… suite of Australian Defence Force Warfare Training Centre (ADFWTC) … see benefits in reducing time away from home and tempo, whilst … can take in content at a considerably faster pace. The 87 periods …
With, By, and Through – Instructing at a Foreign Military Academy
… practical cooperation and interoperability between our defence … commonly referred to as Akmil, was chosen as the venue for … As a first-year captain, I was approached by my CO and career …
How Emerging Technologies Challenge Land Forces’ Component’s Operational Capabilities
… technologies have expanded our ways of using data innovatively … made access to the same data vulnerable to theft. [3] That said, … yet they remain vulnerable towards cyber threats. In 2014, a …
… It delivers a topic in a way I remember well from recruit training: if you want to implement an idea into the … 2500 businesses to create measurable data of …
Effects–Centric Warfare: Across the spectrum of conflict
… this year I attended the Joint Warfighting Assessment 2019 (JWA19), a Command Post Exercise … was to improve coalition interoperability and test a number of …
Activate Your MINDS: Logistic Actions and Insights from the NQLD warfighter
… acronym MINDS – mobile, interoperable, networked, dispersed and … of problems in focus for the 2025 warfighter series. This article is … (see the NQLD WFX Storyboard). It was the first regional warfighter …
… highlights the populations’ vulnerability to the disease when … plan? Health planning should always be SMART, which is a mnemonic … for 300 million deaths globally, was achieved with small groups of …
Daring, Persistent, and Adaptive: Achieving Depth With Robotic and Autonomous Systems
… since the end of the Second World War, Australia’s Government … requirements. Looking forward, ADF force designers and … hardening to reduce their vulnerability to enemy effects. Over …
Power Management and Silent Watch – Challenges and Opportunities for the Digitised Force
… processing, enhanced situational awareness and enabled application … gunline unable to maintain silent watch for a useful duration becomes vulnerable to location and …