Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
IT in the Military
Transcript of IT in the Military
in the Military Stacey Demchenko, Yuliya Len, Lauren Gallimore, Josh Bodnaruk, Carla Hornecker Weaponry The Evolution of IT in the Military Military IT in the Future Biometrics
Cognitive Technology Threat Warning System Intelligence Gathering ECHELON Intercept and monitor phone calls, emails, texts and faxes from:
People in foreign countries
Keywords are used to filter the messages and flag possible threats Prior to technology, infantry and cavalry were the core of military action. -Network Enabled Weapons (NEW):
-Radar-guided AMRAAM and Sidewinder missles -Paveway bomb series -Standoff Land-Attack Missile Extended range (SLAM-ER) -Precision Instrument Network Propelled Ordinance-Interchangeable (PIN POINT) Technology of the Future: IT in the Military Army Knowledge Online (AKO) Designed using an open-source platform with standard internet protocols
Enterprise-wide collaboration tool