RALTs) on both commercial and military aircraft. The FCC was set to approve the activation of 5G wireless transmitters operating in the C-band in early December 2021. Read more... 

JADC2 Spurs Internet of Military Things Innovation

When we talk about the Internet of Things, we typically think of smart homes and wearable devices. However, with the advent and explosive growth around technologies spurred by the joint all domain command and control (JADC2) initiative comes a new way to apply the IoT to military devices, or IoMT. Read more...

Quantum Computing Cyber Threats: Resistant Algorithms Help Prevent the Most Advanced Attacks

Quantum computing stands at the very forefront of the future of the computing landscape. It has the potential to revolutionize the way militaries encrypt data and communicate. These supercomputer-busters promise a new era in computing, but bad actors are already looking for ways to use this advance for cyber-attacks. Read more...

Sign up for download access

Please submit your details below to access our downloads.

I'm happy for you to contact me

View our privacy policy
Not now