SlideShare a Scribd company logo
Software Technologies In Defence
By
N.V.N. Chaitanya
10135A1201
Information Technology
Contents
Introduction
Need of software in Defence
Microsoft Defence Solutions
The Platform for Defence
Commercial Software Vs. Open source Software
Network Centric Warfare(NCW)
Software Solutions in Army
Software Solutions in Navy
Software Solutions in Air Force
Conclusion
5/22/2013 GVPCE(A) 2
Introduction
• Technology is a strategic weapon across all industries
and organizations, now it is also true in the case of
military and the Department of Defence(DoD).
• The DoD is well known for its hardware-based
weaponry, unmistakable in aircraft, satellite, missiles
and other systems in its arsenal for defending the
country.
5/22/2013 GVPCE(A) 3
Contd..
There are Three
major groups under
the Department of
Defence(DoD)
•Army
•Air Force
•Navy
5/22/2013 GVPCE(A) 4
Need of Software in Defence
• As the defence shifts its focus from metal and
mechanics to unmanned vehicles, drones, and smart
bombs, software is becoming a crucial piece of
weaponry.
• As an Air Force general explains it, “The B-52 aircraft
was lived and died on the quality of its sheet metal.
Today our aircraft will live or die on the quality of our
software.”
5/22/2013 GVPCE(A) 5
Contd..
• As advanced software systems and embedded
software technologies become the brains behind
modern warfare.
• From remotely piloted aircraft and smart bombs to
autonomous vehicles and advanced fighter
jets, software is crucial to the success of today’s
weapons systems.
• Measure  Source Lines of Code(SLOC)
5/22/2013 GVPCE(A) 6
Contd..
0
1000
2000
3000
4000
5000
6000
7000
SLOC
SLOC
5/22/2013 GVPCE(A) 7
Microsoft Defence Solutions
Connecting
government to
citizens
connecting
information to
government workers
connecting
government agencies
together
Microsoft Connected Government Framework
(CGF)
5/22/2013 GVPCE(A) 8
Contd..
CGF provides four
key Capabilities
Improving Command
and Control
Improving Better
Situational Awareness
Enhancing Network
Centric Operations
Deploying Innovative
Technologies
5/22/2013 GVPCE(A) 9
The Platform for Defence
• The Platform Layer : Microsoft provides a
secure, scalable and easy to manage foundation on
which defence organisations can overlay the
applications they need.
• It provides a foundation of certain capabilities on
which the technologies and applications required to
manage defence.
5/22/2013 GVPCE(A) 10
Contd..
 Applications and Devices Capability
It enables defence personnel and commanders
anywhere to work effectively using PCs, PDAs, Tablet
PCs, phones and notebooks.
Technologies :
Windows Vista™, Windows Mobile, Microsoft
Office.
5/22/2013 GVPCE(A) 11
Contd..
 Network Capability
Provide a unifying layer of common services
across your entire environment with technologies that
connect people and systems securely and reliably.
Technologies :
Windows Server, Microsoft Virtual
Server, Windows Storage Server.
5/22/2013 GVPCE(A) 12
Contd..
 Security Capability
Ensure end-to-end protection to implement
networked solutions confidently across the entire
environment.
Technologies :
Microsoft Identity Integration Server, Microsoft
Internet Security and Acceleration Server, Microsoft
Forefront™ Security.
5/22/2013 GVPCE(A) 13
Contd..
 Collaboration Capability
It Connects defence personnel and commanders
with the information and resources they need to work
more efficiently.
Technologies :
Microsoft Exchange Server, Microsoft Office
SharePoint Server, Microsoft Office Communicator.
5/22/2013 GVPCE(A) 14
Contd..
 Communications Capability:
It enable defence personnel and commanders to
Communicate in the way that suits the situation by
switching seamlessly between video
conferencing, telephone, email and instant messaging.
Technologies:
Microsoft Communications Server, Microsoft Live
Meeting.
5/22/2013 GVPCE(A) 15
Commercial Software(CS) Vs. Open
source Software(OSS)
The most obvious contrast between the two
approaches is that OSS allows the original
source code of a program to be made freely
available to the public for modification and
redistribution.
Where as CS is created by certified commercial
developers. Over the past few years, a series of
critical considerations has motivated military
organisations to adopt Commercial Software
for their mission-critical deployments for the
Security purposes.
5/22/2013 GVPCE(A) 16
Network Centric Warfare(NCW)
• Network-Centric Warfare is a
command system that
translates the rapid and
secure sharing of information
among combat superiority.
• NCW enables military
organisations to share
intelligence and information
process it and then react to it
in a timely manner.
5/22/2013 GVPCE(A) 17
Software Solutions in Army
Microsoft Military Messaging
solutions :
• It enable defence
organisations to issue
formal communications
with speed and ease.
• Official reports, notices and
other information can be
sent with integrity and
confidentiality .
• All messages are fully
auditable and can be
archived for up to 30 years.
5/22/2013 GVPCE(A) 18
Contd..
It includes Precedence
levels :
 Routine
 Urgent
 Priority
 Immediate
 Flash
Security Classification
levels:
 Unclassified
 Confidential
 Secret
 Top Secret
5/22/2013 GVPCE(A) 19
Contd..
Fusion Net:
 Fusion Net is a distributed system deployed by the U.S. Army
to disseminate ‘ground truth’ intelligence and unit
management information throughout the Battle space.
 Before Fusion Net, battlefield event information was scattered
among numerous Army systems and databases, which
couldn’t communicate with one another.
5/22/2013 GVPCE(A) 20
Contd..
 Fusion Net provides the communication of information
among different systems and databases in real time.
 It is implemented throughout the current theatre of
operations so that the data capture rate and, the information
availability rate for battlefield events to increase from 75 to
1500 percent.
5/22/2013 GVPCE(A) 21
Contd..
Distributed Common Ground System-Army (DCGS-A)
 The DCGS-A family of systems ensures that the essential
intelligence and battle space awareness information from all
intelligence sources is provided to the Army War fighter when
and where they need it.
 The system’s capabilities are based on a service-oriented
architecture (SOA) that enables the delivery of multiple levels
of intelligence data (voice, video, and geospatial) to
combatant commanders.
5/22/2013 GVPCE(A) 22
Contd..
Distributed Common Ground System-Army (DCGS-A)
 DCGS-A uses the latest cloud technology to rapidly
gather, collaborate and share intelligence data from multiple
sources to the battlefield commanders.
 With this system we can Increase the situational awareness
and reduces risk to the Commander when executing missions.
5/22/2013 GVPCE(A) 23
Software Solutions in Navy
• Polar Navy :
 It is an efficient, user friendly, cross-platform marine
navigation software.
 It provides consistent user experience with native look and
feel on Apple Mac OS , Microsoft Windows and Linux
systems, Apple iPhone and iPad mobile devices.
5/22/2013 GVPCE(A) 24
Contd..
Polar Navy consists of Three
Versions :
 Polar view NS :
 It is a complete user
friendly on-board marine
navigation system. Which
deals about the
Weather, Tides and GPS
systems.
5/22/2013 GVPCE(A) 25
Contd..
• Polar Com :
It consists of
 Comprehensive set of
navigation instruments
including
position, speed, course, win
d, depth
 Highly visible digital and
analog instruments
5/22/2013 GVPCE(A) 26
Contd..
Polar view MX :
• It is a marine app for Apple iOS.
• It acts as a Vector and Raster chart viewer for iPhone and
iPad.
5/22/2013 GVPCE(A) 27
Software Solutions in Air Force
• Net-T(Network Tactical)
 A software upgrade called Net-T effectively turns U.S. War
planes into wireless routers in the sky, Allowing ground forces
to share information with each other.
5/22/2013 GVPCE(A) 28
Contd..
 Using Net-T, commanders on the ground can share video
data, map coordinates and other information types without
the use of traditional satellite or radio communication.
 Requirement:
 The groups on the ground need 'line of sight' to the aircraft in
the air, this opens up communication possibilities to support
ground operations across all services.
5/22/2013 GVPCE(A) 29
Contd..
How to operate:
• Elliott tested Net-T on the A-10 Thunderbolt II ground attack
aircraft and said that the system doesn't require a lot of input
from the pilot once it's properly configured.
• It's a single button push, After that, the pilot must maintain
within the range and stay up with the users.
• Net-T will be in operational use by 2014.
5/22/2013 GVPCE(A) 30
Conclusion
The transition of defence from Platform centric warfare
to the Network centric warfare the usage of emerging
technologies in software is ever increased so that the Software is
becoming a crucial piece of Weaponry in the modern defence
system.
5/22/2013 GVPCE(A) 31
References
• http://www.wikipedia.com
• http://www.howstuffworks.com
• http://download.microsoft.com/download/5/8/1/581FEBAF-116D-
41B3-8CDE-1829F93C5ABE/OSSvCS_Defence_WhitePaper_W.pdf
• www.microsoft.com/industry/government/guides/dod/default.asp
x
• http://www.networkworld.com/news/2013/-airforce-wireless-
routers
• http://indianarmy.nic.in/
• www.army.mil/
• www.nausena-bharti.nic.in/
• www.ndianairforce.nic.in/
5/22/2013 GVPCE(A) 32
THANK YOU..!
5/22/2013 GVPCE(A) 33

More Related Content

Similar to softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf

A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing
IJECEIAES
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
GovCloud Network
 
Digital Security by Design Vision
Digital Security by Design VisionDigital Security by Design Vision
Digital Security by Design Vision
KTN
 
Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...
DESMOND YUEN
 
AE8751 - Unit II.pdf
AE8751 - Unit II.pdfAE8751 - Unit II.pdf
AE8751 - Unit II.pdf
Kannan Kanagaraj
 
Cloud computing
Cloud computingCloud computing
Cloud computing
SSMTUTORIALSTUTORIAL
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
IJCNCJournal
 
View Slides
View SlidesView Slides
View SlidesVideoguy
 
Cloud Computing for National Security Applications
Cloud Computing for National Security ApplicationsCloud Computing for National Security Applications
Cloud Computing for National Security Applicationswhite paper
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Cohesive Networks
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
Adil Khan
 
Military Defense Solutions Overview
Military Defense Solutions OverviewMilitary Defense Solutions Overview
Military Defense Solutions Overview
ST Engineering iDirect
 
voip
voipvoip
voip
kush01
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?
Vmwareir
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
Ollie Whitehouse
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
Angela Hays
 
Introducing Azure Sphere
Introducing Azure SphereIntroducing Azure Sphere
Introducing Azure Sphere
Mirco Vanini
 
Cloudmov: Cloud-Based Mobile Social TV
Cloudmov: Cloud-Based Mobile Social TVCloudmov: Cloud-Based Mobile Social TV
Cloudmov: Cloud-Based Mobile Social TV
IRJET Journal
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
Marco Lisi
 

Similar to softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf (20)

A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Digital Security by Design Vision
Digital Security by Design VisionDigital Security by Design Vision
Digital Security by Design Vision
 
Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...
 
AE8751 - Unit II.pdf
AE8751 - Unit II.pdfAE8751 - Unit II.pdf
AE8751 - Unit II.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
View Slides
View SlidesView Slides
View Slides
 
Cloud Computing for National Security Applications
Cloud Computing for National Security ApplicationsCloud Computing for National Security Applications
Cloud Computing for National Security Applications
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
 
Military Defense Solutions Overview
Military Defense Solutions OverviewMilitary Defense Solutions Overview
Military Defense Solutions Overview
 
Resume_Pratik
Resume_PratikResume_Pratik
Resume_Pratik
 
voip
voipvoip
voip
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
Introducing Azure Sphere
Introducing Azure SphereIntroducing Azure Sphere
Introducing Azure Sphere
 
Cloudmov: Cloud-Based Mobile Social TV
Cloudmov: Cloud-Based Mobile Social TVCloudmov: Cloud-Based Mobile Social TV
Cloudmov: Cloud-Based Mobile Social TV
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf

  • 1. Software Technologies In Defence By N.V.N. Chaitanya 10135A1201 Information Technology
  • 2. Contents Introduction Need of software in Defence Microsoft Defence Solutions The Platform for Defence Commercial Software Vs. Open source Software Network Centric Warfare(NCW) Software Solutions in Army Software Solutions in Navy Software Solutions in Air Force Conclusion 5/22/2013 GVPCE(A) 2
  • 3. Introduction • Technology is a strategic weapon across all industries and organizations, now it is also true in the case of military and the Department of Defence(DoD). • The DoD is well known for its hardware-based weaponry, unmistakable in aircraft, satellite, missiles and other systems in its arsenal for defending the country. 5/22/2013 GVPCE(A) 3
  • 4. Contd.. There are Three major groups under the Department of Defence(DoD) •Army •Air Force •Navy 5/22/2013 GVPCE(A) 4
  • 5. Need of Software in Defence • As the defence shifts its focus from metal and mechanics to unmanned vehicles, drones, and smart bombs, software is becoming a crucial piece of weaponry. • As an Air Force general explains it, “The B-52 aircraft was lived and died on the quality of its sheet metal. Today our aircraft will live or die on the quality of our software.” 5/22/2013 GVPCE(A) 5
  • 6. Contd.. • As advanced software systems and embedded software technologies become the brains behind modern warfare. • From remotely piloted aircraft and smart bombs to autonomous vehicles and advanced fighter jets, software is crucial to the success of today’s weapons systems. • Measure  Source Lines of Code(SLOC) 5/22/2013 GVPCE(A) 6
  • 8. Microsoft Defence Solutions Connecting government to citizens connecting information to government workers connecting government agencies together Microsoft Connected Government Framework (CGF) 5/22/2013 GVPCE(A) 8
  • 9. Contd.. CGF provides four key Capabilities Improving Command and Control Improving Better Situational Awareness Enhancing Network Centric Operations Deploying Innovative Technologies 5/22/2013 GVPCE(A) 9
  • 10. The Platform for Defence • The Platform Layer : Microsoft provides a secure, scalable and easy to manage foundation on which defence organisations can overlay the applications they need. • It provides a foundation of certain capabilities on which the technologies and applications required to manage defence. 5/22/2013 GVPCE(A) 10
  • 11. Contd..  Applications and Devices Capability It enables defence personnel and commanders anywhere to work effectively using PCs, PDAs, Tablet PCs, phones and notebooks. Technologies : Windows Vista™, Windows Mobile, Microsoft Office. 5/22/2013 GVPCE(A) 11
  • 12. Contd..  Network Capability Provide a unifying layer of common services across your entire environment with technologies that connect people and systems securely and reliably. Technologies : Windows Server, Microsoft Virtual Server, Windows Storage Server. 5/22/2013 GVPCE(A) 12
  • 13. Contd..  Security Capability Ensure end-to-end protection to implement networked solutions confidently across the entire environment. Technologies : Microsoft Identity Integration Server, Microsoft Internet Security and Acceleration Server, Microsoft Forefront™ Security. 5/22/2013 GVPCE(A) 13
  • 14. Contd..  Collaboration Capability It Connects defence personnel and commanders with the information and resources they need to work more efficiently. Technologies : Microsoft Exchange Server, Microsoft Office SharePoint Server, Microsoft Office Communicator. 5/22/2013 GVPCE(A) 14
  • 15. Contd..  Communications Capability: It enable defence personnel and commanders to Communicate in the way that suits the situation by switching seamlessly between video conferencing, telephone, email and instant messaging. Technologies: Microsoft Communications Server, Microsoft Live Meeting. 5/22/2013 GVPCE(A) 15
  • 16. Commercial Software(CS) Vs. Open source Software(OSS) The most obvious contrast between the two approaches is that OSS allows the original source code of a program to be made freely available to the public for modification and redistribution. Where as CS is created by certified commercial developers. Over the past few years, a series of critical considerations has motivated military organisations to adopt Commercial Software for their mission-critical deployments for the Security purposes. 5/22/2013 GVPCE(A) 16
  • 17. Network Centric Warfare(NCW) • Network-Centric Warfare is a command system that translates the rapid and secure sharing of information among combat superiority. • NCW enables military organisations to share intelligence and information process it and then react to it in a timely manner. 5/22/2013 GVPCE(A) 17
  • 18. Software Solutions in Army Microsoft Military Messaging solutions : • It enable defence organisations to issue formal communications with speed and ease. • Official reports, notices and other information can be sent with integrity and confidentiality . • All messages are fully auditable and can be archived for up to 30 years. 5/22/2013 GVPCE(A) 18
  • 19. Contd.. It includes Precedence levels :  Routine  Urgent  Priority  Immediate  Flash Security Classification levels:  Unclassified  Confidential  Secret  Top Secret 5/22/2013 GVPCE(A) 19
  • 20. Contd.. Fusion Net:  Fusion Net is a distributed system deployed by the U.S. Army to disseminate ‘ground truth’ intelligence and unit management information throughout the Battle space.  Before Fusion Net, battlefield event information was scattered among numerous Army systems and databases, which couldn’t communicate with one another. 5/22/2013 GVPCE(A) 20
  • 21. Contd..  Fusion Net provides the communication of information among different systems and databases in real time.  It is implemented throughout the current theatre of operations so that the data capture rate and, the information availability rate for battlefield events to increase from 75 to 1500 percent. 5/22/2013 GVPCE(A) 21
  • 22. Contd.. Distributed Common Ground System-Army (DCGS-A)  The DCGS-A family of systems ensures that the essential intelligence and battle space awareness information from all intelligence sources is provided to the Army War fighter when and where they need it.  The system’s capabilities are based on a service-oriented architecture (SOA) that enables the delivery of multiple levels of intelligence data (voice, video, and geospatial) to combatant commanders. 5/22/2013 GVPCE(A) 22
  • 23. Contd.. Distributed Common Ground System-Army (DCGS-A)  DCGS-A uses the latest cloud technology to rapidly gather, collaborate and share intelligence data from multiple sources to the battlefield commanders.  With this system we can Increase the situational awareness and reduces risk to the Commander when executing missions. 5/22/2013 GVPCE(A) 23
  • 24. Software Solutions in Navy • Polar Navy :  It is an efficient, user friendly, cross-platform marine navigation software.  It provides consistent user experience with native look and feel on Apple Mac OS , Microsoft Windows and Linux systems, Apple iPhone and iPad mobile devices. 5/22/2013 GVPCE(A) 24
  • 25. Contd.. Polar Navy consists of Three Versions :  Polar view NS :  It is a complete user friendly on-board marine navigation system. Which deals about the Weather, Tides and GPS systems. 5/22/2013 GVPCE(A) 25
  • 26. Contd.. • Polar Com : It consists of  Comprehensive set of navigation instruments including position, speed, course, win d, depth  Highly visible digital and analog instruments 5/22/2013 GVPCE(A) 26
  • 27. Contd.. Polar view MX : • It is a marine app for Apple iOS. • It acts as a Vector and Raster chart viewer for iPhone and iPad. 5/22/2013 GVPCE(A) 27
  • 28. Software Solutions in Air Force • Net-T(Network Tactical)  A software upgrade called Net-T effectively turns U.S. War planes into wireless routers in the sky, Allowing ground forces to share information with each other. 5/22/2013 GVPCE(A) 28
  • 29. Contd..  Using Net-T, commanders on the ground can share video data, map coordinates and other information types without the use of traditional satellite or radio communication.  Requirement:  The groups on the ground need 'line of sight' to the aircraft in the air, this opens up communication possibilities to support ground operations across all services. 5/22/2013 GVPCE(A) 29
  • 30. Contd.. How to operate: • Elliott tested Net-T on the A-10 Thunderbolt II ground attack aircraft and said that the system doesn't require a lot of input from the pilot once it's properly configured. • It's a single button push, After that, the pilot must maintain within the range and stay up with the users. • Net-T will be in operational use by 2014. 5/22/2013 GVPCE(A) 30
  • 31. Conclusion The transition of defence from Platform centric warfare to the Network centric warfare the usage of emerging technologies in software is ever increased so that the Software is becoming a crucial piece of Weaponry in the modern defence system. 5/22/2013 GVPCE(A) 31
  • 32. References • http://www.wikipedia.com • http://www.howstuffworks.com • http://download.microsoft.com/download/5/8/1/581FEBAF-116D- 41B3-8CDE-1829F93C5ABE/OSSvCS_Defence_WhitePaper_W.pdf • www.microsoft.com/industry/government/guides/dod/default.asp x • http://www.networkworld.com/news/2013/-airforce-wireless- routers • http://indianarmy.nic.in/ • www.army.mil/ • www.nausena-bharti.nic.in/ • www.ndianairforce.nic.in/ 5/22/2013 GVPCE(A) 32