Wednesday, June 6, 2008

Joint Warfighting Conference 08

Last week I attended the Joint Warfighting Conference 08 (JWC 08) in Virginia Beach, Va. There were approximately 5000 attendees representing military, industry, academia, and government, registered for this year’s three-day conference. Titled “DoD Capabilities for the 21st Century,” the goal is to reach out to all joint warfighters. I also followed the proceedings via a live blog provided by Robert Pursell of USJFCOM Public Affairs, from which I took the following comments of note:

Air Force Col. Vincent Valdespino, J6, director, Command, Control, Communications and Computer System Directorate, on future challenges:

“Gen. Mattis has challenged me personally, ‘How do you ensure that that network is available to me and robust enough to become an enabler for me and not a problem for me. To be there when I need it, to be there when I’m out there on the edge, in an AOR, in the high wind, in the high sand of southwest Asia, and that radio, that phone, that cell, that network is going to be there be robust enough for me. How do I know it’s going to be assured, and that the information on it is going to be reliable?’ These are the things that the new boss has laid out that he wants to us to worry about, that’s what I have challenged my J6 staff to take on personally and find out how we can get better at providing these kinds of things. How are we going to do it, for example in a coalition environment, not just a joint environment but a coalition environment, not just a coalition environment but a civil environment.”

Air Force Maj. Gen. David Edgington The Director of the Joint Capabilities Development Directorate (J8) on “Leader-centric, Network-enabled”

The J8 is responsible for taking industry’s ideas and research and then turning them into capabilities to support the joint warfighter. The J8 is involved in joint capability requirements, joint integrated fires, and rapid capability transition.The J8 is responsible most importantly with Command and Control Capability Portfolio Management (C2 CPM).

“Command and control is the one that they issued to USJFCOM,” he said. “When they assigned this they looked at who should support this. It was delegated to the J8. “

“Command and control is a human endeavor, it’s beyond science and is an art. We’re getting away from the term network-centric and working towards leader-centric, network-enabled,” he said. “It’s about the leader telling his subordinate at any level, ‘here are the tools you can use, this is how you’ll do this.'”

Leslie Winters (J8) on Data Strategy:

“What we’re trying to do is get a hand on the portfolio activities and push them towards a C2 goal,”

Winters said her group’s goal is get data and information out to the warfighter. They do this by establishing a management construct, prioritizing the C2 data sharing needs, establishing a C2 data framework, supporting implementation and measuring progress.

“You can’t do C2 without all of this data,” said Winters.

Follow me at


Phone number*
Your Message

Latest posts


2018 AT&T Business Summit: Security “in” and “of” the Cloud

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can...


My Brush with Royalty: Queen Latifah

Queen Latifah! Hip Hop Icon. Movie Star. Television Star. Fashion Model. Songwriter. Producer. Entrepreneurial Genius...


What’s New in Puppet 5?

Puppet 5 is released and comes with several exciting enhancements and features that promise to make configuration man...


5 Reasons Why Ansible is the Best CM Tool Out There?

Amidst volatile markets, dynamic technology shifts, and ever-increasing customer demands, it is imperative for IT org...


Machine learning APIs for Google Cloud Platform

Google Cloud Platform (GCP) is considered to be one of the Big 3 cloud platforms among Microsoft Azure and AWS. GCP i...


What Is The Most Important Part of Architecture?

I always find it interesting to hear what people view architecture as. A lot of people think it’s just about the desi...


Cloud migration best practice Part 4: Executing the migration

This series has stepped through cloud migration best practices. After providing an overview, we discussed: Classifyin...


Cloud Migration Best Practice Part 3: Application Portfolio Analysis

In part three of this series on cloud migration best practice, I will focus on migrating the application itself. If y...


Why Use Immutable Storage?

Data has become a global currency, and its value has nowhere to go but up.  According to The Economist online, the wo...


CLOUD ACT: What Does That Mean for Your Cloud Storage

When Congress names a law after you, it’s getting serious.  That is where we are now with cloud computing.  The Clari...