China’s C919 passenger jet successfully completes maiden flight (YouTube)

Publicités

6 commentaires

  1. L’article du Washington Times qui vaut son pesant de cacahuetes :

    Chinese supercomputers threaten U.S. security

    http://www.washingtontimes.com/news/2017/may/3/china-supercomputers-threaten-us-security/

    By Bill Gertz – – Wednesday, May 3, 2017
    China is eclipsing the United States in developing high-speed supercomputers used to build advanced weapons, and the loss of American leadership in the field poses a threat to U.S. national security.
    That’s the conclusion of a recent joint National Security Agency-Energy Department study, based on an assessment of China’s new supercomputer called the TaihuLight.
    “National security requires the best computing available, and loss of leadership in [high-performance computing] will severely compromise our national security,” the report warns.
    Supercomputers play a “vital role” in the design, development and analysis of almost all modern weapons systems, including nuclear weapons, cyberwarfare capabilities, ships, aircraft, communications security, missile defense, precision-strike capabilities and hypersonic weapons, the report said.
    China is rapidly developing hypersonic strike missiles that can deliver conventional and nuclear payloads by maneuvering past advanced missile defenses.
    “Loss of leadership in [high-performance computing] could significantly reduce the U.S. nuclear deterrence and the sophistication of our future weapons systems,” the report says.

    “Conversely, if China fields a weapons system with new capabilities based on superior [high-performance computing], and the U.S. cannot accurately estimate its true capabilities, there is a serious possibility of over- or underestimating the threat.”
    A copy of the 18-page report, “U.S. Leadership in High Performance Computing (HPC): A Report from the NSA-DOE Technical Meeting on High Performance Computing,” dated Dec. 1, has been obtained by Inside the Ring.
    Chinese supremacy in computer capabilities also could produce distortions in allocating defense funds for U.S. research and development, and strategic policymaking and result in “incorrect responses to world events,” the report said.
    Currently, the United States has a cost-effective supercomputer capability. But loss of U.S. leadership in the field would result in acquisition of supercomputers in ways similar to Pentagon acquisition of aircraft carriers — at vastly increased costs.
    For industrial applications, if the United States were to become reliant on Chinese supercomputers, it “could threaten the loss of intellectual property and competitive edge.”
    “Personal email and private information, social networks and the emerging Internet of Things are all subject to even greater privacy risks if offshore entities have superior HPC analytics or control the data/information markets,” the report said.
    The report called for a surge in U.S. government investment and action in supercomputing, including the priorities outlined in the 2016 National Strategic Computing Initiative Plan.
    Energy Department national laboratories and the Intelligence Advanced Research Projects Activity are working on cutting-edge supercomputers.
    The study was based on a two-day conference in September of some 60 experts, including 40 from U.S. government agencies, 10 from the technology industry and 10 from academia and other organizations.

    PENTAGON LATE WITH HYBRID WARFARE STUDY
    The Pentagon is two years late in supplying Congress with a study on new strategies for countering unconventional warfare threats posed by Russia, China, Iran and North Korea.
    Rep. Elise M. Stefanik, chairwoman of the House Armed Services subcommittee on emerging threats, pressed a senior Pentagon official on the subject during a hearing Tuesday. The study was required in 2015 legislation.
    “This strategy, which is now almost two years late, ultimately can help provide a way to ensure that our ends, ways and means are aligned to help counter these unconventional threats,” said Ms. Stefanik, New York Republican.
    Unconventional warfare is the use of nonkinetic warfare capabilities ranging from cyber and electronic attacks to “influence operations” using political, media and legal means.
    In response, Theresa Whelan, assistant defense secretary for special operations and low-intensity conflict, said unconventional warfare is an emerging threat and the Pentagon is studying the issue. Ms. Whelan noted that the military’s counterterrorism mission has been the main focus of low-intensity conflict.
    “We have, as a consequence, had to shift resources to focus on this and develop capabilities and knowledge bases that had, to certain extent, atrophied over the years,” she said.
    “But also, because the nature of UW has fundamentally changed because of 21st-century technologies and techniques, we really in many ways have been starting from scratch. And that has been one of the challenges that we’ve faced as we dug into this over the last 18 to 24 months.”
    Russia used hybrid warfare to take over Ukraine’s Crimean Peninsula in 2014 and its cyber-enabled influence operation targeting the 2016 U.S. presidential election. China has been using similar information operations in its bid to gradually take control of the South China Sea.
    Examples of Iranian information operations have included cyberattacks on U.S. banks and a waterway control system in upstate New York.
    North Korea has used extensive cyberattacks to achieve objectives — including the cyberattack on Sony Picture Entertainment and cyberattacks on banks in Asia that netted the regime in Pyongyang tens of million of dollars.
    The Pentagon is working with other U.S. government agencies to deal with what Ms. Whalen called “multiple threats” from foreign information operations.
    Georgetown University has conducted a study for the Pentagon that found that America’s adversaries are “focusing on the seams between our organizational entities and trying to exploit those seams and decision-making cycles in order to gain advantage on us in the space that essentially is below conventional war — the space that we now refer to as the gray zone or hybrid warfare,” Ms. Whalen said.
    Two research projects are underway on the topic of unconventional warfare, one at Johns Hopkins University on Russian hybrid warfare, and a Pentagon research effort to develop predictive analytic technologies.
    The technologies “will help us identify when countries are utilizing unconventional warfare techniques at levels essentially below our normal observation thresholds,” Ms. Whalen said.
    After the Russia unconventional warfare strategy is completed, the Pentagon will look at Chinese and Iranian unconventional warfare threats, she added. “This continues to be an evolving threat.”
    REPORT CALLS FOR DEFEATING JIHADIS ONLINE
    The global Islamic terrorist movement could not function without the internet and defeating terrorism online is possible, according to a report by the Middle East Research Institute (MEMRI).
    “Jihadi organizations used the web to recruit supporters and fighters, provide practical instruction and manuals for terror operations including car bomb and ramming attacks, make arch-terrorists into heroic models for emulation, and raise funds for their activity,” the report says. “The internet provided them with an ideal vehicle for spreading their ideas, even to young children.”
    Recently, social media companies have begun to lose advertising revenue as a result of hateful content on their sites. Companies including Johnson & Johnson, Toyota, General Motors, Wal-Mart, AT&T and HSBC have pulled ads to protest terrorist videos, the report said.
    Governments also are pressuring media to remove hateful speech, and families have begun to sue internet companies for carrying content that incited and radicalized terrorists who killed relatives.
    The MEMRI report said the measures are good first steps but that more needs to be done. The internet should be purged of jihadi propaganda and incitement content through financial investments, and new technologies could identify and remove jihadi material.
    “Purging the internet of jihadi content can deal with terrorism at its source, and can have an immediate impact on recruitment, indoctrination and training of terrorists,” the report said. “This will significantly reduce the threat which will, in turn, enable Western democracies to reduce the degree of infringement upon our liberties, freedoms and daily life.”
    • Contact Bill Gertz on Twitter at @BillGertz.

    Aimé par 2 people

  2. Il y a quelques mois je vous faisais echo d’une nouvelle qui allait durablement bouleverser les équilibres géostratégiques dans les années à venir. Le fait que la Chine se classe numéro 1 dans le TOP500.
    https://www.top500.org/site/50623
    Grace à un processeur 100% chinois 3 fois plus rapide que l’américain, la Chine avait mis fin à presque 1 siècle de suprematie sans partage du monde occidentale -Occident ne veut pas dire européens, et américains necessairement. Il y inclut tous les régimes pro US – dans ses technologies de pointe. Mieux la RPC grace à une puissance financière sans égale à non seuleument rattrapé l’Ouest, mais l’a dépassé, ce qui aura pour conséquences de grands bouleversements dans les années à venir. C’est peut être ce qui explique l’attitude extremement nerveuse des dirigeants US actuellement.

    En témoigne cet article du Washington Times et de son -prétendu- « spécialiste » Bill Gertz. Par delà le personnage, il transpire au travers de cet article les réelles inquiétudes de l’état major US face à la montée en puissance du tandem Russie et Chine.
    http://www.washingtontimes.com/news/2017/may/3/china-supercomputers-threaten-us-security/

    Notamment quand il dit
    « China is eclipsing the United States in developing high-speed supercomputers used to build advanced weapons, and the loss of American leadership in the field poses a threat to U.S. national security. »

    Il faut savoir lire entre les lignes, parce que l’auteur ne fait que retranscrire les indiscrétions le dessaroi des hauts responsables militaires. Bien evidemment ils ne vont pas tout dire, vous imaginez aisemenet les conséquences politiques que ça impliquerait, mais il y transpire une atmosphere d’angoisse. Là où ça devient croustillant c’est ce passage :
    « …..Supercomputers play a vital role in the design, development and analysis of almost all modern weapons systems,  »
    qui expose trés clairement la vision du complexe militaro industriel, et surtout le fait est qu’en perdant la suprematie dans ce secteur, les armes occidentales sont de-facto obsolètes. Qu’une guerre n’aura d’autres issues que l’humiliation des Etats Unis.

    En réalité les choses sont et de loin beaucoup plus graves. Toute la doctrine occidentale d’usage de la force se retrouve complètement dépassée. Elle repose principalement les porte avions où l’Amérique a considérablement investis.
    Meme si les menaces contre ne cessent de s’accroitre


    et

    En témoigne ce nouveaux mini missiles de croisières, petits, volant à 50 cm -soit 500 milimetres- au dessus du niveau de la mer, les arreter sera extrement difficles.
    Sans compter les ssnx-26 Srobile alias « Yakhont ».

    Alors que le complexe militaro industriel a misé sur l’aéronavale et ses 14 porte avions, à cela il faut ajouter 700 bases dans plus de 80 pays à travers le monde. De leur coté, les chinois et russes ont patiemment mis en place un système privilégiant la supériorité dans l’espace, les télécomunications, des armes lasers -dont nous ne savons rien-, ainsi que des super calculateurs. Et ce pari semble gagnant, en ce sens que la puissance US se retrouve de facto impuissante. Si en plus on ajoute à tout cela la sortie et la production en série des SU-35, Mig-35, SU-50, J-20, J-31 et le dernier J-11D la supériorité aérienne -certes bien réelle acutellement, mais uniquement du au nombre et non à la qualité- virtuelle des Etats Unis se réduit jour aprés jour comme peau de chagrin. A l’horizon de 2020 elle n’existera plus, et on peut dire qu’aujourd’hui elle n’est pas suffisante pour assurer un avantage significatif en cas de conflit.

    L’Asie est entrain de devenir le premier pole compétitivité, et d’innonvations dans le monde aux dpéens de l’occident. Dans ce contexte la chute des dominions occidentaux que sont Israèl, Taiwan, la Corée du Sud, la Colombie, Singapour, les pseudo états dits baltes, n’est qu’une question de temps.

    Aimé par 2 people

  3. Je m’appretais à suggerer ce lien, quand le chef de service est venu à moi, pour régler un problème sur notre DB. 😦
    En effet la Chine a fait voler son premier moyen courrier, cependant incomplets, parce qu’il est motorisé par des pw1000G de Pratt&Whitney donc US. Le moteur qui devra propulser le C-919 est le WS-15 le meme qui est prévu pour le J-20 chasseur bombardier chinois. Le moteur est en phase de test final. Pour essayer de pénétrer les marchés occidentaux, les chinois ont opté pour le moteur US, tout en testant la cellule. A ne pas douter, cet avion mettra fin au monopole de Boeing et Airbus. Ce que beaucoup de gens oublient, c’est le fait que ce monopole n’a commencé qu’à partir de 1991, date de l’éffondrement de l’URSS. A l’époque les avions illyouchine, et Tupolev étaient trés appréciés. Il est juste qu’aprés 20 ans les choses se réequilibrent. La Russie ne devrait pas tarder à faire voler son MS-21, alias Yak-242.

    Aimé par 2 people

    1. pénétrer le marché américain risque d’être très très difficile .
      je pencherais plutôt pour une conquête indirecte notamment par l’intermédiaire de quatar airways qui a un gros appétit et de grosses subventions !

      J'aime

  4. Quand la vidéo a commencé, j’ai été frappé par sa ressemblance avec l’A320. J’espère qu’ils n’ont pas trop copié de façon visible au risque de tomber dans la contrefaçon. Au niveau tribunaux et violation de brevets, ça risquerait de faire désordre.

    Aimé par 1 personne

Vos Réactions (Vous êtes totalement libres de vous exprimer mais les attaques ad hominem sont proscrites)

Entrez vos coordonnées ci-dessous ou cliquez sur une icône pour vous connecter:

Logo WordPress.com

Vous commentez à l'aide de votre compte WordPress.com. Déconnexion / Changer )

Image Twitter

Vous commentez à l'aide de votre compte Twitter. Déconnexion / Changer )

Photo Facebook

Vous commentez à l'aide de votre compte Facebook. Déconnexion / Changer )

Photo Google+

Vous commentez à l'aide de votre compte Google+. Déconnexion / Changer )

Connexion à %s