See what makes Kong the fastest, most-adopted API gateway
Check out the latest Kong feature releases and updates
Single platform for SaaS end-to-end connectivity
Enterprise service mesh based on Kuma and Envoy
Collaborative API design platform
How to Scale High-Performance APIs and Microservices
Call for speakers & sponsors, Kong API Summit 2023!
3 MIN READ
In Part 1 of this blog series, I broke down the “two generals problem” and shared how it affects IT leaders today. In this post, I will share the details of a specific battle from more modern history that exemplifies this concept.
“Yeah, this cloud K8s, containers, CI/CD thing is just a fad. We’ll do it how we always have. It works, and if it ain’t broke, don’t fix it.” -Mr. Laggard To-Be-Fired DeJour
Between 1967 and 1973, the Middle East saw some intense conflict between Israel, Egypt, Syria and a few other countries. Growing up, I would hear stories from my uncles in the various branches of the Egyptian Armed Forces.
The late General Saad el-Shazly, chief of staff of the Egyptian Armed Forces during the Yom Kippur War and former Commander of the Egyptian Special Forces, discussed in a series of interviews (they are in Arabic) the technological superiority of the IDF and how he attempted to nullify them.
Here is one that stood out: The Egyptian Air Force at the time was effectively running a monolith. Given the lack of sufficient Egyptian pilots, there was a strong centralization of the Airforce’s capabilities. In contrast, the IDF had decentralized control over their air fighting capacity.
el-Shazly said that Egyptian forces often encounter their Isreali counterparts and are shocked to see Israeli air cover arrive in a few minutes. Israel could do this due to the decentralization of their approach.
It was not just this advantage that Israel enjoyed, their military doctrine was simply more dynamic; they were agile. While the Egyptians orchestrated and executed a successful start of the war with the crossing of the Suez, they did not do as well later on.
This was partly due to el-Shazly being micromanaged by his leadership in the form of Anwar Sadat and Ahmad Ismail Ali. Their decisions, overriding el-Shazly, proved to be disadvantageous. I heard stories from uncles about how a few blunders were exploited with negative consequences for the Egyptians.
Aside from the 24-hour air bridge the USA operated for Israel, delivering ~4x tonne-mile of materiale vs. what the Soviet Union supplied Egypt during the war, and the mighty SR-71 Blackbird giving valuable intelligence, it was still up to the IDF to make use of this information and high-tech goodies. They did so well.
Ariel Sharon managed to pierce in between the second and third Egyptian armies near Deversoir. Now on African soil, his tanks knocked out some SAM sites and gave the IDF’s Airforce a corridor to operate in. From there, he encircled the third Egyptian army, and the rest, as they say, is history.
The IDF made excellent use of data. They were able to capture it, analyze it and take actions on it in a decentralized manner. The IDF managed to counter the Egyptian assault that initially breached the Bar Lev Line, thereby concluding the war into a stalemate.
Both countries look back and claim victory in this war. The truth is not binary in this conflict. But we can say with certainty that unlocking power from information quickly, reliably and securely is a strong advantage.
Want to see this dialed up to 11? The DoD has a very cool project to make software itself a military advantage for the USA. Notice the language used – speed, security and DevSecOps. Very interesting stuff indeed; it’s no longer Sci-Fi. And yes, K8s, containers and CI/CD are front and center.
Well then, shall we talk business?
Well, there you have it. In armed conflict, as in business, being informed with fast, reliable, distributed connectivity remains as critical as ever. While in one realm it’s reconnaissance, attrition, skirmish and strategy (is there another more abused word in business?), in the other it’s process automation, APIs, microservices, data lakes and a near-endless list of technologies.
I hope you enjoyed this article. If I did not pique your curiosity in Kong, I would be happy if I did so for military history and science. Stay safe, and be well.
-Kong’s Military Amateur
Share Post
Learn how to make your API strategy a competitive advantage.