Homeland security and defense is run by complex systems that require large scale
integration to protect our nation. C4ISR describes programs and solutions that
allow the intelligence community, military personnel, and policy decision makers
to make quick and unified decisions. This seminar will explore developments in
C4ISR programs and strategies to pursue interoperable and integrated business
capabilities across the U.S. Department of Defense. We will also look at the impact
of chatter analysis on these efforts.
At the end of this workshop, participants will be able to:
a) Explore legislation and recent developments in C4ISR programs and solutions
b) Examine the role of Chatter Analysis
c) Connect to industry experts around business strategies and functional
effectiveness of C4ISR
Learning Outcomes: Learn and explore benefits and opportunities around C4ISR
and Chatter Analysis
Lecture 7 - Technology, Innovation and Great Power Competition - SpaceStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, hacking for defense, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, space, space force, general Raymond, space command
The document summarizes the Military Decision Making Process (MDMP) used by the US military. It discusses the 7 steps of MDMP: mission analysis, course of action development, analysis, comparison, approval, orders production. It emphasizes that MDMP is a proven process but should be tailored based on factors like available time and the commander's guidance. The full process is not always needed and parallel planning techniques can help reduce time spent on MDMP.
Network Centric Warfare - An IntroductionD.A. Mohan
The document is an introduction to network centric warfare presented by D.A.Mohan, CEO of DAC Intl. It discusses how warfare has evolved from platform centric to network centric due to innovations in technology. Network centric warfare involves tightly integrating sensors, communication networks, command centers, and platforms to achieve situational awareness and synchronization between sensors and weapons. This allows for fast decision making and coordinated action. However, network centric warfare also faces challenges such as overreliance on technology, interoperability issues, and vulnerability to cyber attacks. Mitigation strategies include training, redundancy, and hardening against cyber threats.
Army Futures Command Overview Aug 10, 2021Neil McDonnell
Neil McDonnell and the GovCon Chamber of Commerce make the Army's Futures Command concept documents available to federal government contractors as they do their "homework" to support the Department of Defense.
Jserv gave a talk about the conceptual introduction to LLVM. The session mentioned the evolution of compiler technologies, paradigm shift, LLVM as a promising open source project, and how LLVM changes the IT world.
ARM was founded in 1990 and developed the first ARM processor in 1985. Key developments include the ARM2 commercial processor in the 1980s, the ARM7 used in early Nokia phones in the 1990s, and the modern Cortex-A9 which provides improved performance and power efficiency through features like out-of-order execution and cache hierarchies. NEON is ARM's SIMD architecture extension for improved media and signal processing, and it is now widely used in mobile software from Android to ffmpeg to accelerate tasks like video encoding and FFTs.
This document provides guidance on the Military Decision Making Process (MDMP) and Troop Leading Procedures (TLP). It outlines the 7 steps of MDMP which include receiving the mission, conducting mission analysis, developing courses of action, analyzing COAs, issuing orders, and supervising. Key aspects of mission analysis covered include Intelligence Preparation of the Battlefield and determining specified/implied tasks. Course of action development involves analyzing relative combat power, generating options, arraying forces, and developing the scheme of maneuver. The TLP guide emphasizes that the steps are not always linear and occur throughout MDMP.
This document discusses the use of drones, or unmanned aerial vehicles, for conservation purposes. Drones can be used to map land changes, monitor wildlife, and survey habitat areas. They provide real-time data using cameras and sensors without requiring people in remote locations. While drones have advantages over satellites like lower costs and ability to fly at low altitudes, they also have disadvantages such as noise disturbing wildlife and needing to follow FAA regulations. The document specifically discusses how drones are being used to monitor invasive algal blooms by collecting multi-spectral data on algal growth and distribution over time.
Lecture 7 - Technology, Innovation and Great Power Competition - SpaceStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, hacking for defense, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, space, space force, general Raymond, space command
The document summarizes the Military Decision Making Process (MDMP) used by the US military. It discusses the 7 steps of MDMP: mission analysis, course of action development, analysis, comparison, approval, orders production. It emphasizes that MDMP is a proven process but should be tailored based on factors like available time and the commander's guidance. The full process is not always needed and parallel planning techniques can help reduce time spent on MDMP.
Network Centric Warfare - An IntroductionD.A. Mohan
The document is an introduction to network centric warfare presented by D.A.Mohan, CEO of DAC Intl. It discusses how warfare has evolved from platform centric to network centric due to innovations in technology. Network centric warfare involves tightly integrating sensors, communication networks, command centers, and platforms to achieve situational awareness and synchronization between sensors and weapons. This allows for fast decision making and coordinated action. However, network centric warfare also faces challenges such as overreliance on technology, interoperability issues, and vulnerability to cyber attacks. Mitigation strategies include training, redundancy, and hardening against cyber threats.
Army Futures Command Overview Aug 10, 2021Neil McDonnell
Neil McDonnell and the GovCon Chamber of Commerce make the Army's Futures Command concept documents available to federal government contractors as they do their "homework" to support the Department of Defense.
Jserv gave a talk about the conceptual introduction to LLVM. The session mentioned the evolution of compiler technologies, paradigm shift, LLVM as a promising open source project, and how LLVM changes the IT world.
ARM was founded in 1990 and developed the first ARM processor in 1985. Key developments include the ARM2 commercial processor in the 1980s, the ARM7 used in early Nokia phones in the 1990s, and the modern Cortex-A9 which provides improved performance and power efficiency through features like out-of-order execution and cache hierarchies. NEON is ARM's SIMD architecture extension for improved media and signal processing, and it is now widely used in mobile software from Android to ffmpeg to accelerate tasks like video encoding and FFTs.
This document provides guidance on the Military Decision Making Process (MDMP) and Troop Leading Procedures (TLP). It outlines the 7 steps of MDMP which include receiving the mission, conducting mission analysis, developing courses of action, analyzing COAs, issuing orders, and supervising. Key aspects of mission analysis covered include Intelligence Preparation of the Battlefield and determining specified/implied tasks. Course of action development involves analyzing relative combat power, generating options, arraying forces, and developing the scheme of maneuver. The TLP guide emphasizes that the steps are not always linear and occur throughout MDMP.
This document discusses the use of drones, or unmanned aerial vehicles, for conservation purposes. Drones can be used to map land changes, monitor wildlife, and survey habitat areas. They provide real-time data using cameras and sensors without requiring people in remote locations. While drones have advantages over satellites like lower costs and ability to fly at low altitudes, they also have disadvantages such as noise disturbing wildlife and needing to follow FAA regulations. The document specifically discusses how drones are being used to monitor invasive algal blooms by collecting multi-spectral data on algal growth and distribution over time.
The Concept of Network Centric Warfare feat. IndiaSubhasis Hazra
Network Centric Warfare (NCW) is military's response to the Information Age we live in. Various countries have adopted different approaches to implement this technology-based warfare. India is not far behind but has a long way to go. Gone are the days when Conventional Wars would be fought, NCW is the new doctrine/methodology of modern warfare.
This presentation is from the point of view of India with status as on Dec 2013.
The document provides an overview of various naval aircraft, missiles, and weapons systems used by the US Navy. It describes the main categories of aircraft as fixed-wing, rotary-wing, and lighter-than-air. It then discusses different types of naval aircraft like attack planes, fighter planes, patrol aircraft, electronic warfare aircraft, and reconnaissance aircraft. The document also summarizes naval missiles from guided missiles to ballistic missiles and cruise missiles. It concludes with a brief overview of naval torpedoes and underwater warfare systems.
Air Combat History describes the main air combats and fighter aircraft, from the beginning of aviation. The additional Youtube links are an important part of the presentation. A list of Air-to-Air Missile from different countries. is also given
For comments please contact me at solo.hermelin@gmail.com.
For more presentations visit my website at http://www.solohermelin.com.
This document discusses several emerging technologies including intelligent sensors and wireless sensor networks, intelligent cars and smart highways, tele-health, microelectromechanical systems (MEMS), nanotechnology, and clean technology. It provides examples of applications for each technology such as using sensors to monitor bridges, track athlete performance, and remotely monitor patient vital signs. Intelligent vehicles could use sensors for features like collision avoidance and adaptive cruise control. MEMS and nanotechnology could enable miniaturized devices and new electronic and medical applications operating at the nano scale.
In this work, an aircraft is made which is autonomous based on computer vision. In this autonomous aerial vehicle, a flight controller is made by Raspberry pi 3 and two cameras are used as eye called stereo vision. The RC transmitter and RC receiver are used as a secondary control system. A virtual keypad security system which is an HMI technology is also made to protect it. Wi-Fi module is used for on-board communication. The autonomous aerial vehicle is designed to takeoff, fly and land by itself. It is also designed to see around, calculate, communicate onboard and take decisions.
OPC UA Connectivity with InduSoft and the OPC FoundationAVEVA
The document discusses the role and mission of the OPC Foundation. It states that the Foundation is the world's leading community for interoperability solutions based on OPC specifications that deliver universal connectivity. The mission of the community is to advance the development, adoption and certification of OPC-based products through global collaborations. The Foundation is also the official source for the OPC Certification Program, which ensures that OPC products plug-and-play in real-world applications.
Combat Systems Fusion Engine for the F-35ICSA, LLC
Michael Skaff of Lockheed Martin and the Principal Engineer for the F-35’s pilot vehicle interface explains the combat systems and their integration in the F-35. This capability is inherent in every F-35 or part of the baseline aircraft. In a real sense software development is never done; it is part of the evolving capability of the aircraft.
The document discusses the evolution of US fighter aircraft generations and the capabilities of 5th generation fighters. It highlights that the F-22 and F-35 each have complementary and optimized roles, with the F-22 focused on air superiority due to its speed, maneuverability and larger internal weapons capacity, and the F-35 focused on global precision attack thanks to its sensors and increased weapons payload. Maintaining a mix of both fighters is presented as critical to addressing 21st century air threats.
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV Clusterbyonggon chun
Introduce the container runtime environment which is set up with Kubernetes and various CRI runtimes(Docker, Containerd, CRI-O) and the method of NUMA-aware resource management(CPU Manager, Topology Manager, Etc) for CNF(Containerized Network Function) within Kubernetes and related issues.
This document introduces ATICA4Capella, a model-based safety analysis framework and toolset for the aerospace industry. It uses the Capella modeling environment for systems engineering. The toolset allows defining functional requirements, performing a functional hazard analysis, and generating safety documentation. It also supports semi-automated fault tree analysis and is aligned with aerospace safety standards like ARP4761. A case study of applying the tools to an eVTOL vehicle design is presented. The document outlines ongoing work to further integrate requirements management and automated analysis capabilities.
This document provides an introduction to drones and unmanned aerial vehicles (UAVs). It discusses the history of drones dating back to 1924, differences between remote controlled toys and UAVs, components of drones like frames, motors, electronic speed controllers and batteries. Applications of drones mentioned include emergency medical assistance, photography, search and rescue, agriculture, and more. The document also contrasts helicopters with quadcopters and lists common tools used for drone building/repair.
Practical DoDAF Presentation to International Council on Systems Engineering Washington Metro Area by Steven H. Dam Ph.D., ESEP, founder of SPEC Innovations
F 35 a lightning ii, usa - joint strike fighter aircrafthindujudaic
The document summarizes the F-35A Lightning II, the conventional take-off and landing variant of the F-35 Joint Strike Fighter aircraft. It is a single-seat, single-engine stealth fighter being developed by Lockheed Martin for the US Air Force and allies. It is designed for multi-role missions including air defense, ground attack, and reconnaissance, and will replace F-16s and A-10s. Key features include its AESA radar, DAS missile warning system, internal gun, and ability to carry up to 8,100kg of weapons internally and 6,800kg externally.
The document contains a list of military terms organized by type and then alphabetically. The terms include branches of the military like infantry, armor, and artillery. It also includes terms related to units and formations such as platoon, company, battalion, brigade, and corps. Finally, it includes symbols and abbreviations used on military graphics and maps such as phase lines, assembly areas, and named areas of interest.
Team Drone - 2021 Technology, Innovation & Great Power CompetitionStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, c3i, command and control
CAN 2.0 to CAN FD: Realize for what reason CAN FD underpins bigger payload than CAN 2.0 and how might you conquer the difficulties identified with relocation from CAN 2.0 to CAN FD. This blog reveals some insight into Mixed Networks and External CAN FD controller.
https://www.embitel.com/blog/embedded-blog/challenges-your-automotive-team-may-confront-during-migration-from-can-2-0-to-can-fd
Army Futures Command Concept for Special Operations 2028Neil McDonnell
Neil McDonnell and the GovCon Chamber of Commerce make the Army's Futures Command concept documents available to federal government contractors as they do their "homework" to support the Department of Defense.
The document discusses nano unmanned aerial vehicles (UAVs or drones). It defines nano drones as extremely small drones less than 15cm intended for use in urban areas. They are remotely controlled and equipped with cameras and microphones. The document outlines the mechanisms of nano drones, including flapping wing designs. It discusses the advantages of nano drones like low cost and ability to operate in constrained environments, as well as disadvantages such as lack of self-power and risk of spying. Examples of specific nano drone models are provided.
This document provides information about an upcoming conference on advancing robotic combat tasks from June 28-30, 2010 in the Washington DC metro area. The conference will feature discussions from DoD and DHS leaders on critical demands, initiatives and challenges for unmanned systems. Topics will include advanced spectrum management for ISR, operational needs of Army Special Operations forces, fielding multiple UGVs/UAVs with varying autonomy, and interoperable payloads and software. Speakers include leaders from the Army, Navy, USSOCOM and other organizations.
The document summarizes the capabilities of the US Strategic Command Joint Electronic Warfare Center EM OPFOR. It replicates electromagnetic environments to train DoD/USG organizations. It leverages spectrum, cyber, and space capabilities for integrated effects. The EM OPFOR provides a robust, scalable real-world target set using commercial off-the-shelf equipment for operators/systems to train against. It supports tactics, techniques and procedures development for both ground and air electronic warfare and information operations asset integration.
The Concept of Network Centric Warfare feat. IndiaSubhasis Hazra
Network Centric Warfare (NCW) is military's response to the Information Age we live in. Various countries have adopted different approaches to implement this technology-based warfare. India is not far behind but has a long way to go. Gone are the days when Conventional Wars would be fought, NCW is the new doctrine/methodology of modern warfare.
This presentation is from the point of view of India with status as on Dec 2013.
The document provides an overview of various naval aircraft, missiles, and weapons systems used by the US Navy. It describes the main categories of aircraft as fixed-wing, rotary-wing, and lighter-than-air. It then discusses different types of naval aircraft like attack planes, fighter planes, patrol aircraft, electronic warfare aircraft, and reconnaissance aircraft. The document also summarizes naval missiles from guided missiles to ballistic missiles and cruise missiles. It concludes with a brief overview of naval torpedoes and underwater warfare systems.
Air Combat History describes the main air combats and fighter aircraft, from the beginning of aviation. The additional Youtube links are an important part of the presentation. A list of Air-to-Air Missile from different countries. is also given
For comments please contact me at solo.hermelin@gmail.com.
For more presentations visit my website at http://www.solohermelin.com.
This document discusses several emerging technologies including intelligent sensors and wireless sensor networks, intelligent cars and smart highways, tele-health, microelectromechanical systems (MEMS), nanotechnology, and clean technology. It provides examples of applications for each technology such as using sensors to monitor bridges, track athlete performance, and remotely monitor patient vital signs. Intelligent vehicles could use sensors for features like collision avoidance and adaptive cruise control. MEMS and nanotechnology could enable miniaturized devices and new electronic and medical applications operating at the nano scale.
In this work, an aircraft is made which is autonomous based on computer vision. In this autonomous aerial vehicle, a flight controller is made by Raspberry pi 3 and two cameras are used as eye called stereo vision. The RC transmitter and RC receiver are used as a secondary control system. A virtual keypad security system which is an HMI technology is also made to protect it. Wi-Fi module is used for on-board communication. The autonomous aerial vehicle is designed to takeoff, fly and land by itself. It is also designed to see around, calculate, communicate onboard and take decisions.
OPC UA Connectivity with InduSoft and the OPC FoundationAVEVA
The document discusses the role and mission of the OPC Foundation. It states that the Foundation is the world's leading community for interoperability solutions based on OPC specifications that deliver universal connectivity. The mission of the community is to advance the development, adoption and certification of OPC-based products through global collaborations. The Foundation is also the official source for the OPC Certification Program, which ensures that OPC products plug-and-play in real-world applications.
Combat Systems Fusion Engine for the F-35ICSA, LLC
Michael Skaff of Lockheed Martin and the Principal Engineer for the F-35’s pilot vehicle interface explains the combat systems and their integration in the F-35. This capability is inherent in every F-35 or part of the baseline aircraft. In a real sense software development is never done; it is part of the evolving capability of the aircraft.
The document discusses the evolution of US fighter aircraft generations and the capabilities of 5th generation fighters. It highlights that the F-22 and F-35 each have complementary and optimized roles, with the F-22 focused on air superiority due to its speed, maneuverability and larger internal weapons capacity, and the F-35 focused on global precision attack thanks to its sensors and increased weapons payload. Maintaining a mix of both fighters is presented as critical to addressing 21st century air threats.
Method of NUMA-Aware Resource Management for Kubernetes 5G NFV Clusterbyonggon chun
Introduce the container runtime environment which is set up with Kubernetes and various CRI runtimes(Docker, Containerd, CRI-O) and the method of NUMA-aware resource management(CPU Manager, Topology Manager, Etc) for CNF(Containerized Network Function) within Kubernetes and related issues.
This document introduces ATICA4Capella, a model-based safety analysis framework and toolset for the aerospace industry. It uses the Capella modeling environment for systems engineering. The toolset allows defining functional requirements, performing a functional hazard analysis, and generating safety documentation. It also supports semi-automated fault tree analysis and is aligned with aerospace safety standards like ARP4761. A case study of applying the tools to an eVTOL vehicle design is presented. The document outlines ongoing work to further integrate requirements management and automated analysis capabilities.
This document provides an introduction to drones and unmanned aerial vehicles (UAVs). It discusses the history of drones dating back to 1924, differences between remote controlled toys and UAVs, components of drones like frames, motors, electronic speed controllers and batteries. Applications of drones mentioned include emergency medical assistance, photography, search and rescue, agriculture, and more. The document also contrasts helicopters with quadcopters and lists common tools used for drone building/repair.
Practical DoDAF Presentation to International Council on Systems Engineering Washington Metro Area by Steven H. Dam Ph.D., ESEP, founder of SPEC Innovations
F 35 a lightning ii, usa - joint strike fighter aircrafthindujudaic
The document summarizes the F-35A Lightning II, the conventional take-off and landing variant of the F-35 Joint Strike Fighter aircraft. It is a single-seat, single-engine stealth fighter being developed by Lockheed Martin for the US Air Force and allies. It is designed for multi-role missions including air defense, ground attack, and reconnaissance, and will replace F-16s and A-10s. Key features include its AESA radar, DAS missile warning system, internal gun, and ability to carry up to 8,100kg of weapons internally and 6,800kg externally.
The document contains a list of military terms organized by type and then alphabetically. The terms include branches of the military like infantry, armor, and artillery. It also includes terms related to units and formations such as platoon, company, battalion, brigade, and corps. Finally, it includes symbols and abbreviations used on military graphics and maps such as phase lines, assembly areas, and named areas of interest.
Team Drone - 2021 Technology, Innovation & Great Power CompetitionStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, unmanned, autonomy, c3i, command and control
CAN 2.0 to CAN FD: Realize for what reason CAN FD underpins bigger payload than CAN 2.0 and how might you conquer the difficulties identified with relocation from CAN 2.0 to CAN FD. This blog reveals some insight into Mixed Networks and External CAN FD controller.
https://www.embitel.com/blog/embedded-blog/challenges-your-automotive-team-may-confront-during-migration-from-can-2-0-to-can-fd
Army Futures Command Concept for Special Operations 2028Neil McDonnell
Neil McDonnell and the GovCon Chamber of Commerce make the Army's Futures Command concept documents available to federal government contractors as they do their "homework" to support the Department of Defense.
The document discusses nano unmanned aerial vehicles (UAVs or drones). It defines nano drones as extremely small drones less than 15cm intended for use in urban areas. They are remotely controlled and equipped with cameras and microphones. The document outlines the mechanisms of nano drones, including flapping wing designs. It discusses the advantages of nano drones like low cost and ability to operate in constrained environments, as well as disadvantages such as lack of self-power and risk of spying. Examples of specific nano drone models are provided.
This document provides information about an upcoming conference on advancing robotic combat tasks from June 28-30, 2010 in the Washington DC metro area. The conference will feature discussions from DoD and DHS leaders on critical demands, initiatives and challenges for unmanned systems. Topics will include advanced spectrum management for ISR, operational needs of Army Special Operations forces, fielding multiple UGVs/UAVs with varying autonomy, and interoperable payloads and software. Speakers include leaders from the Army, Navy, USSOCOM and other organizations.
The document summarizes the capabilities of the US Strategic Command Joint Electronic Warfare Center EM OPFOR. It replicates electromagnetic environments to train DoD/USG organizations. It leverages spectrum, cyber, and space capabilities for integrated effects. The EM OPFOR provides a robust, scalable real-world target set using commercial off-the-shelf equipment for operators/systems to train against. It supports tactics, techniques and procedures development for both ground and air electronic warfare and information operations asset integration.
The document discusses the Navy Training Management and Planning System (NTMPS), which is an umbrella term for the Navy's data warehouse and suite of applications that support management of Navy personnel, training, and requirements analysis. The key applications discussed are the NTMPS Afloat Datamart, Fleet Training Management and Planning System (FLTMPS) for both shore and afloat units, the Electronic Training Jacket for both shore and afloat, and the Online Application Reporting System. These applications leverage integrated data from the NTMPS data warehouse to provide reports and access to training records. Support is available for these applications from subject matter experts.
The document describes the Navy Training Management and Planning System (NTMPS), which integrates data from over 50 sources to support management of Navy personnel and training requirements. NTMPS includes applications like the FLTMPS (Fleet Training Management and Planning System), Electronic Training Jacket, and Online Application Reporting System. FLTMPS provides reports to help Navy commanders track training requirements, personnel assignments, and other metrics. It has versions for both shore-based and shipboard use.
The Product Manager for Installation Information Infrastructure Modernization Program (PM I3MP) helps ensure Soldiers have access to a secure, integrated communications network. Comprising over 100 personnel, PM I3MP rapidly delivers IT solutions to connect the global Army. The program provides oversight of the procurement and installation of the Army's information infrastructure worldwide. It has three assistant managers who lead work to procure, install, and sustain the information infrastructure through projects at military installations.
Automated planning, configuration, and monitoring
JENM: Network planning, configuration, and monitoring
JACS/ACES: Frequency management and spectrum planning
RBSAM: Radio battery and load planning
VMWare: Integrated virtual environment
Single User Interface: Common look and feel across tools
Mobile: Deployable on tactical laptops and servers
Scalable: Supports platoon to division level networks
Automated: Reduces manual processes and errors
The document is an overview briefing from General Dynamics that discusses who they are, the changing environment, and how to engage with their programs. It provides information on General Dynamics' programs and products in combat systems, C4 systems, and other areas. It also lists several current programs and technologies, such as the Joint Tactical Radio System, Mobile User Objective System, and Rescue 21. The briefing is intended to inform audiences about General Dynamics' work and how to get involved with their innovations.
Christopher W. Wright is a retired Army veteran with over 18 years of experience in leadership, management, cyber operations, and network administration. He has a Masters in Political Science and Bachelors in History. Throughout his career he has managed large communication networks supporting military operations, developed security policies, and supervised teams of up to 20 personnel. He has extensive experience in satellite communications, network engineering, and information assurance.
John Michael Scheibelhut has extensive experience in both military and civilian communications, computer, and security work. He has held positions as a communications technician, desktop support technician, security officer, police officer, and network engineer. He has active Top Secret security clearances and specialized training in areas such as communications, computer systems, fiber optics, and networking.
Zacory Hendrix is a computer systems analyst and former Marine with over 7 years of experience in electronics repair, software testing, and tactical communications. He currently works as a computer systems analyst, where he analyzes C4ISR systems, develops test procedures, and ensures software and system interoperability. Previously, he served in the Marine Corps as a ground radio operator, where he planned and maintained tactical radio networks. He also has experience as a communications analyst, performing maintenance on various tactical radios and overseeing software upgrades. Hendrix has a secret security clearance and awards for outstanding performance in the Marine Corps.
The Materiel Readiness of the future 8 Sept 16edil66
The document discusses the future of materiel readiness in the US Army. It outlines new technologies and equipment that will impact various Army roles in the coming years, known as the "Big 6+1". This includes future vertical lift, advanced protection systems, cross domain fires, combat vehicles, expeditionary mission command/cyber electromagnetic, robotics/autonomous systems, and soldier/team performance overmatch. It emphasizes the importance of technicians staying informed about emerging technologies to ensure Army readiness now and in the future.
UAS: Unmanned Aircraft Systems 2009 Summit Prog Reg V3Mark Wilson
A training, education, and networking program focused on UAS Sense & Respond developments, current and future uses across the military, plus UAS subsystems & platforms.
CWO4 James Lloyd East III served as a Fire Control Officer on two aircraft carriers, USS Nimitz and USS John C Stennis, where he supervised sailors operating ship self-defense systems, and also served as a Fleet Liaison Officer at the Naval Undersea Warfare Center assisting with the Aircraft Carrier Tactical Support Center project. He has extensive experience managing combat systems and weapons, as well as providing training, technical support, and software assistance for tactical systems.
Tech USA Government Solutions (TGS) is a premier provider of innovative technology and communications solutions to the Department of Defense, federal agencies, and intelligence community. Headquartered in Maryland with 13 program offices and nearly 1,000 technical employees, TGS has over a decade of experience supporting mission-critical programs through services such as IT, engineering, cybersecurity and more. Their capabilities include classified support up to the Top Secret level.
The document outlines the agenda and objectives for a capabilities information exchange event. The agenda includes briefings on multi-domain battle concepts, science and technology needs, force design efforts, and defense innovation initiatives. Objectives are provided for 2018-2022 and 2023-2027 focusing on modernizing aviation, combat vehicles, developing cross domain fires, robotics/autonomous systems, advanced protection, cyber/electromagnetic capabilities, and improving soldier performance. The long term vision for 2028-2050 includes fielding future vertical lift aircraft and combat vehicles to enhance deployability, mobility, and lethality.
Army plan for Cyber Offensive Operations -- ESF 18David Sweigert
This document provides an overview of current and emerging Army cyber requirements and capabilities gaps. It identifies the top priority gaps as improving commanders' situational awareness across all echelons, including understanding the social media dimension. Other high priority gaps include defending networks in depth, conducting defensive and offensive cyber operations, and extending cyber capabilities to tactical units. The document recommends solutions such as integrating cyber and electronic warfare planning, developing trained and ready cyber forces, and transforming Army doctrine to fully leverage cyber capabilities in operations.
Jaime Lujan is an engineering technician with 4 years of experience in system of systems integration and network management for the Army. He has a proven track record of meeting program deadlines and requirements. His skills include expertise in tactical radio communications, network design, and Army capability sets. He holds a Secret Clearance and is currently pursuing a Bachelor's degree in Information and Communication Technology.
The document discusses soldier modernization efforts, including enhancing capabilities for future soldiers to accomplish missions. It outlines five key soldier system capability areas and various projects to modernize equipment like clothing, weapons, sensors and protection. Global development of integrated soldier systems is mentioned, along with challenges of balancing capabilities, technology insertion and performance parameters.
In today's fast-paced world, technology is advancing rapidly, and it's essential for STEM (Science, Technology, Engineering, and Mathematics) managers to keep up with the latest trends. This seminar aims to educate STEM managers on the critical technology trends that are shaping the industry and impacting their jobs.
During this seminar, we will cover the latest technology trends, including artificial intelligence, machine learning, blockchain, the internet of things (IoT), and more. We will explore how these technologies are transforming the business landscape and what they mean for STEM managers.
The seminar will provide insights into how STEM managers can leverage these trends to stay ahead of the curve and remain competitive in their respective fields. We will also discuss the potential risks and challenges associated with adopting these technologies and how to manage them.
Through a combination of lectures, case studies, and interactive discussions, attendees will gain a comprehensive understanding of the latest technology trends and their impact on STEM management. They will leave the seminar with practical insights and strategies to effectively navigate the ever-changing technological landscape and drive innovation in their organizations.
Learning Objectives:
Upon completion of this seminar, participants will be able to:
1. Understand the latest technology trends and their impact on STEM management.
2. Gain insights into how to leverage these trends to stay ahead of the curve and remain competitive in their respective fields.
3. Learn about potential risks and challenges associated with adopting these technologies and how to manage them.
4. Develop practical strategies for effectively navigating the ever-changing technological landscape and driving innovation in their organizations.
5. Network with other STEM managers and industry experts to share insights and best practices.
In a world that values conformity, it's easy to lose sight of our authentic voice and struggle to assert ourselves in both personal and professional settings. This seminar will provide attendees with critical communication skills to boost their confidence and improve assertiveness, helping them succeed and feel more satisfied in their careers. Participants will explore methods to increase their confidence and make them more assertive, understand the differences between assertive and aggressive communication, and learn techniques for making their point powerfully without overpowering others. The session will also cover painless ways to let go of hard feelings and examine techniques for turning down the heat in challenging situations.
By the end of this session, attendees will be able to:
1. Explore methods that can increase their confidence and make them more assertive.
2. Understand the differences between assertive and aggressive communication and how to say no.
3. Discuss techniques for making their point powerfully without overpowering others.
4. Discover painless ways to let go of hard feelings and positively move forward.
5. Examine techniques for turning down the heat in challenging situations.
Learning Objective: Develop skills that lead to increased performance and organizational growth
Are you ready to take on more responsibilities, lead a team, and foster career growth for yourself and others? This professional development seminar is designed to help you acquire the skills you need to make a positive difference in your work. You will learn how to elevate your performance and exceed expectations by incorporating essential skills and career development strategies.
At the end of this seminar, participants will be able to:
1. Explore traits that create a sense of confidence when taking on new assignments
2. Examine techniques to enhance skills and abilities for career growth
3. Understand the role of a non-manager in the workplace
4. Create a plan to acquire new skills for career success and development potential
Objective: Develop strategies to enhance productivity and career longevity
As professionals, we often face challenging situations that can lead to burnout, including high email volumes, difficult colleagues, and workplace politics. Despite finding work that aligns with our interests, most of us experience varying levels of burnout throughout our careers. It is crucial to stay connected to the vision, mission, and goals of our work and to find ways to express our identity, creativity, and passion. In this workshop, we will share tools and techniques to help you re-energize and shift your thinking, transforming dead-ends into multiple paths of opportunities, morale, and effectiveness.
At the end of this seminar, participants will be able to:
1. Identify strategies to connect personal and professional values.
2. Manage stress, adapt to change, and navigate industry rumors.
3. Examine ways to become a strategic professional instead of just a task manager.
4. Explore five techniques to cultivate passion and commitment.
Setting achievable goals is crucial to living a purposeful and fulfilling life. In this session, attendees will learn about the types of goals and methods for determining which goals to set. They will explore key strategies for setting and achieving goals, taking accountability and ownership of their goals, and avoiding common mind-traps that can disrupt their ability to succeed. By the end of this session, attendees will be equipped with practical tools to set clear goals, move forward toward success, achieve promotions, and climb the career ladder.
By the end of this session, attendees will be able to:
1. Identify the types of goals and methods for determining which goals to set.
2. Examine key strategies for setting and achieving goals.
3. Take accountability and ownership of their goals.
4. Avoid common mind-traps that can disrupt their ability to succeed.
Learning objective: Foster leadership and professional growth
Leaders must possess certain competencies to excel in their roles. Women leaders often face unique challenges in the workplace regarding perceived competence compared to men. By developing key leadership competencies, women leaders can better overcome these obstacles. In this session, our panel will discuss how building confidence, demonstrating competence, and cultivating a strong leadership presence can improve leadership standing. Attendees will learn the importance of effective communication, emotional intelligence, networking, and connecting with other women leaders.
By the end of this session, attendees will be able to:
1. Identify competencies that build confidence.
2. Explore key elements of leadership presence.
3. Recognize characteristics that enhance effective leadership communication and demonstrate emotional intelligence.
4. Examine strategies for becoming an impactful female negotiator.
5. Discover best practices for developing a network of women leaders.
Learning objective: Discover best practices for supporting employee mental health
Employees' mental health is being affected in unprecedented ways due to factors such as the pandemic, economic uncertainty, political tensions, remote work, and return-to-work policies. Despite these pressures, many employers' mental health benefits, policies, and practices remain outdated and in dire need of an update. The mental health support workers require varies significantly depending on diversity factors such as age, race, nationality, and gender.
At the end of this session, attendees will be able to:
1. Recognize the mental health challenges faced by today's workers.
2. Understand the impact of flexible work arrangements, including work-from-home and hybrid work, on employees' mental health.
3. Explore the creation of programs that cater to the unique needs of employees based on factors such as age, gender, ethnicity, and work location.
4. Examine HR's role in developing and communicating mental health resources that can assist employees and become a crucial component of your overall employee wellness program.
Improvising with Confidence discusses the importance of improvisation skills for speaking up in unplanned opportunities and raising your profile in an organization. It provides techniques for improving improvisation abilities such as having conversations in your head beforehand, delaying answers with questions, restating problems, and knowing your organization's hot button issues. A panel of experts from various companies discusses their perspectives on improvisation.
Learning objective: Achieve clarity and confidence as your most authentic self
Authenticity is the harmonious alignment between one's internal values and beliefs and their external behavior. Embracing authenticity in leadership involves aligning professional actions with personal ethics, values, and personality. Trust is built when leaders remain true to themselves, making it easier to achieve goals. In this session, we will explore the authenticity paradox in the workplace, learn to lead authentically, and identify practical ways to embody authenticity in your leadership role.
By the end of this session, attendees will be able to:
1. Differentiate between constructive and detrimental authentic behaviors.
2. Identify your core values and understand their influence on your leadership actions.
3. Establish trust and transparency in your team as an authentic leader while navigating the authenticity paradox.
4. Cultivate a team that embraces individual and collective strengths and authenticity.
Learning objective: Discover the untapped potential of neurodiverse talent
Companies are increasingly recognizing the potential of neurodiverse talent—people with conditions like autism, ADHD, dyslexia, and others. While the benefits of diversity are well-known—enhanced creativity, innovation, and more—neurodiversity goes even further by providing expanded perspectives and breakthrough thinking to keep organizations at the forefront. Major companies like Microsoft, J.P. Morgan, Home Depot, and Hewlett Packard are tapping into this neurodiverse talent pool.
At the end of this session, attendees will be able to:
1. Understand the most recognized types of neurodiversity.
2. Examine the benefits of a neurodiverse workforce for your company.
3. Explore the unique skills of neurodiverse individuals.
4. Investigate recruiting and hiring for neurodiversity—overcoming interview bias.
5. Discover practical ways to maximize the strengths of neurodiversity.
With the increasing number of data breaches and cyber attacks, it's becoming clear that traditional security measures are no longer sufficient. Zero Trust security is an approach that assumes no user, device, or network is trustworthy by default. This seminar will explore the concept of Zero Trust and its application to data security.
During this seminar, we will cover a range of topics related to Zero Trust and data security, including the history and evolution of Zero Trust, the key principles of Zero Trust, and the different applications of Zero Trust in data security. We will also discuss the impact of Zero Trust on the job market and the skills required to work effectively with this approach.
Through a combination of lectures, case studies, and interactive discussions, attendees will gain a comprehensive understanding of the potential benefits of implementing a Zero Trust approach to data security. They will leave the seminar with practical insights and strategies to effectively leverage Zero Trust to protect their organization's data.
Learning Objectives:
Upon completion of this seminar, participants will be able to:
1. Understand the history and evolution of Zero Trust and its application to data security.
2. Gain insights into the key principles of Zero Trust and the different applications of this approach in data security.
3. Learn about the potential benefits and challenges of implementing a Zero Trust approach to data security.
4. Develop practical strategies for effectively leveraging Zero Trust to protect their organization's data.
5. Network with other industry professionals to share insights and best practices.
Learning Objective: Examine the elements of constructing superior resumes that will land you interviews
An efficient and robust resume will improve your chances of landing that dream job and starting your career on the right foot. Creating the perfect resume takes practice and skill. You want to ensure that your resume stands above the rest without overdoing it. How does one make sure that their resume is top-notch and bulletproof? This seminar will give you the scoop on creating the standout resume to get your following interview. We will discuss tips such as determining your resume’s purpose, supporting your strengths, using appropriate keywords, the benefits of proofreading, bullet points, and proper font usage.
After this seminar, the participants will be able to:
a. Identify the purpose of a solidly effective resume.
b. Discern good resumes from bad resumes.
c. Analyze the factors that recruiters identify to disregard some resumes.
d. Identify the attributes of resumes that get on the interview schedule.
Learning objective: Examine methods for fostering a diverse workplace
Diversity and inclusion are vital drivers of business success. However, creating a more diverse and inclusive work environment can involve overcoming significant barriers within an organization. How can you effectively drive change? How can you help others seize opportunities to create a culture where everyone truly feels valued? In this program, our panel will discuss the roles of C-suite leaders to frontline employees in establishing a diverse and welcoming workplace. The discussion will focus on examples, practical tools, and technologies to help develop a purpose and strategy that makes diversity a workplace reality.
At the end of this session, attendees will be able to:
1. Explain why creating a diverse workplace requires ongoing effort across the entire enterprise.
2. Explore a framework that anyone can use to impact change and create a more inclusive environment.
3. Examine how recognition and other solutions can be used to mitigate unconscious bias and improve belonging.
Assertiveness is a crucial skill for women in the workplace to communicate their ideas, set boundaries, and achieve their goals without being perceived as overbearing or bossy. In this session, attendees will explore fundamental assertiveness skills and learn how to fortify themselves, reduce stress, and set boundaries when speaking their minds. They will examine their personal power, explore unconscious clues that show they are feeling intimidated, and discover techniques for assertive communication that communicate they have the upper hand. Attendees will also analyze how to develop an assertive response, say "no" assertively, and speak their minds guilt-free.
By the end of this session, attendees will be able to:
1. Examine their personal power, where it comes from, and how to use it.
2. Explore unconscious clues that show they are feeling intimidated and stop being a people pleaser.
3. Discover techniques for assertive communication that communicate they have the upper hand.
4. Analyze how to develop an assertive response, say "no" assertively, and speak their minds guilt-free.
This document summarizes a panel discussion on introverts as leaders. The panelists were Brooke Hirsch, PhD, PMP; Gina Farida; and moderator Ronesha Willis, SPHR. The objectives were to identify the influence of the "extroverted ideal" of leadership, assess leadership styles and strengths of introversion, examine perceptions of leadership competence, and discuss optimizing performance. The panelists were introduced, including their backgrounds and qualifications. The discussion covered strengths of introverted leaders, how labels have impacted self-perception, strategies for introverts to optimize performance, and how workplaces can support introverted employees.
In any workplace, emotions can run high, leading to conflict and tension that can threaten productivity and relationships. In this session, attendees will learn proven tips and techniques for managing conflict, anger, and emotional tension without damaging relationships. They will explore the 3 C's of conflict communication - being clear, curious, and calm - and discover how to use words that initiate discussion and minimize conflict. Attendees will also learn communication tools for constructive confrontation, methods for maintaining professionalism, and strategies for avoiding win-lose situations. They will also research how to use boundary statements when dealing with an angry person.
By the end of this session, attendees will be able to:
1. Understand the 3 C's of conflict communication: Be Clear, Be Curious, and Be Calm.
2. Examine words that initiate discussion and minimize conflict.
3. Explore communication tools for constructive confrontation.
4. Discuss methods for maintaining professionalism and avoiding win-lose situations.
5. Research how to use boundary statements when dealing with an angry person.
Learning Objectives: Discover effective methods for managing and supporting highly sensitive employees in the workplace.
It is estimated that approximately one in five individuals are highly sensitive people (HSPs), which means you likely have at least one HSP on your team. HSPs process information more deeply and are more attuned to their surroundings, including lights, sounds, facial expressions, and vocal tones. While they can be exceptional employees - thoughtful, intuitive, conscientious, and dedicated high performers - they also require a unique approach to management. In this session, you will learn how to foster inclusivity and retain this neurodiverse group of individuals, who may prove to be some of your organization's most valuable assets.
By the end of this session, attendees will be able to:
1. Identify common triggers for highly sensitive employees and understand how to mitigate them.
2. Discover effective ways to capitalize on the innate strengths of your highly sensitive team members.
3. Learn what not to say in order to avoid hurt feelings and maintain positive relationships with sensitive employees.
4. Implement communication adjustments that can significantly improve interactions with highly sensitive individuals.
5. Develop an action plan to empower and support your highly sensitive employees.
Artificial intelligence (AI) and Chat GPT (Generative Pre-trained Transformer) are revolutionizing the way we work and interact with each other. From chatbots and virtual assistants to automated decision-making processes, AI is changing the way we approach work and the workplace. This seminar will explore the impact of AI and Chat GPT on the workplace and how businesses can leverage these technologies to improve efficiency and productivity.
During this seminar, we will cover a range of topics related to AI and Chat GPT, including the history and evolution of AI, its current state of development, and the different applications of AI in the workplace. We will also discuss the impact of these technologies on the job market and the skills required to work effectively with them.
Through a combination of lectures, case studies, and interactive discussions, attendees will gain a comprehensive understanding of the potential benefits and challenges of integrating AI and Chat GPT into the workplace. They will leave the seminar with practical insights and strategies to effectively leverage these technologies to drive innovation and productivity in their organizations.
Learning Objectives:
Upon completion of this seminar, participants will be able to:
1. Understand the history and evolution of AI and Chat GPT and their current state of development.
2. Gain insights into the different applications of AI and Chat GPT in the workplace and their potential benefits and challenges.
3. Learn about the impact of AI and Chat GPT on the job market and the skills required to work effectively with these technologies.
4. Develop practical strategies for effectively integrating AI and Chat GPT into the workplace to drive innovation and productivity.
5. Network with other industry professionals to share insights and best practices.
This document provides information about a panel discussion on building resilience. The panel will feature three speakers from major companies discussing strategies for managing stress and boosting performance. The panelists will discuss deciding where to focus time and energy, understanding personal capacity, clarity, managing expectations, and handling difficult situations well.
Learning Objective: Discuss techniques for promoting yourself during an interview
Do you know the benefits of establishing a positive and professional representation during an interview? Promotions depend on preparation and practice but knowing what to prepare and how to practice is essential. Mastering the Interview Training Materials holds the knowledge of the qualities that employers desire. Expanding your expectations of the questions that will be asked during an interview can give you an incredible advantage over other applicants for the position. Even more, demonstrating your unique skills through a well-articulated answer to interview questions will put you in the lead. Taking the initiative to prepare for an interview can create new opportunities for career development in your industry.
After this seminar, the participants will know:
a. What are the standard interview questions, and how to prepare your answers?
b. What information do I need to know for every interview?
c. How do I answer tough questions?
d. What are good questions to ask your interviewer?
e. How to answer the question: “So tell me about yourself?
f. What do I do after the interview?
g. What are common interview mistakes?
1. COMMAND, CONTROL, COMMUNICATIONS,
COMPUTER, INTELLIGENCE,
SURVEILLANCE AND RECONNAISSANCE
SYSTEM INTEGRATION: C4ISR
Presenters: Mr. Cornelius Brown, Ms. Michelle
Venters, MSG Maurice Jones, SFC Vernon Walton
Saturday, February 9, 2013 | 3:15pm – 4:45pm
Washington Marriott Wardman Park | Maryland Suite A
3. Objectives
• Provide participants an overview of the Army’s
Strategy for Network Modernization
• Present the Role and Mission of the Army Test
and Evaluation Command
• Discuss Program Test and Evaluation Efforts
related to Network Modernization
C4ISR
4. Goal
Participants will understand the Army’s
importance and need to modernize the
Network and the ATEC ongoing efforts
supporting modernization.
C4ISR
5. Strategic Challenges
“Our military will be leaner, but the world must know
the United States is going to maintain our military
superiority with armed forces that are agile, flexible
and ready for the full range of contingencies and threats.”.”
–
President
Obama,
Defense
Security
Review,
5
Jan
12
“The Army has global responsibilities that require large
technological advantages to prevail decisively in combat –
“technological overmatch,” if you will… Modernizing,
especially as end strength is reduced, is the key to ensuring
that the Army’s dominance continues. As I reflect upon the
pace of technological change in today’s modern world and the
impact of rapid, global information exchange upon our overall
security environment, I am both inspired and encouraged by
the Army’s approach to building a network able to connect our
forces at all echelons. This remains our number one
modernization priority.”
C4ISR
6. Army Network Today
Ø Over the last 10 years, the operational portion of the network modernized
faster than the institutionalized portion
Ø As we draw down, 80% of the Army is now CONUS- based
Network Integration Evaluation (NIE) pioneered the collaborative development
of Capability Sets
Ø Army is expanding the Capability Set approach to focus on comprehensive
network modernization
Network
=
Transport
+
Infrastructure
+
Devices
+
Services
+
Applica:ons
C4ISR
7. Our IT Environment
How
do
We
Make
Technology
Work
for
Us?
FUTURE
•
Users
Must
be
Confident
in
the
Network
•
Informa*on
Must
be
Secure
and
Accessible
Regardless
of
Device
or
Loca*on
C4ISR
8. Joint Information Environment
End State
The
Network
is
Core
to
a
Smaller,
More
Capable,
BeBer
Trained
Expedi:onary
Army
Ø We Must Train as We Fight
Ø Deploy Little to No Notice
Anytime, Anywhere in Austere
Environments
Ø Installations as a Docking
Station
Ø Modernized From Strategic
Core to the Tactical Edge
Ø Single Secure Network
Ø Incorporate Echelons
Above Army Requirements
Ø Centralized Management and
Decentralized Execution
A
Single,
Secure,
Standards-‐Based,
VersaKle
Infrastructure,
Linked
by
Networked
and
Redundant
Transport
Systems,
Sensors,
Warfigh*ng
and
Business
Applica*ons,
Along
with
Data
to
Provide
our
Soldiers
and
Civilians
the
InformaKon
They
Need,
When
They
Need
It,
in
Any
Environment
to
Manage
the
Army
Enterprise
and
Enable
Full-‐Spectrum
OperaKons
with
Our
Joint,
CoaliKon,
and
Interagency
Partners.
C4ISR
12. How We Fit Overseas
Con:ngency
Opera:ons
(OCO)
Secretary
of
Defense
Under
Secretary
of
Defense
Mobile
Gun
System
(AT&L),
Director
Defense
(MGS)
Director,
OTE
Systems/
DD
Developmental
T&E
DUSA
Secretary
of
the
Army
ARH
Extended
Range/
Mul:
Purpose
Unmanned
Aerial
System
(ER/MP
UAS)
Assistant
Secretary
of
the
Army
for
Chief
of
Staff
AL&T
TEO
Vice
Chief
(T&E
of
Staff
Execu:ve)
Army
Test
and
Evalua:on
Command
MG
Dellarocco
Family
of
Medium
Tac:cal
Vehicles
(FMTV)
Army
Evalua:on
Opera:onal
Test
Mine
Resistant
Ambush
Protected
Center
Command
(MRAP)
Mr.
Jimenez
COL
(P)
Mar2n
Independent
Repor:ng
Mandated
by
US
Code,
Brigade
Combat
Team
Moderniza:on
(BCT
Mod)
OMB,
and
OSD
C4ISR
13. ATEC Mission
ATEC plans, integrates, and conducts
experiments, developmental testing,
independent operational testing, and
independent evaluations and assessments
to provide essential information to
acquisition decision makers and
commanders.
General Orders No. 13
Signed CSA 16 Oct 06
C4ISR
14. Where We Are
AEC
ATEC
Warren
Pica:nny
Arsenal
Ft
Monmouth
Dugway
Aberdeen
Proving
Ground
Alexandria
Ft
Belvoir
Ft
Leavenworth
Ft
Monroe
Ft
Lee
Ft
Leonard
Wood
Ft
Knox
Yuma
Ft
Bragg
Proving
Ground
Ft
Sill
OTC
Redstone
White
Sands
Arsenal
Ft
Huachuca
Missile
Range
Ft
Benning
Legend
Headquarters
Ft
Bliss
Major
Test
Facility
Ft
Hood
Orlando
Opera*onal
Test
Dir
LNO
Site
FOA Teams
AFGHANISTAN
Ft
Greely
Panama
&
Hawaii
Cold
Regions
Test
Center
Tropics
Test
Sites
IRAQ
C4ISR
16. Secretary of
How
AEC
Fits
Overseas Contingency
Operations
Defense (OCO)
Under Secretary of
Defense (AT&L), Director
Director, OTE Defense Systems/ DD Mobile Gun System
Developmental T&E (MGS)
Secretary of
DUSA the
Army
Assistant
ARH
Extended Range/ Multi Purpose
Unmanned Aerial System
(ER/MP UAS)
Secretary of the
Chief of Army for AL&T
TEO Staff
(T&E
Executive)
Vice Chief
of Staff
Army Test and
Evaluation
Command
MG Dellarocco Family of Medium Tactical Vehicles (FMTV)
Army Evaluation Operational Test A
Center Command Mine Resistant Ambush Protected (MRAP)
T D E
Mr. Jimenez COL(P) Martin C P P R W
G T S Y • CRTC
G C
M P • TRTC
R G • YTC
Legend
T&E Policy, Independent Reporting
Funding, or
Oversight
Mandated by US Code,
Network Integration Event (NIE)
OMB, and OSD
Joint Network Node (JNN)
C4ISR
17. AEC Mission
The
Army
Evalua*on
Center
plans
developmental
tes*ng
of
weapons
and
equipment
along
with
independent
evalua*ons
and
assessments
of
acquisi*on
programs
providing
essen*al
informa*on
to
key
decision
makers.
17
18. U.S.
Army
EvaluaKon
Center
enter
U.S.
Army
EvaluaKon
C
COMMAND & CONTROL EVALUATION
DIRECTORATE (C2ED)
19. C2ED
Mission
Plan
and
execute
rigorous
and
independent
evalua*on
of
Army
and
Joint
Command,
Control,
Communica*ons,
and
Computer
systems
while
providing
accurate
high
quality
system
evalua*on
for
milestone
decisions,
materiel
changes,
and
materiel
releases
in
support
of
system
acquisi*on
and
experimental
processes.
19
22. COE Description
“The Common Operating Environment is an
approved set of computing technologies
and standards that enable secure and
interoperable applications to be rapidly
developed and executed across a variety
of Computing Environments.”
– Deputy Chief of Staff, G-3/5/7, 24 May 2010
22
24. CP CE v1 Description
• Enables a shared CP product line with a common
government owned and managed architecture which
reduces the number of servers and associated
weight, power, and required support.
• Expands ongoing MC and intelligence hardware
convergence efforts by establishing a common
software architecture focused on operations and
intelligence functionality.
• Improves effectiveness of operations and
intelligence staff support to the Commander through
WfF – associated widgets available on a common
workstation.
24
25. CP CE v1
Technical Objectives
Rich Web
1) Merged Ozone Framework
2) Common Widgets
3) Additional Widgets
4) Standard and shareable geospatial foundation
Heavy
Server
Stack
Node
TEN
VMs
Mini
Cloud
Common
Storage
HW/Virtualization
1) Standardization
• Common Server Stack/Infrastructure
• Heavy Node
• Light Node
• Virtualization Foundation configured with
• DCGS Baseline VMs
• MC Baseline VMs
Light
Server
Stack
Node
2) Tactical Edge Mini Cloud
• Converged Geospatial Service Data Analytics
CIS
3 Data COE DCGS
VMs
• Database cross-cutting capability baseline
MC
VMs
Common
Storage
25
26. User Benefits
• Better information visualization
• Better collaboration working environment
• Less burden of logistics on network
infrastructure
26
28. What is WIN-T?
WIN-‐T
INC2
is
the
Army’s
tac*cal
por*on
of
the
Global
Informa*on
Grid
(GIG),
providing
a
high-‐speed,
high
capacity
backbone
communica*ons
network
reaching
from
the
Maneuver
Brigade
Combat
Teams
(BCTs)
and
Division
to
the
strategic
por*on
of
the
GIG.
•The
converged
IP
backbone
is
colorless
(all
user
data
is
encrypted
prior
to
being
placed
on
the
backbone),
supports
dynamic
bandwidth
alloca*on
and
policy-‐based
networking,
and
is
cryptographically
isolated
from
all
external
networks.
•Employs
a
combina*on
of
terrestrial
and
space-‐based
(military
and
commercial)
network
op*ons
to
provide
speedy,
comprehensive,
and
protected
Mul*ple
Security
Level
(MSL)
voice,
data,
and
video
coverage
to
Warfighters.
•Provides
a
robust
radio
backbone,
designed
as
to
leverage
as
much
terrestrial
bandwidth
as
possible
to
minimize
the
need
to
transmit
on
the
satellite
*er.
This
is
done
through
the
use
of
smart
LOS
radio,
the
HNW.
28
30. WIN-T Increment 2
• WIN-T Increment 2
– Provides On-The-Move (OTM) communications down to the company level
– Provides common logon via CAC
– Tactical Communications Nodes (TCN) and Point Of Presence (POP) at the
Division, Maneuver Brigade, and Battalion
– Soldier Network Extensions (SNE) at the company level
– POP and SNE designed to be integrated into Armored Vehicles such as
Bradley and MRAP
30
31. Concept of Operations
• The critical advantage of WIN-T Inc 2 is its ability to give commanders the
right information at all times, even when forces are moving -a capability not
widely available today.
• WIN-T INC2 adds On-the-Move (OTM) communications capability
– Mobile infrastructure supporting key leaders and elements
– Provides initial wide area networking On-the-Move capability and
enhanced fixed command post connectivity.
– Satellite Communications (SATCOM) and Terrestrial High-band Network
Waveform (HNW) OTM capability.
– Enhanced QoS
– High Speed Non-secure Internet Protocol Routing Network (NIPRNET),
Secret Internet Protocol Routing Network (SIPRNET), and Defense
Switch Network (DSN) services from Division to Company.
– Dynamic reuse of spectrum for Line Of Sight (LOS)
• The key enabler of WIN-T is to provide network connectivity while on the
move.
31
32. WIN-T Increment 2
High-Level Network Diagram
HCLOS
not
part
of
Inc2
Conceptual
View
–
does
not
depict
actual
basis
of
issue
32
35. JTRS Increment 1
Manpack
Vehicle*
Handheld
• Family of radios that will provide:
– Support to multi-band, multi-mode, multiple channel radios
– Support advanced narrowband and wideband waveform capabilities with
integrated computer networking features
– Conformity to open physical and software architectures
– Both line-of-sight and beyond-line-of-sight C4I capabilities to the Warfighters
– Capability of transmitting voice, video and data
– Interoperable networking capability to address critical mission gaps against
increasingly threats
*Note:
In
redesign
35
36. JTRS – A Transformation
Current Systems
(25-30 Families)
Enabler
Common Open
Standards Architecture Joint Solution
(750, 000 Radios) (1 Family)
&
Technology Base
• Navigation O
P Space
AN/PSQ-6A EPLRS E D
• Positioning
R O
A M Airborne
• Location AN/ARC-210
T A
I I
• Identification O N Maritime/
AN/WCS-3 UHF SATCOM/LOS N S Fixed Station
A
• Air to Ground
L
AN/ARC-201A SINCGARS Ground Forces
• Air to Air • Hand held
• Dismounted
• Ground ANPRC-119 SINCGARS • Vehicular
to Legacy Waveforms
Ground Commercial Waveforms
New Military Waveforms
• SATCOM
AN/PSC-5
JTRS
–
a
family
of
common
Radios
and
Waveforms
built
around
a
standard
open
architecture
36
37. Power Amp
Receiver/ExciterPower Amp
Modem
Radio
Power Amp Receiver/Exciter
Up/Down Conv
Power Amp
Receiver/Exciter Modem
Radio
RADIO
Receiver/Exciter
Waveforms
TAClane
Modem
Radio
Modem Up/Down Conv
Radio
KG-84A/C
Up/Down Conv
Up/Down Conv
KGV-11 TAClane
TAClane
TAClane KG-84A/C
KG-84A/C
Crypto
Crypto Crypto
KG-84A/C KGV-11
Crypto
KGV-11
KGV-11
Algorithms
VME/VXI VME/VXI
JTRS Set
VME/VXI
JTRS Set
PCI
PCI PCI
VME/VXI
Data Buses
SEM-E
SEM-E SEM-E
PCI
Pentium
Pentium Pentium
SEM-E
68xxx
68xxx
68xxx
Other
Pentium
Other
Data Buses Processors
Data Processors
Vocoder Other
68xxx
Vocoder
Processors
Other Vocoder
Concept
Black
JTRS Waveforms & Crypto Algorithms
Black
Data Buses Buses Processors
Vocoder
Red
Software Communications Architecture
Red
Supplies
Black
Power
Software Communications Architecture
Protocols, Formats, Routers
Black Red
Power
COMPUTER
Supplies
Red
Power Power
Supplies Supplies
Software Defined Radio
37
38. JTRS Supporting C4ISR
Cri*cal
component…
is
mobile,
ad-‐hoc,
self-‐forming,
self-‐healing,
BLOS
networking
services
with
IP
Based
Standards
for
all
Services/All
Networks
• Goals:
– Joint
approach
– Coordinated
programs
• system
defini*on
(Interfaces
&
Boundaries)
*KEY
SET
– Eliminate
stove-‐piped
networks!
Synoptic
Stovepipes
Narrow FOV
ID- Crosshairs
Delivery
Munitions
Targets
Network
VS. Centric
Synoptic
Narrow FOV
ID- Crosshairs
Delivery
Munitions
Targets
38
40. Panel Points of Contact
Contact
Informa*on
Name Email Phone
Mr.
Cornelius
Brown
cornelius.brown.civ@mail.mil
443-‐861-‐9511
Ms.
Michell
Venters michell.h.venters.civ@mail.mil 443-‐861-‐9459
MSG
Maurice
Jones maurice.a.jones12.mil@mail.mil
804-‐721-‐6301
SFC
Vernon
Walton vernon.o.walton.mil@mail.mil
443-‐861-‐9862
42. AEC Deliverables
Safety
DTP Confirmation
Safety
Release
Live
Fire
MS B C TR
End User
TEST
AST T&E Planning
PROGRAM
Execution Evaluation - DAB
- PM
• Rapid Acquisition Initiative - T&E Concept and CLR
• Network Integration Evaluation (NIE) - Traditional Products for SUTs (Systems
under Test) and Assessment Reports for SUEs (Systems Under Evaluation)
• Forward Operational Assessment (FOA) - Supports CLRs (FOA XVIII - e.g. Stryker
MGS, Spider XM7, APMI)
A disciplined approach to ensure efficient and rigorous testing
leading to adequate evaluation of acquisition programs
42