Dino Mavrookas
๐ค SpeakerAppearances Over Time
Podcast Appearances
So all of these things come into play when you're saying, OK, how should we really think about autonomy? And even man out of the loop autonomy, you're still saying, OK, this boat's going to go in the water. It's going to patrol this area. And if this type of threat comes in, then you have authority to execute. And you're just giving the approvals all the way through the end of the kill chain.
So that's all man out of the loop is. You're basically just approving the entire kill chain at the beginning of the mission.
So that's all man out of the loop is. You're basically just approving the entire kill chain at the beginning of the mission.
So that's all man out of the loop is. You're basically just approving the entire kill chain at the beginning of the mission.
Look, I understand the need to have the approval process baked in. But when you get into comm, I mean, you've watched ISR feeds. You've seen how crappy they are. You've seen what kind of like smokes. Do I want like the most advanced computer vision in the world that's living on the edge saying, yes, that's the right target? Or do I want a human that's watching a game
Look, I understand the need to have the approval process baked in. But when you get into comm, I mean, you've watched ISR feeds. You've seen how crappy they are. You've seen what kind of like smokes. Do I want like the most advanced computer vision in the world that's living on the edge saying, yes, that's the right target? Or do I want a human that's watching a game
Look, I understand the need to have the approval process baked in. But when you get into comm, I mean, you've watched ISR feeds. You've seen how crappy they are. You've seen what kind of like smokes. Do I want like the most advanced computer vision in the world that's living on the edge saying, yes, that's the right target? Or do I want a human that's watching a game
the worst bandwidth video feed that you can ever imagine with smoke and everything else around it, trying to say, yeah, I think it's the target. I mean, it's something we're gonna have to get comfortable with over time, but again, it's not, oh, we're just employing robots and robots are making the decisions on warfare, right?
the worst bandwidth video feed that you can ever imagine with smoke and everything else around it, trying to say, yeah, I think it's the target. I mean, it's something we're gonna have to get comfortable with over time, but again, it's not, oh, we're just employing robots and robots are making the decisions on warfare, right?
the worst bandwidth video feed that you can ever imagine with smoke and everything else around it, trying to say, yeah, I think it's the target. I mean, it's something we're gonna have to get comfortable with over time, but again, it's not, oh, we're just employing robots and robots are making the decisions on warfare, right?
Those are the types of autonomy and that's how they're employed on the battlefield.
Those are the types of autonomy and that's how they're employed on the battlefield.
Those are the types of autonomy and that's how they're employed on the battlefield.
You really can't. We're focused on cybersecurity. We use military-grade encryption. When you're operating in the military domain, you have to operate with the cybersecurity protocols of the United States government. So those are standard. Those are just, you have to have them, otherwise you're not being utilized in the field. So that is something we take very, very seriously.
You really can't. We're focused on cybersecurity. We use military-grade encryption. When you're operating in the military domain, you have to operate with the cybersecurity protocols of the United States government. So those are standard. Those are just, you have to have them, otherwise you're not being utilized in the field. So that is something we take very, very seriously.
You really can't. We're focused on cybersecurity. We use military-grade encryption. When you're operating in the military domain, you have to operate with the cybersecurity protocols of the United States government. So those are standard. Those are just, you have to have them, otherwise you're not being utilized in the field. So that is something we take very, very seriously.
We even take the cybersecurity of our company very seriously because Let's be clear, China as a nation state, they've been hacking into companies to steal secrets for years. That's a well-known fact.
We even take the cybersecurity of our company very seriously because Let's be clear, China as a nation state, they've been hacking into companies to steal secrets for years. That's a well-known fact.
We even take the cybersecurity of our company very seriously because Let's be clear, China as a nation state, they've been hacking into companies to steal secrets for years. That's a well-known fact.
So we have to think about not just how do we protect our solution, our products in the water, and we talk about how we do that with government standards and encryption and everything else, but how do we protect the company? The Chinese aren't, I mean, I hate to use this term, but they're not fighting fairly. And there's no such thing as a fair fight. You know that.