The document discusses the increasing importance of software technologies in military defence. It outlines how the three main branches of a country's defence department (army, navy, air force) rely on specialized software solutions. The army uses systems like Fusion Net and DCGS-A to share battlefield intelligence in real-time. The navy utilizes marine navigation software like Polar Navy. And the air force is developing technologies like Net-T to turn aircraft into wireless routers, extending network connectivity to ground forces. As defence modernizes, software is becoming a crucial component of new weaponry and networked warfare.
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
Assured C2 sets conditions for Navy commanders to maintain the IT- enabled ability to exercise C2 authorities across the sea, land, air, space, and cyberspace domains in heavily contested or denied operating conditions.
Navy must continue to clearly define and manage capability-based Assured C2 requirements and resources, and align those requirements and resources with JIE/IC ITE through the IDEA
The primary beneficiaries of the effort to deliver Assured C2 capabilities are the requirements stakeholders: USFF, USPACFLT, and USFLTCYBERCOM subordinate commanders who execute Navy’s warfighting mission in all domains.
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...ICSA, LLC
In this presentation by Mr Victor King, L-3 Mission Integration, to the Williams Foundation, the focus was upon how to leverage commercial technologies to augment C2 and ISR capabilities for the ADF.
The seminar focused on the way ahead with regard to air-land integration.
Air Force needs to be capable of delivering air and space power effects to support conventional and special operations in the land domain. Air Force’s Plan Jericho and Army’s Plan Beersheba need to align if there is to be a coordinated approach to integrating air base operations, air mobility, close air support, intelligence, surveillance and reconnaissance (ISR) and rotary wing aviation. To date, little attention has been paid to the integration of technology across service lines, the development of integrated tactics, techniques and procedures (TTPs) and a coherent joint collective training program. Air Force and Army need to remediate existing deficiencies and implement a capability management process that leaves it postured to take advantage of the transformative nature of fifth generation technology. The seminar explored the art of the possible in future Air-Land operations.
Ctek Cellular Automation & Control Catalag 2014Lynn Woodruff
Your remote automation project is almost certainly going to need communications, and increasingly cellular communications is being recognized as the cost/performance leader. Now it’s time to take the next step and build your automation application on the same platform that is providing communications capabilities.
When configured with Ctek’s Automation Control application a SkyRouter is capable of interfacing to industry standard sensors and has all of the required logic to monitor inputs, control outputs, and react instantly to the requirements of your application.
This is the ultimate one-box solution for water/wastewater, motor-generator control, agricultural facilities, irrigation, lighting control, asset management, and much more.
Call me or go to http://www.ctekproducts.com and tell them Lynn sent you.
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the May Edition:
• Dell EMC takes open networking to the edge for next-generation access.
• Microsoft announces new intelligent security innovations
• Powering partners’ transformation - Pradeep Kumar, Principal Consultant, Security, Redington Value.
• Redington Value signs new vendor partnerships.
• Fortinet delivers integrated NOC-SOC solution.
• HPE to acquire Cape Networks.
• Malwarebytes introduces endpoint protection and response solution.
• Mimecast offers cyber resilience for email with new capabilities.
• SonicWall announces Capture Cloud Platform.
• Veritas revamps channel program to drive partner growth.
• Red Hat announces availability of Red Hat Storage One.
• AWS announces Amazon S3 One Zone-Infrequent Access(Z-IA).
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
Assured C2 sets conditions for Navy commanders to maintain the IT- enabled ability to exercise C2 authorities across the sea, land, air, space, and cyberspace domains in heavily contested or denied operating conditions.
Navy must continue to clearly define and manage capability-based Assured C2 requirements and resources, and align those requirements and resources with JIE/IC ITE through the IDEA
The primary beneficiaries of the effort to deliver Assured C2 capabilities are the requirements stakeholders: USFF, USPACFLT, and USFLTCYBERCOM subordinate commanders who execute Navy’s warfighting mission in all domains.
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...ICSA, LLC
In this presentation by Mr Victor King, L-3 Mission Integration, to the Williams Foundation, the focus was upon how to leverage commercial technologies to augment C2 and ISR capabilities for the ADF.
The seminar focused on the way ahead with regard to air-land integration.
Air Force needs to be capable of delivering air and space power effects to support conventional and special operations in the land domain. Air Force’s Plan Jericho and Army’s Plan Beersheba need to align if there is to be a coordinated approach to integrating air base operations, air mobility, close air support, intelligence, surveillance and reconnaissance (ISR) and rotary wing aviation. To date, little attention has been paid to the integration of technology across service lines, the development of integrated tactics, techniques and procedures (TTPs) and a coherent joint collective training program. Air Force and Army need to remediate existing deficiencies and implement a capability management process that leaves it postured to take advantage of the transformative nature of fifth generation technology. The seminar explored the art of the possible in future Air-Land operations.
Ctek Cellular Automation & Control Catalag 2014Lynn Woodruff
Your remote automation project is almost certainly going to need communications, and increasingly cellular communications is being recognized as the cost/performance leader. Now it’s time to take the next step and build your automation application on the same platform that is providing communications capabilities.
When configured with Ctek’s Automation Control application a SkyRouter is capable of interfacing to industry standard sensors and has all of the required logic to monitor inputs, control outputs, and react instantly to the requirements of your application.
This is the ultimate one-box solution for water/wastewater, motor-generator control, agricultural facilities, irrigation, lighting control, asset management, and much more.
Call me or go to http://www.ctekproducts.com and tell them Lynn sent you.
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the May Edition:
• Dell EMC takes open networking to the edge for next-generation access.
• Microsoft announces new intelligent security innovations
• Powering partners’ transformation - Pradeep Kumar, Principal Consultant, Security, Redington Value.
• Redington Value signs new vendor partnerships.
• Fortinet delivers integrated NOC-SOC solution.
• HPE to acquire Cape Networks.
• Malwarebytes introduces endpoint protection and response solution.
• Mimecast offers cyber resilience for email with new capabilities.
• SonicWall announces Capture Cloud Platform.
• Veritas revamps channel program to drive partner growth.
• Red Hat announces availability of Red Hat Storage One.
• AWS announces Amazon S3 One Zone-Infrequent Access(Z-IA).
A secure sharing control framework supporting elastic mobile cloud computing IJECEIAES
In elastic mobile cloud computing (EMCC), mobile devices migrate some computing tasks to the cloud for execution according to current needs and seamlessly and transparently use cloud resources to enhance their functions. First, based on the summary of existing EMCC schemes, a generic EMCC framework is abstracted; it is pointed out that the migration of sensitive modules in the EMCC program can bring security risks such as privacy leakage and information flow hijacking to EMCC; then, a generic framework of elastic mobile cloud computing that incorporates risk management is designed, which regards security risks as a cost of EMCC and ensures that the use of EMCC is. Finally, it is pointed out that the difficulty of risk management lies in risk quantification and sensitive module labeling. In this regard, risk quantification algorithms are designed, an automatic annotation tool for sensitive modules of Android programs is implemented, and the accuracy of the automatic annotation is demonstrated through experiments.
The ISCF Digital Security by Design (DSbD) team has launched an up to £5.8 million Expression of Interest (EOI) for UK businesses to collaborate on digital security by design business-led demonstrator project in which an additional technology ingredient or ingredients are required. The competition currently closing on 15th April at noon, however it is subject to review.
Edge computing from standard to actual infrastructure deployment and software...DESMOND YUEN
Edge Computing is widely recognized as a key technology, supporting innovative services for a wide
ecosystem of companies, ranging from operators, infrastructure owners, technology leaders, application
and content providers, innovators, startups, etc.
The advent of 5G systems has also increased the attention to Edge Computing [1][2], as this technology
supports many of the most challenging 5G use cases, especially those for which high end-to-end (E2E)
performances are required. In fact, due to the presence of processing platforms and application
endpoints in close proximity to end-users, Edge Computing offers a low latency environment and
significant gains in terms of network bandwidth, which are key benefits for the deployment of 5G
networks
Cloud computing challenges and solutionsIJCNCJournal
Cloud computing is an emerging area of computer technology that benefits form the processing power and
the computing resources of many connected, geographically distanced computers connected via Internet.
Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet
users requirements and applications. It can be thought of or considered as a complete or a partial
outsourcing of hardware and software resources. To access cloud applications, a good Internet connection
and a standard Internet browser are required. Cloud computing has its own drawback from the security
point of view; this paper aims to address most of these threats and their possible solutions.
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Control and secure your applications on IBM SmartCloud Enterprise with Software Defined Networking from CohesiveFT.
An IBM SmartCloud ready partner, CohesiveFT address issues of security and control to allow customers to take full advantage of cloud computing. Cohesive FT’s VNS3 Software Defined Networking is an overlay network which allows you to extend your data centers into the cloud, join clouds together and have control over end to end 256 bit encryption, IP addressing, topology and multicast protocols.
The joint IBM and Cohesive webinar aired on June 20
ST Engineering iDirect’s broadband capabilities provide secure
connectivity for all voice, video and data communications and
specialized applications for assured access in even the most
challenging environments.
Private sector cyber resilience and the role of data diodesOllie Whitehouse
This whitepaper intended for enterprise architects and cyber security professionals looks at the role of data diodes in modern network design and operation.
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSMarco Lisi
Lesson on "Security in large, Strategic and Complex Systems" at the "Master di II Livello" in "Homeland Security" -
Università degli Studi Campus Bio-Medico di Roma, A. A. 2012-2013
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
A secure sharing control framework supporting elastic mobile cloud computing IJECEIAES
In elastic mobile cloud computing (EMCC), mobile devices migrate some computing tasks to the cloud for execution according to current needs and seamlessly and transparently use cloud resources to enhance their functions. First, based on the summary of existing EMCC schemes, a generic EMCC framework is abstracted; it is pointed out that the migration of sensitive modules in the EMCC program can bring security risks such as privacy leakage and information flow hijacking to EMCC; then, a generic framework of elastic mobile cloud computing that incorporates risk management is designed, which regards security risks as a cost of EMCC and ensures that the use of EMCC is. Finally, it is pointed out that the difficulty of risk management lies in risk quantification and sensitive module labeling. In this regard, risk quantification algorithms are designed, an automatic annotation tool for sensitive modules of Android programs is implemented, and the accuracy of the automatic annotation is demonstrated through experiments.
The ISCF Digital Security by Design (DSbD) team has launched an up to £5.8 million Expression of Interest (EOI) for UK businesses to collaborate on digital security by design business-led demonstrator project in which an additional technology ingredient or ingredients are required. The competition currently closing on 15th April at noon, however it is subject to review.
Edge computing from standard to actual infrastructure deployment and software...DESMOND YUEN
Edge Computing is widely recognized as a key technology, supporting innovative services for a wide
ecosystem of companies, ranging from operators, infrastructure owners, technology leaders, application
and content providers, innovators, startups, etc.
The advent of 5G systems has also increased the attention to Edge Computing [1][2], as this technology
supports many of the most challenging 5G use cases, especially those for which high end-to-end (E2E)
performances are required. In fact, due to the presence of processing platforms and application
endpoints in close proximity to end-users, Edge Computing offers a low latency environment and
significant gains in terms of network bandwidth, which are key benefits for the deployment of 5G
networks
Cloud computing challenges and solutionsIJCNCJournal
Cloud computing is an emerging area of computer technology that benefits form the processing power and
the computing resources of many connected, geographically distanced computers connected via Internet.
Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet
users requirements and applications. It can be thought of or considered as a complete or a partial
outsourcing of hardware and software resources. To access cloud applications, a good Internet connection
and a standard Internet browser are required. Cloud computing has its own drawback from the security
point of view; this paper aims to address most of these threats and their possible solutions.
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Control and secure your applications on IBM SmartCloud Enterprise with Software Defined Networking from CohesiveFT.
An IBM SmartCloud ready partner, CohesiveFT address issues of security and control to allow customers to take full advantage of cloud computing. Cohesive FT’s VNS3 Software Defined Networking is an overlay network which allows you to extend your data centers into the cloud, join clouds together and have control over end to end 256 bit encryption, IP addressing, topology and multicast protocols.
The joint IBM and Cohesive webinar aired on June 20
ST Engineering iDirect’s broadband capabilities provide secure
connectivity for all voice, video and data communications and
specialized applications for assured access in even the most
challenging environments.
Private sector cyber resilience and the role of data diodesOllie Whitehouse
This whitepaper intended for enterprise architects and cyber security professionals looks at the role of data diodes in modern network design and operation.
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSMarco Lisi
Lesson on "Security in large, Strategic and Complex Systems" at the "Master di II Livello" in "Homeland Security" -
Università degli Studi Campus Bio-Medico di Roma, A. A. 2012-2013
Similar to softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf (20)
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
2. Contents
Introduction
Need of software in Defence
Microsoft Defence Solutions
The Platform for Defence
Commercial Software Vs. Open source Software
Network Centric Warfare(NCW)
Software Solutions in Army
Software Solutions in Navy
Software Solutions in Air Force
Conclusion
5/22/2013 GVPCE(A) 2
3. Introduction
• Technology is a strategic weapon across all industries
and organizations, now it is also true in the case of
military and the Department of Defence(DoD).
• The DoD is well known for its hardware-based
weaponry, unmistakable in aircraft, satellite, missiles
and other systems in its arsenal for defending the
country.
5/22/2013 GVPCE(A) 3
4. Contd..
There are Three
major groups under
the Department of
Defence(DoD)
•Army
•Air Force
•Navy
5/22/2013 GVPCE(A) 4
5. Need of Software in Defence
• As the defence shifts its focus from metal and
mechanics to unmanned vehicles, drones, and smart
bombs, software is becoming a crucial piece of
weaponry.
• As an Air Force general explains it, “The B-52 aircraft
was lived and died on the quality of its sheet metal.
Today our aircraft will live or die on the quality of our
software.”
5/22/2013 GVPCE(A) 5
6. Contd..
• As advanced software systems and embedded
software technologies become the brains behind
modern warfare.
• From remotely piloted aircraft and smart bombs to
autonomous vehicles and advanced fighter
jets, software is crucial to the success of today’s
weapons systems.
• Measure Source Lines of Code(SLOC)
5/22/2013 GVPCE(A) 6
8. Microsoft Defence Solutions
Connecting
government to
citizens
connecting
information to
government workers
connecting
government agencies
together
Microsoft Connected Government Framework
(CGF)
5/22/2013 GVPCE(A) 8
9. Contd..
CGF provides four
key Capabilities
Improving Command
and Control
Improving Better
Situational Awareness
Enhancing Network
Centric Operations
Deploying Innovative
Technologies
5/22/2013 GVPCE(A) 9
10. The Platform for Defence
• The Platform Layer : Microsoft provides a
secure, scalable and easy to manage foundation on
which defence organisations can overlay the
applications they need.
• It provides a foundation of certain capabilities on
which the technologies and applications required to
manage defence.
5/22/2013 GVPCE(A) 10
11. Contd..
Applications and Devices Capability
It enables defence personnel and commanders
anywhere to work effectively using PCs, PDAs, Tablet
PCs, phones and notebooks.
Technologies :
Windows Vista™, Windows Mobile, Microsoft
Office.
5/22/2013 GVPCE(A) 11
12. Contd..
Network Capability
Provide a unifying layer of common services
across your entire environment with technologies that
connect people and systems securely and reliably.
Technologies :
Windows Server, Microsoft Virtual
Server, Windows Storage Server.
5/22/2013 GVPCE(A) 12
13. Contd..
Security Capability
Ensure end-to-end protection to implement
networked solutions confidently across the entire
environment.
Technologies :
Microsoft Identity Integration Server, Microsoft
Internet Security and Acceleration Server, Microsoft
Forefront™ Security.
5/22/2013 GVPCE(A) 13
14. Contd..
Collaboration Capability
It Connects defence personnel and commanders
with the information and resources they need to work
more efficiently.
Technologies :
Microsoft Exchange Server, Microsoft Office
SharePoint Server, Microsoft Office Communicator.
5/22/2013 GVPCE(A) 14
15. Contd..
Communications Capability:
It enable defence personnel and commanders to
Communicate in the way that suits the situation by
switching seamlessly between video
conferencing, telephone, email and instant messaging.
Technologies:
Microsoft Communications Server, Microsoft Live
Meeting.
5/22/2013 GVPCE(A) 15
16. Commercial Software(CS) Vs. Open
source Software(OSS)
The most obvious contrast between the two
approaches is that OSS allows the original
source code of a program to be made freely
available to the public for modification and
redistribution.
Where as CS is created by certified commercial
developers. Over the past few years, a series of
critical considerations has motivated military
organisations to adopt Commercial Software
for their mission-critical deployments for the
Security purposes.
5/22/2013 GVPCE(A) 16
17. Network Centric Warfare(NCW)
• Network-Centric Warfare is a
command system that
translates the rapid and
secure sharing of information
among combat superiority.
• NCW enables military
organisations to share
intelligence and information
process it and then react to it
in a timely manner.
5/22/2013 GVPCE(A) 17
18. Software Solutions in Army
Microsoft Military Messaging
solutions :
• It enable defence
organisations to issue
formal communications
with speed and ease.
• Official reports, notices and
other information can be
sent with integrity and
confidentiality .
• All messages are fully
auditable and can be
archived for up to 30 years.
5/22/2013 GVPCE(A) 18
20. Contd..
Fusion Net:
Fusion Net is a distributed system deployed by the U.S. Army
to disseminate ‘ground truth’ intelligence and unit
management information throughout the Battle space.
Before Fusion Net, battlefield event information was scattered
among numerous Army systems and databases, which
couldn’t communicate with one another.
5/22/2013 GVPCE(A) 20
21. Contd..
Fusion Net provides the communication of information
among different systems and databases in real time.
It is implemented throughout the current theatre of
operations so that the data capture rate and, the information
availability rate for battlefield events to increase from 75 to
1500 percent.
5/22/2013 GVPCE(A) 21
22. Contd..
Distributed Common Ground System-Army (DCGS-A)
The DCGS-A family of systems ensures that the essential
intelligence and battle space awareness information from all
intelligence sources is provided to the Army War fighter when
and where they need it.
The system’s capabilities are based on a service-oriented
architecture (SOA) that enables the delivery of multiple levels
of intelligence data (voice, video, and geospatial) to
combatant commanders.
5/22/2013 GVPCE(A) 22
23. Contd..
Distributed Common Ground System-Army (DCGS-A)
DCGS-A uses the latest cloud technology to rapidly
gather, collaborate and share intelligence data from multiple
sources to the battlefield commanders.
With this system we can Increase the situational awareness
and reduces risk to the Commander when executing missions.
5/22/2013 GVPCE(A) 23
24. Software Solutions in Navy
• Polar Navy :
It is an efficient, user friendly, cross-platform marine
navigation software.
It provides consistent user experience with native look and
feel on Apple Mac OS , Microsoft Windows and Linux
systems, Apple iPhone and iPad mobile devices.
5/22/2013 GVPCE(A) 24
25. Contd..
Polar Navy consists of Three
Versions :
Polar view NS :
It is a complete user
friendly on-board marine
navigation system. Which
deals about the
Weather, Tides and GPS
systems.
5/22/2013 GVPCE(A) 25
26. Contd..
• Polar Com :
It consists of
Comprehensive set of
navigation instruments
including
position, speed, course, win
d, depth
Highly visible digital and
analog instruments
5/22/2013 GVPCE(A) 26
27. Contd..
Polar view MX :
• It is a marine app for Apple iOS.
• It acts as a Vector and Raster chart viewer for iPhone and
iPad.
5/22/2013 GVPCE(A) 27
28. Software Solutions in Air Force
• Net-T(Network Tactical)
A software upgrade called Net-T effectively turns U.S. War
planes into wireless routers in the sky, Allowing ground forces
to share information with each other.
5/22/2013 GVPCE(A) 28
29. Contd..
Using Net-T, commanders on the ground can share video
data, map coordinates and other information types without
the use of traditional satellite or radio communication.
Requirement:
The groups on the ground need 'line of sight' to the aircraft in
the air, this opens up communication possibilities to support
ground operations across all services.
5/22/2013 GVPCE(A) 29
30. Contd..
How to operate:
• Elliott tested Net-T on the A-10 Thunderbolt II ground attack
aircraft and said that the system doesn't require a lot of input
from the pilot once it's properly configured.
• It's a single button push, After that, the pilot must maintain
within the range and stay up with the users.
• Net-T will be in operational use by 2014.
5/22/2013 GVPCE(A) 30
31. Conclusion
The transition of defence from Platform centric warfare
to the Network centric warfare the usage of emerging
technologies in software is ever increased so that the Software is
becoming a crucial piece of Weaponry in the modern defence
system.
5/22/2013 GVPCE(A) 31