<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title></title>
	<atom:link href="https://jennink.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://jennink.com</link>
	<description>Writing of Jennifer LeCompte</description>
	<lastBuildDate>Mon, 09 Jun 2025 01:48:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>
	<item>
		<title>“News You Can Use” Office Newsletter</title>
		<link>https://jennink.com/news-you-can-use-office-newsletter/</link>
					<comments>https://jennink.com/news-you-can-use-office-newsletter/#respond</comments>
		
		<dc:creator><![CDATA[clecompte]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 01:48:08 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://jennink.com/?p=41</guid>

					<description><![CDATA[The Justice Security Operations Center (JSOC)&#160;News You Can Use&#160;Newsletter&#160;strives to protect readers again Internet cyber threats by keeping them up-to-date on the latest security issues, vulnerabilities, and computer user tips. The threats we address affect you daily–at work, at home, and virtually everywhere in between–and we provide the information you need to know, in terms...]]></description>
										<content:encoded><![CDATA[
<p>The Justice Security Operations Center (JSOC)&nbsp;<strong><em>News You Can Use</em>&nbsp;Newsletter</strong>&nbsp;strives to protect readers again Internet cyber threats by keeping them up-to-date on the latest security issues, vulnerabilities, and computer user tips. The threats we address affect you daily–at work, at home, and virtually everywhere in between–and we provide the information you need to know, in terms you can understand.</p>



<p><a href="https://web.archive.org/web/20180821163419/http://jennink.com/wp-content/uploads/2018/02/JSOC-NewsYouCanUse_2008-2011.pdf">Download Sample Newsletter (PDF)</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://jennink.com/news-you-can-use-office-newsletter/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>“OCIO FYI” Office Newsletter</title>
		<link>https://jennink.com/ocio-fyi-office-newsletter/</link>
					<comments>https://jennink.com/ocio-fyi-office-newsletter/#respond</comments>
		
		<dc:creator><![CDATA[clecompte]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 01:47:18 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://jennink.com/?p=39</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="688" height="1024" src="https://jennink.com/wp-content/uploads/2025/06/ocio-fyi-688x1024.png" alt="" class="wp-image-40" srcset="https://jennink.com/wp-content/uploads/2025/06/ocio-fyi-688x1024.png 688w, https://jennink.com/wp-content/uploads/2025/06/ocio-fyi-202x300.png 202w, https://jennink.com/wp-content/uploads/2025/06/ocio-fyi-768x1142.png 768w, https://jennink.com/wp-content/uploads/2025/06/ocio-fyi.png 792w" sizes="(max-width: 688px) 100vw, 688px" /></figure>
]]></content:encoded>
					
					<wfw:commentRss>https://jennink.com/ocio-fyi-office-newsletter/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Strategic Communications Plan</title>
		<link>https://jennink.com/strategic-communications-plan/</link>
					<comments>https://jennink.com/strategic-communications-plan/#respond</comments>
		
		<dc:creator><![CDATA[clecompte]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 01:46:35 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://jennink.com/?p=37</guid>

					<description><![CDATA[Introduction The DHS Office of the Chief Information Officer FY 18 Strategic Communications Plan is intended to clearly and succinctly set forth the direction, priorities, and capabilities of the OCIO Strategic Communications Division (“Strat Comm”) for fiscal year 2018. About the Office of the Chief Information Officer OCIO provides the technological support that enables DHS...]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">Introduction</h3>



<p>The DHS Office of the Chief Information Officer FY 18 Strategic Communications Plan is intended to clearly and succinctly set forth the direction, priorities, and capabilities of the OCIO Strategic Communications Division (“Strat Comm”) for fiscal year 2018.</p>



<h3 class="wp-block-heading">About the Office of the Chief Information Officer</h3>



<p>OCIO provides the technological support that enables DHS employees to carry out their work on a daily basis. OCIO is responsible for maintaining a single, DHS-wide IT infrastructure environment that is reliable, scalable, flexible, maintainable, accessible, and secure, ensuring operational excellence – from the workstation to the data center to the mission application.</p>



<h3 class="wp-block-heading">OCIO Strat Comm Role and Goals</h3>



<p>Strat Comm strives to create effective, relevant, engaging, top-quality communications products that reinforce the OCIO and DHS missions, communicate senior leadership priorities and organizational changes, share successes both internally and externally, encourage staff engagement, and support consistent messaging and branding among all OCIO Program Offices.</p>



<h3 class="wp-block-heading">Audience Feedback</h3>



<p>To ensure information is conveyed clearly and effectively, and that Strat Comm adjusts to meet the evolving communications needs of our audience, we conduct an annual OCIO Communications Survey. The survey gives OCIO federal and contractor staff an opportunity to provide anonymous feedback on OCIO communications products and campaigns, and to share ways we can better meet their communications preferences in the future. While the 2017 survey results were extremely positive overall, StratComm has identified several areas of focus for 2018:</p>



<ul class="wp-block-list">
<li>As the OCIO Realignment is finalized, one of our top priorities will be communicating organizational change, and familiarizing staff with new OCIO leadership through leadership profiles and other products.</li>



<li>We will encourage new leadership to communicate more directly with their program offices, as staff have shown a desire to hear more from their immediate office leadership.</li>



<li>StratComm will continue to distribute the Weekly Wrap newsletter each Friday, based on employee preferences for a weekly product, but will scale back the OCIO FYI newsletter to a bi-weekly schedule to prevent duplication and over-messaging.</li>



<li>Based on readers’ interest in OCIO-relevant topics in the news, StratComm will explore options for aggregating pertinent news content and providing to employees on a regular basis.</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://jennink.com/strategic-communications-plan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Physicists Develop Tabletop Particle Accelerator</title>
		<link>https://jennink.com/physicists-develop-tabletop-particle-accelerator/</link>
					<comments>https://jennink.com/physicists-develop-tabletop-particle-accelerator/#respond</comments>
		
		<dc:creator><![CDATA[clecompte]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 01:45:47 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://jennink.com/?p=35</guid>

					<description><![CDATA[Physicists at the University of Texas have managed to not only generate particle energy and speeds previously unknown; they have also reduced the size of the particle accelerator from the length of two football fields to a single inch– a factor of about 10,000. Classified as a “tabletop particle accelerator,” the device is capable of...]]></description>
										<content:encoded><![CDATA[
<p>Physicists at the University of Texas have managed to not only generate particle energy and speeds previously unknown; they have also reduced the size of the particle accelerator from the length of two football fields to a single inch– a factor of about 10,000.</p>



<p>Classified as a “tabletop particle accelerator,” the device is capable of accelerating half a billion electrons to 2 gigaelectronvolts over a distance of about one inch– energy and speed that could previously be generated only in a handful of massive, multi-million dollar facilities.</p>



<p>Mike Downer, professor of physics at the University of Texas’ College of Natural Sciences, headed the research and is confident it will only lead to further innovation and discovery. His results were published this week in the science journal Nature Communications, and represent a massive advance in the accessibility and potential of molecular research. Downer explains that, “The X-rays we’ll be able to produce are of femtosecond duration, which is the time scale on which molecules vibrate and the fastest chemical reactions take place… They will have the energy and brightness to enable us to see, for example, the atomic structure of single protein molecules in a living sample.”</p>



<p>The method the University of Texas physicists utilized appears primitive to the untrained eye; a strong laser (produced by the Texas Petawatt Laser) is simply directed into a brief puff of gas. The laser-plasma acceleration process is much more complex, however: Downer compared it to what would happen if you threw a motorboat into a lake with its engines running. “The boat (the laser) makes a splash, then creates a wave as it moves through the lake at high speed. During that initial splash, some droplets (charged particles) break off, get caught up in the wave and accelerate by surfing on it. At the other end of the lake they get thrown off into the environment at incredibly high speeds. That’s our 2 GeV electron beam.”</p>



<p>According to Downer, no additional, major advances need to be made for the scientific community to benefit from this latest development: “If we can just keep the funding in place for the next few years, all of this is going to happen. Companies are now selling petawatt lasers commercially, and as we get better at doing this, companies will come into being to make 10 GeV accelerator modules. Then the end users, the chemists and biologists, will come in, and that will lead to more innovations and discoveries.” The outlook is certainly bright for physicists eager to observe the atomic structure of matter in closer detail.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jennink.com/physicists-develop-tabletop-particle-accelerator/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cloaked in Mystery: Advances in the Pursuit of Secure Optical Communications</title>
		<link>https://jennink.com/cloaked-in-mystery-advances-in-the-pursuit-of-secure-optical-communications/</link>
					<comments>https://jennink.com/cloaked-in-mystery-advances-in-the-pursuit-of-secure-optical-communications/#respond</comments>
		
		<dc:creator><![CDATA[clecompte]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 01:45:14 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://jennink.com/?p=33</guid>

					<description><![CDATA[In a process that sounds straight out of a science fiction movie, Purdue researchers have made a potentially invaluable advancement in the quest for secure network communications: the ability to completely hide data transmissions over a network for a designated period of time. Aptly named “temporal cloaking,” the technique far surpasses prior attempts at concealing...]]></description>
										<content:encoded><![CDATA[
<p>In a process that sounds straight out of a science fiction movie, Purdue researchers have made a potentially invaluable advancement in the quest for secure network communications: the ability to completely hide data transmissions over a network for a designated period of time. Aptly named “temporal cloaking,” the technique far surpasses prior attempts at concealing data transmissions, and presents exciting possibilities for future secure optical communications.</p>



<p>Previous efforts at cloaking, most notably of which took place at Cornell University back in 2011, used “split time lenses” to conceal data transmission by bending light around an object, thus making it “invisible.” More recently, however, Purdue researchers abandoned efforts to bend light and instead utilized a complex “femtosecond laser” to create interference in optical communications. “The temporal cloak idea is built on the same principles [as bending light], but in this case light waves are pulled apart then compressed to generate time pockets that cloak events” (Whitman, extremetech.com). While they succeeded in achieving an official temporal cloak, the Purdue researchers could only create small “pockets” that concealed data for a tiny fraction of the transmission time available. Not to mention, the femtosecond laser isn’t exactly something you’d find lying around the house.</p>



<p>The researchers again modified their approach and used common devices called “phase modulators” to interfere with the pulses of light that represent ones and zeros in fiber-optic communication. Specifically, the signal is manipulated to “have zero intensity when the data are ‘on,’ cloaking the information. Then the cloak converts the pulses back to a flat signal, hiding the fact that any data were transmitted” (Luken, purdue.edu). Essentially, not only is the content of the data transmission hidden, but there is no evidence that it ever took place.</p>



<p>Purdue University graduate student Joseph Lukens pointed out one of the most appealing aspects of the new phase modulator cloaking procedure: “it does use technology that could integrate smoothly into the existing telecommunications infrastructure” (Venere, purdue.edu). It was built with off-the-shelf components commonly found in commercial optical communications, making it “… a feasible security technology in the long run just by refining our current technology (Knapp, forbes.com).</p>



<p>Having seemingly overcome the two primary problems with past temporal cloaking procedures—the need for readily available materials and the ability to conceal data transmissions for significant periods of time—researchers are closer than ever to achieving practicable, large-scale, secure data communications.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>Sources:</strong></p>



<p><strong>“Take That, NSA – Scientists Hide Communications Using A Hole In Time”</strong><br><strong>“Physicists Create a Hole In Time to Hide Events”</strong><br><em>Alex Knapp, forbes.com</em></p>



<p><strong>“’Temporal cloaking’ could bring more secure optical communications”</strong><br><em>Emil Venere, purdue.edu</em></p>



<p><strong>“A temporal cloak at telecommunication data rate”</strong><br><em>Joseph M. Lukens, Daniel E. Leaird, and Andrew M. Weiner, nature.com</em></p>



<p><strong>“Researchers create temporal cloak that can erase digital data from history”</strong><br><em>Ryan Whitwam, extremetech.com</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://jennink.com/cloaked-in-mystery-advances-in-the-pursuit-of-secure-optical-communications/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Can Surface and Surface Pro Get Microsoft in the Tablet Game?</title>
		<link>https://jennink.com/can-surface-and-surface-pro-get-microsoft-in-the-tablet-game/</link>
					<comments>https://jennink.com/can-surface-and-surface-pro-get-microsoft-in-the-tablet-game/#respond</comments>
		
		<dc:creator><![CDATA[clecompte]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 01:44:07 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://jennink.com/?p=31</guid>

					<description><![CDATA[It appears that Microsoft is taking strategic steps toward creating its own niche in the tablet market. The Microsoft Surface and Surface Pro are tablets with attachable keyboards, designed to bridge the gap between tablets and PCs and meet the needs of users who, in Bill Gates’ estimation, have become “frustrated” with the limitations of...]]></description>
										<content:encoded><![CDATA[
<p>It appears that Microsoft is taking strategic steps toward creating its own niche in the tablet market. The Microsoft Surface and Surface Pro are tablets with attachable keyboards, designed to bridge the gap between tablets and PCs and meet the needs of users who, in Bill Gates’ estimation, have become “frustrated” with the limitations of Apple and Google tablets. “They can’t type. They can’t create documents,” he argues. Wayne Rash of Network World explains, “While the iPad is primarily a content consumption device, the Surface, which comes with Microsoft Office, is also designed for content creation” (Rash, networkworld.com).</p>



<p>The benefit of being late to the tablet game is that Microsoft could identify the deficiencies of other tablets before presenting an alternative. Possibly the first indication of the company’s targeting of the tablet market was the colorful, grid interface of Windows 8, which was clearly designed for use on tablet devices. The Surface comes with a built-in kickstand that is far sturdier than the fold-over Smart Cover of the iPad, and a “Touch Cover,” which is similar to the iPad’s Smart Cover, but has a keyboard printed on it. The Surface is also designed for easy networking; “Where the iPad isolates users from the world of networks, servers and enterprise printers, the Surface works with them seamlessly” (Rash, networkworld.com).</p>



<p>The applications available for Surface, however, are lacking, when compared to Apple’s well-established App Store. The Surface’s screen resolution is also of lower quality than the iPad’s Retina Display. Microsoft may edge ahead, however, thanks to the universal popularity of MS Office. “Microsoft sees this suite of apps as an ace up its sleeve in the war against Apple and Google” (Adrian Kingsley-Hughes, ZDNet.com).</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jennink.com/can-surface-and-surface-pro-get-microsoft-in-the-tablet-game/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>“Giving Thanks in Difficult Times”</title>
		<link>https://jennink.com/giving-thanks-in-difficult-times/</link>
					<comments>https://jennink.com/giving-thanks-in-difficult-times/#respond</comments>
		
		<dc:creator><![CDATA[clecompte]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 01:43:23 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://jennink.com/?p=29</guid>

					<description><![CDATA[This Thanksgiving is different from most others. In just the past couple of weeks, there have been terrorist attacks in Lebanon, France, and Mali that have resulted in the loss of hundreds of innocent lives and stunned and devastated people across the world. As we each acknowledge the blessings the past year has brought, we...]]></description>
										<content:encoded><![CDATA[
<p>This Thanksgiving is different from most others. In just the past couple of weeks, there have been terrorist attacks in Lebanon, France, and Mali that have resulted in the loss of hundreds of innocent lives and stunned and devastated people across the world. As we each acknowledge the blessings the past year has brought, we hope you can take a moment to honor the families who are missing a loved one at their dinner table this holiday season.</p>



<p>It is also our hope that, as members of the Department responsible for ensuring the security of our homeland and all the people within it, your commitment and determination are renewed. The work of OCIO impacts every single employee, office, and component, and Americans are safer because of your efforts. May we each continue to do our part to guarantee many happy, safe Thanksgivings to come.</p>



<p>Please keep those affected by the recent attacks in your thoughts and prayers this Thanksgiving. As always, thank you for everything you do to help OCIO carry out our Department’s critical mission.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jennink.com/giving-thanks-in-difficult-times/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>“Improve Your Cyber Posture”</title>
		<link>https://jennink.com/improve-your-cyber-posture/</link>
					<comments>https://jennink.com/improve-your-cyber-posture/#respond</comments>
		
		<dc:creator><![CDATA[clecompte]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 01:42:34 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://jennink.com/?p=27</guid>

					<description><![CDATA[Improve Your Cyber Posture: Beware of Online Shopping and “Cyber Monday” Scams The holiday season is upon us, and with it come celebrations and gift-giving. An increasing number of consumers are conducting their holiday shopping online. You have probably heard of “Cyber Monday,” a marketing term for the Monday following Thanksgiving, when many online retailers...]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">Improve Your Cyber Posture: Beware of Online Shopping and “Cyber Monday” Scams</h3>



<p>The holiday season is upon us, and with it come celebrations and gift-giving. An increasing number of consumers are conducting their holiday shopping online. You have probably heard of “Cyber Monday,” a marketing term for the Monday following Thanksgiving, when many online retailers offer discounts and promotions to shoppers.<br>While online shopping offers increased convenience, it also provides opportunities for scammers to target consumers through fake websites, phony offers, and malicious apps. Ensure you have a safe and secure holiday shopping experience by following the tips below.</p>



<p><strong>Improve your cyber posture and avoid online shopping scams by:</strong></p>



<ul class="wp-block-list">
<li><strong>Remembering to hover over hyperlinks and think before you click.</strong> A common phishing tactic during the holidays is a phony email saying an order has shipped, with links like “Click here for expected delivery date” or prompts for your login and password to a particular website.</li>



<li><strong>Avoiding making purchases over public Wi-Fi.</strong> Use your cellular data for financial transactions instead.</li>



<li><strong>Using your credit card rather than your debit card for online purchases.</strong> Credit cards offer more consumer protections if your card is compromised and will not impact your checking account like a debit card. Continue to monitor your credit card and bank statements regularly to detect any fraudulent activity that might go unnoticed.</li>



<li><strong>Choosing encrypted shopping websites for safer transactions.</strong> There are two ways to tell if a site uses encryption: a closed padlock icon in the status bar at the bottom of your browser window or at the top of the browser window, or a website address that begins with “https:” rather than just “http:”.</li>



<li><strong>Heeding “certificate error” messages.</strong> If you receive a notice that says “certificate error,” examine who issued the certificate, ensure the name matches the site you are visiting, and ensure the certificate has not expired.</li>



<li><strong>Downloading vetted apps.</strong> Never install software outside of your phone’s designated app store, and only use trusted vendor apps when shopping from your phone.</li>



<li><strong>Creating strong passwords.</strong> Avoid using the same password for your online accounts; otherwise, one compromised account can translate to multiple compromised accounts.</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://jennink.com/improve-your-cyber-posture/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>VR and AI Open New Possibilities for Military Training</title>
		<link>https://jennink.com/vr-and-ai-open-new-possibilities-for-military-training/</link>
					<comments>https://jennink.com/vr-and-ai-open-new-possibilities-for-military-training/#respond</comments>
		
		<dc:creator><![CDATA[clecompte]]></dc:creator>
		<pubDate>Sun, 08 Jun 2025 23:54:45 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://jennink.com/?p=24</guid>

					<description><![CDATA[It’s no secret that technology has changed the way wars are fought: unmanned aerial vehicles, laser-guided weapons, and military robotics are hallmarks of modern warfare. These advanced technologies, however, are only as good as the highly trained soldiers operating them. Fortunately, military training is also embracing technology, advancing far beyond the 500-page manuals and classroom...]]></description>
										<content:encoded><![CDATA[
<p>It’s no secret that technology has changed the way wars are fought: unmanned aerial vehicles, laser-guided weapons, and military robotics are hallmarks of modern warfare. These advanced technologies, however, are only as good as the highly trained soldiers operating them. Fortunately, military training is also embracing technology, advancing far beyond the 500-page manuals and classroom instruction of the past. Indeed, some training technologies for today’s recruits evoke the futuristic sci-fi scenarios of&nbsp;<a href="https://web.archive.org/web/20180821183157/https://www.netflix.com/title/70264888">Netflix’s popular series Black Mirror</a>. Not only are these once far-fetched technologies currently in use; they are revolutionizing the way we train our military personnel and enabling a more realistic, safe, and effective training experience.</p>



<p>Up until 1992, U.S. Naval submariners practiced escaping from sinking vessels using&nbsp;<a href="https://web.archive.org/web/20180821183157/https://www.cnic.navy.mil/regions/cnrma/installations/navsubbase_new_london/about/history.html">the Submarine Escape Training Tank</a>, immersing themselves in a 100-foot tower full of water. While submarine training has evolved to incorporate nuclear technologies and the changing landscape of naval warfare, recent advances in virtual reality (VR) training make former methods look outright primitive in comparison. For instance, defense contractor&nbsp;<a href="https://web.archive.org/web/20180821183157/https://www.defensenews.com/digital-show-dailies/itsec/2017/12/05/booz-allen-artificial-intelligence-transforming-immersive-training/">Booz Allen is working on an immersive training experience called OceanLens</a>, which accurately maps the ocean floor for submarine captains-in-training. Rather than viewing a sample ocean floor generated by a graphic designer, submariners will be able to train in a topographically accurate setting that better prepares them for what they’ll face in actual underwater combat situations.</p>



<p>These virtual reality programs aren’t generating animated, cartoon-like environments; rather, the setting is so realistic that the majority of&nbsp;<a href="https://web.archive.org/web/20180821183157/https://www.defensenews.com/digital-show-dailies/itsec/2017/12/05/booz-allen-artificial-intelligence-transforming-immersive-training/">trainees using a VR flight simulator</a>&nbsp;refused to step out of the “plane,” despite knowing they had stepped into a faux cockpit minutes earlier. And that realism is key in military training that, if conducted incorrectly, could cause significant harm or trauma to soldiers. Current&nbsp;<a href="https://web.archive.org/web/20180821183157/http://parasim.com/">parachute jumper simulations</a>&nbsp;can create a real-time picture of a landing zone, but keep trainees’ feet on the ground until they are comfortable planning missions and taking jumps via virtual reality. In addition to heightened safety, this also translates into a higher pass rate on actual first-time parachute jumps.</p>



<p>New training technologies could also represent significant cost savings for the military. Artificial Intelligence (AI)—software that can learn with use—<a href="https://web.archive.org/web/20180821183157/https://www.rand.org/blog/2017/09/artificial-intelligence-and-the-military.html">can adapt over the course of a training program</a>&nbsp;to create new challenges for trainees, rather than requiring an update or replacement. As AI software adjusts to trainees’ skill levels, fighter pilots can learn to face increasingly skilled adversaries, and weapons mechanics can repair more complex malfunctions—all without investing in additional software.</p>



<p>Ultimately, the measure of any training method is its effectiveness. The tech-savvy, millennial-aged recruits entering today’s military are accustomed to virtual experiences and are particularly receptive to AI and VR training. Evidence is on their side:&nbsp;<a href="https://web.archive.org/web/20180821183157/https://trainingindustry.com/articles/learning-technologies/virtual-reality-and-training-the-millennial/">students undergoing virtual training consistently outperform those who are taught in a traditional lecture format</a>. And, for those signing up to make lethal force decisions and risk their lives for their country, training in lifelike scenarios through AI and VR may be their best defense.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jennink.com/vr-and-ai-open-new-possibilities-for-military-training/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
