Unauthorized Progress

Leading From The Middle

Home

Buy the Book

Enterprise Architecture

A Civil Command Grid

Cursor On Target

Geospatial Routing

Power to the Edge

Downloads

eBook

EADB

Z-Matrix Editor

Search Engines

News Websites

Discussion

Power to the Edge
"Power to the Edge articulates the principles being used to provide the wideband network that people will trust, populate with information,  and use to share awareness, collaborate effectively, and synchronize their actions. "  --CCRP
 
"This book is truly a must-read for anyone interested in decentralization and the social and organizational relevance of shifting power to the edge, whether in a commercial or a defense context." – Ray Ozzie, Chief Software Architect, Microsoft

Document Library

NameDescription
DocumentPower to the EdgeCommand and Control in the Information Age
DocumentCommand Arrangements for Peace Operations The U.S. experience shows that traditional C2 approaches, and doctrine are not well suited for peace operations. This book examines alternative command arrangements, and describes the attributes of effective arrangements. David S. Alberts and Richard E. Hayes | 1995
DocumentOperations Other Than WarThis report documents a workshop organized by the INSS, which sought to determine what technologies are required for OOTW. The group examined the complexities of introducing relevant technologies. CACT | 1995
Unauthorized Progress is the catch phrase of Geoff Abbott, Matt Kern, Stephen Hoogasian, Chris Kluckuhn & company.

Web Hosting powered by Network Solutions®