"Power to the Edge articulates the principles being used to provide the wideband network that people will trust, populate with information, and use to share awareness, collaborate effectively, and synchronize their actions. " --CCRP
"This book is truly a must-read for anyone interested in decentralization and the social and organizational relevance of shifting power to the edge, whether in a commercial or a defense context." – Ray Ozzie, Chief Software Architect, Microsoft
The U.S. experience shows that traditional C2 approaches, and doctrine are not well suited for peace operations. This book examines alternative command arrangements, and describes the attributes of effective arrangements. David S. Alberts and Richard E. Hayes | 1995
This report documents a workshop organized by the INSS, which sought to determine what technologies are required for OOTW. The group examined the complexities of introducing relevant technologies. CACT | 1995
Unauthorized Progress is the catch phrase of Geoff Abbott, Matt Kern, Stephen Hoogasian, Chris Kluckuhn & company.