Skip to main content

Currently Skimming:

4 Implications of Changes in the Global Advanced Computing Landscape for U.S. National Security
Pages 49-54

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 49...
... The inability of innovation and to the marketplace for computing and defense software to make this transition faster than information technology. Intensifying competition will competitors in the global market or our potential affect the global supply chain and reshape the numbers adversaries has significant implications for U.S.
From page 50...
... Given the dramatic even if resources were plentiful, it would not be possible shift to multicore chips and explicit parallelism, defense to simply buy or make appropriately targeted ICT will need to transition to tools, techniques, and investments that would result in continuing exponential processes that can meet defense needs through effective speed-ups for single-core processors. An additional use of new parallel software models and emerging matter of physics is the power constraints that are driving hardware approaches.
From page 51...
... In addition to challenges related to integrity and The convergence of civilian and defense security, the global interdependence of design, technologies is accelerating, driven by rapid and costcomponent fabrication, and assembly means that risks of effective technological progress in a highly competitive disruption due to natural disasters, political conflict, or commercial marketplace, especially as compared with constrained access to raw materials become greater. A the often lengthy and rigid procurement processes in the single event, such as the March 2011 earthquake-tsunami defense sector.
From page 52...
... and groups may circumvent best policies and practices in More generally, low-power designs, based on system security and information flow in order to access licensable components and created by semiconductor improvements in functionality.12 In addition, the proliferation of mobile devices with personally 9 identifiable data and institutional data brings information A 2009 NRC report, Achieving Effective Acquisition of Infor- leakage risks due to the possibilities of device loss and mation Technology in the Department of Defense calls for the DOD to acquire information technology systems using a funda theft. mentally different acquisition process based on iterative, incremental development practices.
From page 53...
... The availability of manufactured consumer devices contributes to increased trained and talented researchers and developers, risk of data and software security breaches and makes particularly in parallel computing, will also affect these clean separation of functions -- a traditional tenet of good placements, as today's devices are dependent on parallel security -- ever more difficult. The globalization of this applications and system software to meet performance software development, as well as state-sponsored cyberand functional targets.
From page 54...
... Barring concerted action involving major The slowdown in the growth of single-processor technology breakthroughs and a major shift in U.S. computing performance described in Chapter 1 brought industrial competitive policy, this accelerating an end to the virtuous cycle of ever-faster sequential innovation shift may open the door to a latecomer processors coupled with increasingly feature-rich innovation advantage (discussed in Chapter 3)


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.