Acquisition Talk

A daily blog on weapon systems acquisition

  • Home
  • Blog Posts
  • Podcast
  • PPBE Reform
  • About
  • Resources
    • Reading List
    • Links
    • Papers
    • Top Posts
    • AFWERX data
  • Contact

kill chain

What is portfolio management and how can it speed up defense tech insertion

December 16, 2022 Eric Lofgren 2

Jerry McGinn and I joined Vago Muradian on the Defense and Aerospace report to discuss our recent webinar event with James Ruocco, Katie Wheelbarger, and […]

Share this:

  • Print
  • Facebook
  • LinkedIn
  • Reddit
  • Twitter

A federated approach to JADC2 is the only way to field interoperability before 2027

November 25, 2022 Eric Lofgren 0

Jerry McGinn and I joined Vago Muradian on the Defense & Aerospace report to discuss our recent paper on Execution Flexibility and Bridging the Valley […]

Share this:

  • Print
  • Facebook
  • LinkedIn
  • Reddit
  • Twitter

What is the difference between JADC2 and Mosaic Warfare?

January 22, 2021 Eric Lofgren 0

I would argue that JADC2 is about giving the warfighter more options. What we’re trying to do with mosaic is do that with speed. The […]

Share this:

  • Print
  • Facebook
  • LinkedIn
  • Reddit
  • Twitter

Kill chains vs. kill webs

October 20, 2020 Eric Lofgren 2

Software-defined tactics are the key to quickly adding capabilities to different assets that are supposed to work together. It’s kill chain vs kill web for […]

Share this:

  • Print
  • Facebook
  • LinkedIn
  • Reddit
  • Twitter

Real time cross-domain kill webs — ACK and STITCHES

September 29, 2020 Eric Lofgren 0

Two DARPA-developed technologies – a novel decision aid for mission commanders and a rapid software integration tool – played a critical role in the recent […]

Share this:

  • Print
  • Facebook
  • LinkedIn
  • Reddit
  • Twitter

Get posts by email

Search

Featured

  • Acquisition headlines
  • STITCHES is getting stymied by the acquisition process
  • Acquisition headlines
  • Contract challenges for modular open systems
  • The role of blockchain in military cybersecurity
  • OTAs twice as big as SBIRs, but how are they being used?
  • How McNamara’s top-down structure was flipped, but equally insidious forces prevailed

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

RSS Error: WP HTTP Error: A valid URL was not provided.

Copyright © 2025 | WordPress Theme by MH Themes