Centre for Defence Enterprise themed call for research proposals. This call closes on Monday 25 February 2013. See http://www.science.mod.uk/events/event_detail.aspx?eventid=198 for more information.
3rd Future Armoured Vehicles Survivability Tâm Leclancher
As the only event purely dedicated to the area of vehicle protection, Future Armoured Vehicles Survivability aims to deliver a strong focus on the relationship between current requirements, emerging technologies and how these might be leveraged to enhance force protection.
Importantly, a key differentiator this year will be a dedicated pre-conference focus day on Active Protection System covering soft/hard kill active protection in detail. The three-day programme will cover the core areas of survivability in detail, exploring the latest platforms, vehicle architectures, passive/active protection, mobility, counter-IED, EW, un-manned/autonomous solutions, signature management and much more!
Featured speakers will include: Advanced Blast and Ballistic Systems, ARTEC GmbH, British Army, Bundeswehr Technical Centre for Protective and Special Technologies , Czech Military Research Institute, Danish Defence and Acquisition Organisation, DSTL, German Army, IMI Systems, IMP Castle Associates Limited, Israeli MoD, Krauss Maffei Wegmann, Lockheed Martin UK, NATO, Pearson Engineering, SOUCY DEFENSE, Swedish Defence Research Agency, TNO, United States Army, United States Marine Corps, US Army, UTC Aerospace Systems and Vetronics Research Centre
What’s new for 2017:
• National capability development updates from the British Army, DSTL, US Army, German Army, US Marine Corps and many more
• A key focus on the technology that goes into providing enhanced protection. Hear from industry leaders, including ARTEC, IMI Systems, KMW and Lockheed Martin,
• A pre-conference focus day exploring the development and integration of hard/soft kill active protection systems (APS)
Early bird offers and special military rates available. Register online at http://www.favsurvivability.com/li
How to plan and execute reliable offshore installation projects in hostile, farshore and deepwater environments.
This unique event will give you unrivalled networking opportunities as well as a chance to hear how other leading offshore wind companies have tackled issues such as:
*Offshore Construction - Logistics and strategy
*Vessel Avaliability and suitability
*Deepwater solutions - foundations and other technology
*Subsea cables and installation
*Manpower expertise - recruitment, training and Health & Safety
Mena Fire Safety Conference Qatar April 2011harrissafety
Fire Safety MENA 2011 will provide a platform for government ministries and industry experts including developers, contractors, architects and consultants to share and gain knowledge in this increasingly critical market.
Discover how to achieve best-practice fire risk management and integrate cost-effective, state-of-the-art strategies that mitigate fire hazards.
Learn from the experience of regional experts on how to comply to regional fire safety codes, regulations and standards across the Middle East and North Africa region.
Ship Safety 2009 will provide you with a forum for discussing cutting edge safety information and the opportunity to network with top executives from the shipping industry. Furthermore you will discover the strategies that have been implemented by Europe’s leading ship organisations who will not only uncover the challenges they are currently facing but also how they have maximised security and increased their performance.
Ship Safety 2009 brings together all the major global experts under one roof to share their insights on uncovering all safety challenges in ships by incorporating safety measures across the entire shipping organisation. This cant-miss conference is an ideal and significant opportunity to bring together the major players in the industry to:
Review the latest technology that will move fire protection and safety forward within the shipping industry
Assess all aspects of passive fire protection and fire behaviour to gain a better understanding of safety management
Evaluate individual ship security risk assessments and plans to determine ISPS code compliance and where the gaps may lie
Examine the long term perspectives of sustainable safety practices
Instil the right training skills within crew members to meet safety objectives on day-to-day occurrences to better prepare them for future hazardous incidents
And much more!
We have also incorporated a masterclass covering the key issues within ship safety today. This will be led by a first-hand expert, who is himself a survivor of the great tragedy that befell the MS Estonia. He will share not only his strategies for survival on that fatal day but how this experience has given him both the strength and insight for leadership management and instilling this quality in others. Through practical examples, a real-life case study and group sessions, this masterclass will arm you with the tools that you will need to optimise ship security whilst meeting both business and safety requirements.
3rd Future Armoured Vehicles Survivability Tâm Leclancher
As the only event purely dedicated to the area of vehicle protection, Future Armoured Vehicles Survivability aims to deliver a strong focus on the relationship between current requirements, emerging technologies and how these might be leveraged to enhance force protection.
Importantly, a key differentiator this year will be a dedicated pre-conference focus day on Active Protection System covering soft/hard kill active protection in detail. The three-day programme will cover the core areas of survivability in detail, exploring the latest platforms, vehicle architectures, passive/active protection, mobility, counter-IED, EW, un-manned/autonomous solutions, signature management and much more!
Featured speakers will include: Advanced Blast and Ballistic Systems, ARTEC GmbH, British Army, Bundeswehr Technical Centre for Protective and Special Technologies , Czech Military Research Institute, Danish Defence and Acquisition Organisation, DSTL, German Army, IMI Systems, IMP Castle Associates Limited, Israeli MoD, Krauss Maffei Wegmann, Lockheed Martin UK, NATO, Pearson Engineering, SOUCY DEFENSE, Swedish Defence Research Agency, TNO, United States Army, United States Marine Corps, US Army, UTC Aerospace Systems and Vetronics Research Centre
What’s new for 2017:
• National capability development updates from the British Army, DSTL, US Army, German Army, US Marine Corps and many more
• A key focus on the technology that goes into providing enhanced protection. Hear from industry leaders, including ARTEC, IMI Systems, KMW and Lockheed Martin,
• A pre-conference focus day exploring the development and integration of hard/soft kill active protection systems (APS)
Early bird offers and special military rates available. Register online at http://www.favsurvivability.com/li
How to plan and execute reliable offshore installation projects in hostile, farshore and deepwater environments.
This unique event will give you unrivalled networking opportunities as well as a chance to hear how other leading offshore wind companies have tackled issues such as:
*Offshore Construction - Logistics and strategy
*Vessel Avaliability and suitability
*Deepwater solutions - foundations and other technology
*Subsea cables and installation
*Manpower expertise - recruitment, training and Health & Safety
Mena Fire Safety Conference Qatar April 2011harrissafety
Fire Safety MENA 2011 will provide a platform for government ministries and industry experts including developers, contractors, architects and consultants to share and gain knowledge in this increasingly critical market.
Discover how to achieve best-practice fire risk management and integrate cost-effective, state-of-the-art strategies that mitigate fire hazards.
Learn from the experience of regional experts on how to comply to regional fire safety codes, regulations and standards across the Middle East and North Africa region.
Ship Safety 2009 will provide you with a forum for discussing cutting edge safety information and the opportunity to network with top executives from the shipping industry. Furthermore you will discover the strategies that have been implemented by Europe’s leading ship organisations who will not only uncover the challenges they are currently facing but also how they have maximised security and increased their performance.
Ship Safety 2009 brings together all the major global experts under one roof to share their insights on uncovering all safety challenges in ships by incorporating safety measures across the entire shipping organisation. This cant-miss conference is an ideal and significant opportunity to bring together the major players in the industry to:
Review the latest technology that will move fire protection and safety forward within the shipping industry
Assess all aspects of passive fire protection and fire behaviour to gain a better understanding of safety management
Evaluate individual ship security risk assessments and plans to determine ISPS code compliance and where the gaps may lie
Examine the long term perspectives of sustainable safety practices
Instil the right training skills within crew members to meet safety objectives on day-to-day occurrences to better prepare them for future hazardous incidents
And much more!
We have also incorporated a masterclass covering the key issues within ship safety today. This will be led by a first-hand expert, who is himself a survivor of the great tragedy that befell the MS Estonia. He will share not only his strategies for survival on that fatal day but how this experience has given him both the strength and insight for leadership management and instilling this quality in others. Through practical examples, a real-life case study and group sessions, this masterclass will arm you with the tools that you will need to optimise ship security whilst meeting both business and safety requirements.
Presentation slides from CDE themed call launch event on 18 June - for full details of this call for research proposals see http://www.science.mod.uk/events/event_detail.aspx?eventid=259
Presentation slides from CDE themed call launch webinar on 23 July 2013. For full details of this call for research proposals see: http://www.science.mod.uk/events/event_detail.aspx?eventid=269
Presentations from CDE themed call launch event on 21 February 2013. For more information on the call visit: http://www.science.mod.uk/events/event_detail.aspx?eventid=200
Presentations from CDE themed call launch event on 19 March 2013. For full details of the call see: http://www.science.mod.uk/events/event_detail.aspx?eventid=202
Centre for Defence Enterprise webinar on 18 December 2013. Featuring presentations from Dstl Programme Managers for integrated sensing, assured information infrastructure, C2I2, and dismounted soldier systems.
Launch of CDE themed call for research proposals "Generic Enablers for Low Size, Weight, Power and Cost ISTAR". Call closes Friday 15 March 2013 at 1700 hrs. For more information visit: http://www.science.mod.uk/events/event_detail.aspx?eventid=199
Innovations Magazine for the third quarter of 2013 brings you stories including the following: ”Powerful Disruption” - TDW’s Engineering Development Program is moving the world forward, “Proactive Thinking” - President and CEO Bruce Binkley describes TDW’s transformative shift
in how it relates to the market, “Safety Matters: A Near Miss”- Addressing safety hazards through near-miss reporting, “Faces and Places” - Looking at TDW events and projects from around the globe, “Cover Story: Crisis…It’s Coming” - TDW provides comprehensive assessment, planning, tools and execution
to mitigate damage in advance of pipeline failure, “Five Questions: SpirALL® EMAT” - TDW’s unique Electro Magnetic Acoustic Transducer defect detection technology and “TDW on Tour” - Find out where and when you can see TDW technology in person.
Presentations from CDE themed call launch event on 23 April 2013 - for full details of this call see: http://www.science.mod.uk/events/event_detail.aspx?eventid=201
Project Controls Expo 09/10 Nov London 2011 - Project Controls in Counter‐Imp...Project Controls Expo
Index
Introduction to BMT.
Our Work in C‐IED.
Challenges in Managing C‐IED Projects.
Tailored Approach to Project Control.
Benefits to the Client and their Equipment Suppliers.
Questions.
Presentation slides from CDE themed call launch event on 18 June - for full details of this call for research proposals see http://www.science.mod.uk/events/event_detail.aspx?eventid=259
Presentation slides from CDE themed call launch webinar on 23 July 2013. For full details of this call for research proposals see: http://www.science.mod.uk/events/event_detail.aspx?eventid=269
Presentations from CDE themed call launch event on 21 February 2013. For more information on the call visit: http://www.science.mod.uk/events/event_detail.aspx?eventid=200
Presentations from CDE themed call launch event on 19 March 2013. For full details of the call see: http://www.science.mod.uk/events/event_detail.aspx?eventid=202
Centre for Defence Enterprise webinar on 18 December 2013. Featuring presentations from Dstl Programme Managers for integrated sensing, assured information infrastructure, C2I2, and dismounted soldier systems.
Launch of CDE themed call for research proposals "Generic Enablers for Low Size, Weight, Power and Cost ISTAR". Call closes Friday 15 March 2013 at 1700 hrs. For more information visit: http://www.science.mod.uk/events/event_detail.aspx?eventid=199
Innovations Magazine for the third quarter of 2013 brings you stories including the following: ”Powerful Disruption” - TDW’s Engineering Development Program is moving the world forward, “Proactive Thinking” - President and CEO Bruce Binkley describes TDW’s transformative shift
in how it relates to the market, “Safety Matters: A Near Miss”- Addressing safety hazards through near-miss reporting, “Faces and Places” - Looking at TDW events and projects from around the globe, “Cover Story: Crisis…It’s Coming” - TDW provides comprehensive assessment, planning, tools and execution
to mitigate damage in advance of pipeline failure, “Five Questions: SpirALL® EMAT” - TDW’s unique Electro Magnetic Acoustic Transducer defect detection technology and “TDW on Tour” - Find out where and when you can see TDW technology in person.
Presentations from CDE themed call launch event on 23 April 2013 - for full details of this call see: http://www.science.mod.uk/events/event_detail.aspx?eventid=201
Project Controls Expo 09/10 Nov London 2011 - Project Controls in Counter‐Imp...Project Controls Expo
Index
Introduction to BMT.
Our Work in C‐IED.
Challenges in Managing C‐IED Projects.
Tailored Approach to Project Control.
Benefits to the Client and their Equipment Suppliers.
Questions.
DASA Innovation Partner, Tony Collins, discusses International Outreach.
DASA Senior Exploitation Manager, Eleanor Rice, discusses exploitation of innovation.
DASA Access to Mentoring and Finance Lead, Alan Scrase, discusses how his support will add value
Defence and Security Accelerator seminar presentation at Innovate 2017
Case study: Our Accelerator journey - Blue Bear Systems
Presented by Dr Lucy Mason, Ben Whitaker & Dr Yoge Patel.
9 November 2017
Defence and Security Accelerator
Part 2 - Finding, funding and exploiting innovations for the benefit of defence and security
Challenge and Opportunity
Jim Pennycook, Innovation Partner
DSEI 2017
Beyond battery power is a Centre for Defence Enterprise (CDE) themed competition. Second part in the competition outline focusing on future autonomy and removing the technical hurdles.
An introduction to the themed competition and an overview of how it would be applied in a military setting. Presentation first shown on 1 December 2016.
Introduction to innovation and network event hosted by the Centre for Defence Enterprise. This presentation outlines CDE's role and signposts the future direction of the project.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
Strengthening the Security of Maritime Operations - CDE themed call launch presentations 24 Jan 2013
1.
2. Agenda
10:00 Introduction to CDE
10:25 Maritime security problems & challenges
11:00 Technical Q&A
11:10 BREAK
Previous CDE activity case study on
11:40
maritime security
12:00 Perspective from horizon scanning
12:20 Technical challenges summary
12:40 CDE proposal guidance + general Q&A
13:00 LUNCH
14:00 One-to-one meetings
3. Centre for Defence Enterprise
Strengthening the Security
of Maritime Operations
Centre for Defence Enterprise
Crown Copyright
www.science.mod.uk/enterprise cde@dstl.gov.uk
(c) 2013 Dstl
UNCLASSIFIED / FOR PUBLIC RELEASE
4. Centre for Defence Enterprise
Supporting Innovators
Centre for Defence Enterprise
Crown Copyright
www.science.mod.uk/enterprise cde@dstl.gov.uk
(c) 2013 Dstl
UNCLASSIFIED / FOR PUBLIC RELEASE
9. for Defence and Security
Centre for Defence Enterprise
Crown Copyright
www.science.mod.uk/enterprise cde@dstl.gov.uk
(c) 2013 Dstl
UNCLASSIFIED / FOR PUBLIC RELEASE
10. “National Security Through
Technology” White Paper
‘Building on the CDE success in providing efficient
access to innovation, we will broaden its remit to
cover both the defence and security domains. As
part of this, we will seek ways to provide more
support to small- and medium-sized enterprises in
the development of routes to market for potential
products and to enhance communication
mechanisms between CDE and our suppliers’
Centre for Defence Enterprise
Crown Copyright
www.science.mod.uk/enterprise cde@dstl.gov.uk
(c) 2013 Dstl
UNCLASSIFIED / FOR PUBLIC RELEASE
11. Support to SMEs
Centre for Defence Enterprise
Crown Copyright
www.science.mod.uk/enterprise cde@dstl.gov.uk
(c) 2013 Dstl
UNCLASSIFIED / FOR PUBLIC RELEASE
12. Communicating requirements
Centre for Defence Enterprise
Crown Copyright
www.science.mod.uk/enterprise cde@dstl.gov.uk
(c) 2013 Dstl
UNCLASSIFIED / FOR PUBLIC RELEASE
24. High risk – high benefit
Centre for Defence Enterprise
Crown Copyright
www.science.mod.uk/enterprise cde@dstl.gov.uk
(c) Crown Copyright Dstl 2011
2013 Dstl
UNCLASSIFIED / FOR PUBLIC RELEASE
25. CDE funds proof
Centre for Defence Enterprise
Crown Copyright
www.science.mod.uk/enterprise cde@dstl.gov.uk
(c) 2013 Dstl
UNCLASSIFIED / FOR PUBLIC RELEASE
30. Centre for Defence Enterprise
01235 438445
cde@dstl.gov.uk
www.science.mod.uk/enterprise
Centre for Defence Enterprise
Crown Copyright
www.science.mod.uk/enterprise cde@dstl.gov.uk
(c) 2013 Dstl
UNCLASSIFIED / FOR PUBLIC RELEASE
31. CDE themed calls
Strengthening maritime security Call launch Today
Summary Webinar 5 Feb
Signal processing for low SWaP Webinar 5 Feb 2013
Smart nano-scale materials/structures Call launch 21 Feb 2013
Countering terrorist networks Call launch 19 Mar 2013
Register and further details at www.science.mod.uk under ‘Events and Calls’
Centre for Defence Enterprise
Crown Copyright
www.science.mod.uk/enterprise cde@dstl.gov.uk
(c) 2013 Dstl
UNCLASSIFIED / FOR PUBLIC RELEASE
32. Agenda
10:00 Introduction to CDE
10:25 Maritime security problems & challenges
11:00 Technical Q&A
11:10 BREAK
Previous CDE activity case study on
11:40
maritime security
12:00 Perspective from horizon scanning
12:20 Technical challenges summary
12:40 CDE proposal guidance + general Q&A
13:00 LUNCH
14:00 One-to-one meetings
77. Agenda
10:00 Introduction to CDE
10:25 Maritime security problems & challenges
11:00 Technical Q&A
11:10 BREAK
Previous CDE activity case study on
11:40
maritime security
12:00 Perspective from horizon scanning
12:20 Technical challenges summary
12:40 CDE proposal guidance + general Q&A
13:00 LUNCH
14:00 One-to-one meetings
78. Centre for Defence Enterprise
Submitting a Successful Proposal
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Crown Copyright (c) 2012
80. Know what is available
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
81. Know what is available
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
82. Know what is available
Read available
information
Including CDE
manuals
Especially Quick Start
Guide
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
83. Developing a CDE proposal
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
86. Proposal health check
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Crown Copyright (c) 2012
92. Health check
Based on a claim of future benefit
Contribution to realisation of future benefit
Logical programme of work
Evidential outcomes
Demonstration of progress towards goal
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Crown Copyright (c) 2012
94. Government furnished X
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
98. Deadline
Call closes:
17:00 hrs on
Monday 25 February 2013
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
99. Call process queries
Centre for Defence Enterprise
01235 438445
cde@dstl.gov.uk
www.science.mod.uk/enterprise
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Crown Copyright (c) 2012
100. Call technical queries
dstlmaritimeinnovation@dstl.gov.uk
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
101. Further information
www.science.mod.uk
Events and Calls > Current calls for proposals >
Strengthening the Security of Maritime Operations
Webinar – Tuesday 5 February 2013 14:30-15:30
Details on the call webpage
Email craig.cook@aadktn.co.uk to join
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
Editor's Notes
Welcome and good morning.My name is Gavin Copeland and I am part of the MOD’s Centre for Defence Enterprise where I head up our work on engagement, communications and external relations.
As you can see we have a busy agenda for your today and I would ask that you keep your questions until, for technical questions, the session just before lunch and for more general questions – such as how to apply – for the final Q&A session. There will also be an opportunity to ask questions in networking over lunch and later this afternoon.
Innovation for Defence Why?Innovation means advantageWe want better, lighter, faster, simpler (and cheaper)We want to leverage the best innovation for the civilian sectorWe need to ensure research funds are spent in a way that can make the maximum difference
The Centre for Defence Enterprise was established nearly five years ago in recognition that most science and technology innovation takes place in non-defence markets and by small organisations and academia who traditionally have struggled to work with defence.CDE aims to present an open door for new science and technology providers to MOD and defence and security. For these organisations we exist as a first point of contact for anyone with a proof-of-concept research proposal for a disruptive technology, new process or innovation that has a potential defence and security application.We aim to provide a low overhead route to submitting innovative research proposals for short sharp proof of concept contracts that will prove the value of high-risk high benefit research. Typically CDE contracts are 6-9 months in duration and between 30 and 80 thousand pounds – although there are examples that fall outside both ends of the range.
So, CDE is an open-innovation capture tool. But that is a bit too simple a statement.The CDE role is very much focussed on supporting innovators who have the interest in exploring potential defence and security applications. Specifically we are looking to encourage new entrants into the Defence market.Why? Because innovation translates into military capability, hopefully an unique military capability that leads to military advantage for UK Armed Forces.More simply, we want a greater proportion of the brightest, most creative minds to be thinking about Defence and Security challenges.So, whilst other funding bodies may have more general science and technology development objectives our mission is very simple.CDE is here to ……..
…to enable development of cost-effective capability advantage…
For Defence and security.
About a year ago, our initial success led to a Ministerial announcement in the ‘National Security through Technology’ White Paper on the expansion of our role to cover both defence and security as well as increasing the size of our research call programme and providing more support to small organisations both during the contract and in finding opportunities for subsequent exploitation.
Like any potential market, ‘new entrants’ face barriers and the CDE team is focussed on the tools and means help overcome them.CDE has a history of engaging and funding SMEs. Some of our best work has been done ‘two men in a boat’ or rather ‘a man and a woman in a shed’, to be precise. And we frequently see highly innovative proposals come from individuals and very small companies.CDE is all about putting opportunity in the way of innovators, to contribute to UK military and security capabilities whilst gaining the opportunity to access the £150bn that MOD will be spending through its supply chain over the next 10 years. And access to CDE funding is potentially the first step on that road. So looking at this second major area of commitment made in the White Paper –to deepen our ability to support suppliers, particularly small organisations.We have a greater capability to run more events and calls, we have more of our very popular one-one surgeries (30 minutes – shape proposals – not technical) and we increasing our ability to support projects beyond the initial CDE stage, helping small businesses get into the wider defence and security supply chains.Unpacking some of the detail behind this help..
We try to take complex military requirements and turn them into plain English. This is a work in process, we don’t always get it right.But to tap into a new, non-defence innovation base we have to ensure that new entrants understand what we are saying. We shouldn’t expect them to learn a whole new language just to submit a proposal.
To ensure that CDE is accessible to all we make as much use of the internet as we can.We communicateour plans requirements and services through our website. And we have an online submission process that keeps the overhead as low as possible for new entrants and for MOD. The online process also allows us to move the process on at pace and keep the momentum up high.CDE’s web is based at www.science.mod.uk/enterprise and uses a secure online proposal and assessment portal. This allows simple proposal submission which highlights important aspects of an innovation but also allows rapid assessment by experts from across MOD.
This approach ensures that proposals and assessments are in a standardised and auditable manner that provides a low overhead approach to managing what would otherwise be a complex and disparate response from across suppliers that would consume significantly more resources.Our assessment methodology is onlineWe always try to give informative and actionable feedback.
CDE provides two principal routes for funding research proposals. We call them Themed calls and the Defence Open Call.Themed calls – such as this call today - were worth over £10M last year and are borne out of our existing research programme.The themed call programme is all about what may be thought of as the “known unknowns” and are specific technical challenges from the research programme along with a dedicated funding pot and a deadline against which to submit proposals. They are characterised by boundaries; a bounded set of challenges;a bounded budget that you can bid into;and a bounded response timeframe for you to submit your research proposals.
The Defence Open Call is there to enable us to investigate the ‘unknown unknowns’ – as Donald Rumsfeld once put it. A complex thing to do.It is an enduring research competition for our enduring challenges. You can submit a research proposal at any time.And what are these enduring challenges?
CDE aims to find innovative ideas to meetEnduring Military Technology ChallengesBetter, more robust, communicationsBetter observation and sensingBetter self-protectionMore efficient and versatile platformsALL FAMILIAR TO A ROMAN CENTURION AS TO THE MODERN SOLDIER IN AFGHANISTANChallenge to youBring us your innovation!Be bold, be creative and think differentlyCreate new & diverse communitiesConsider doing things differentlyHelp us to knock down barriers to exploitationWork with us to develop battle winning technology
The Defence Open Call represents less than 1% of our entire MOD S&T research programme, about £400M pa.It is therefore researved for the most exceptional ideas. That should set the context as to the kind of responses we are looking for into the open call process. It’s the things we just haven’t thought about;those things that really do come out of the left field. The open call does not seek iterative development; it does not seek to build on what we already know. It really is for those radical innovations that could fundamentally change the way we do business in defence and security.
In the grand scheme of things both the themed calls and theopen call represent relatively small budgets.So funded packages of work are relatively small. Typically we will fund projects between around £60-100k. So we’re not looking for people to come to us with whole-system development; it’s about enabling technologies that could unlock the solution to a particular problem.
Emphasis Proof of Concept
An example. An innovative SME offered us a capability we didn’t know we wanted. Because we didn’t think it was possible. Let me give you two examples of work that CDE has funded under the open call Funded SME to produce…… No requirement
Another example. A serendipitous innovation brought about by a chance encounter between a MOD Scientist and an innovative academic researcher working on wool fibres. CDE provided the pathway to transfer some innovative technology from its originator, who understood virtually nothing about defence, into a compelling defence focused research proposal that was funded by the Defence Open CallNext example illustrates that focus University of Leeds Small samplePhase 2 contract has now been awardedKey: = Here’s the thing Provided compelling evidence to unlock the investment decision = deliverable
As well as the always open Defence Open Call, we have an ongoing programme of Themed Calls.You can see here the ones running through to end March and the forward programme to Autumn 2013 is already looking very busy and we will be able to share some of the details with you all very shortly.The best way to find out is via our email newsletter that you can sign up for on our website.
As you can see we have a busy agenda for your today and I would ask that you keep your questions until, for technical questions, the session just before lunch and for more general questions – such as how to apply – for the final Q&A session. There will also be an opportunity to ask questions in networking over lunch and later this afternoon.
These are not the only issues that would help conduct non-warfighting roles.But they are important issues for which it is not clear how to provide a solution.I am now going to address each of these challenges individually in the rest of this presentation.As an aside, the picture shows a representation of Counter-Piracy from a previous time. To a degree it illustrates that the RN has been involved in Maritime Security Operations for a considerable time, although the technologies have changed.
The Dhow to the right is a Pirate Dhow.The Dhow to the left is an Iranian Dhow that was attacked by Pirates and freed by the Royal Navy.It is not just large western container ships that are the subject to piracy. And not all Dhows are operated by Pirates.The worlds Oceans and Seas are very large, and contain a large amount of shipping, most of which is legitimate. Attempting to identify those craft that are involved in Piracy is not straight forward.
If the craft involved in illegal activity look the same as those that aren’t, then the only way to differentiate between them can be to take a closer look. i.e. conduct boarding operations. RHIB = Rigid Hull Inflatable Boat – Small grey craft to the right of the wooden Dhow.But boardings are not without risk.Boardings take a considerable amount of time.The RHIB needs to be launched, including boarding the crew.The RHIB needs to transit to the vessel to be investigated.The crew need to board the vessel, and conduct the required search.If nothing is found then the crew need to re-board their RHIB, return to the Ship and the RHIB recovered.All this means that only a relatively small number of vessels can be boarded.If all vessels can’t be boarded, then those that are boarded by necessity becomes random, or based on less evidence than might be hoped.Hence there is considerable potential for those vessels involved in illegal activities to go undetected.
These 3 proposals are not meant to be taken literally.But you may have technology that can achieve a similar effect.In the picture the RN RHIB is very close to the suspect vessel, which will aid some of the illustrations that I am about to show. But there would be a preference for the RHIB to stay at range if possible to it is clear that a boarding will be necessary. In fact, it would be better if the RN/RM crew could stay on the RN Ship in the background until it was clear that a boarding was necessary.May be an opportunity to employ an unmanned vehicle in the first instance. Mind Reading Device. (Is there another route to determine where the vessel is from, and where it is going to?) Perhaps a lie detector A Babel fish. (For those not aware of “The Hitch Hiker’s Guide to the Universe” this is a fish that provide translation from any language into your own language.) X-Ray Spectacles. (Is there are technology that enables one to look into the suspect vessel and determine what it is carrying? Perhaps specifically detection of weapons of explosives?)For this challenge we are looking for Technologies that “Improve determination of unlawful activity at sea”.These technologies might Highlight those vessels which are most suspicious Reduce the numbers of boardings that are necessary so that the most suspicious vessels can be concentrated on. Above all reduce the risk to the RN/RM crew conducting the boardings. Might be possible to deploy the technology via an unmanned vehicle.
But if Lethal Force is used in the context of a Maritime Security Operation, then probably the mission has failedExclusion ZoneMay or may not be a craft conducting an illegal activity.InterdictionMay or may not be a craft conducting an illegal activity. I am going to consider these two cases seperately in the following slides.
Exclusion ZoneIllustrated in Exemplar B in the call documentRecent years have seen an increased use of suicide bombs in the land environment, where there is the potential for this to transition into the Maritime. In these instances the threat is intentionally looking like a lawful vessel.Current capability is only to provide a lethal response. So one would need to be pretty sure of what the vessel is before being prepared to use themThe target may well be a civilian who is curious or who wants to sell something to the crew. The target may be amongst other craft which are expected.In this case there is obviously a willingness to employ a graduated response which transitions from no effect through to lethal effect. Firstly just providing a warning. Then a level of effect that would deter someone who is not involved in an illegal activity. If the vessel still keeps coming then it can pave the way to a lethal effect.Therefore the initial low level effects have to be deployable at range.They can be used to establish intent, and provide time for decision makingThe non-lethal effect might be directed towards the vessel or the crew.
A lot of synergy with Challenge 1, where Challenge 1 is about identifying who needs to be boarded / stopped. This part of Challenge 2 is about stopping the vessel, or slowing the vessel down.Note, this is not necessarily about stopping a craft that you know is conducting an illegal activity. This may be a legitimate vessel where the crew has not noticed the attempt to board. Or where for personal reasons they are deliberately attempting to avoid a boarding.If the vessel is damaged, then the RN ship becomes responsible for its safety and safe return to port. There might also be financial responsibility to correct any damage.It is recognised that this is not a simple challenge, which is part of the reason that it is being raised as part of a CDE call.
Non-Lethal Effectors Some caution. This has been looked at before with little success. Need a clear concept of how it would be employed. Need to ensure that it has sufficient range. It might well be appropriate to use an unmanned vehicle to help deliver the effect to the desired range.Barriers Need to ensure that it can be deployed easily. Need to ensure that it is effective.Warnings Need to ensure that it can be clearly understood. Again perhaps an unmanned vehicle has a role to playFor this challenge we are looking for Technologies that “Improve the response to hostile activity at sea”, where this is through a graduated response.As for the first challenge an unmanned vehicle might be part of the route to getting the required effect to the desired range.
7.62mm GPMG and Mini Gun primary weapons for Force Protection in Maritime Security Operations.Deployed in a variety of positions around the ship.Ability to stow is very important in hot climates, as the ammunition degrades if left in the sun (Gets too hot).These easily portable weapons can be held inside the ship, and rapidly set up when required.In this presentation I am going to primarily focus on the training, as it as area we know needs improvement.Part of the reason for this is that operating Small Arms is not likely to be that person’s primary role. Hence the level of training is limited, and needs to fit around training for the primary role.In addition, although there is starting to be good land based training in small arms, there is not the same access on the. As a consequence the level of capability can degrade very quickly.Although this presentation is primarily focused on the training aspects, we are open to other suggestions on improving performance.
Guns are dangerous. Live Fire training can be arranged, but there are issues Land based training is easier to organise, but not fully representative Sea based training can be arranged, but organising an appropriate moving target can be difficult. (Master and Commander – Barrel in the sea) Ammunition is expensive, and you can use a lot of it in training. Non-live fire training is easier to arrange than Live fire training by just using a ship’s boat. But is it representative? Can you assess operator performanceHow do you measure operator performance? Current approach is to bring the craft ashore after each serial, but this can only give rough indications as you don’t necessarily know which period of the serial caused the hits. So long as the target doesn’t sink!
Hit Counters Real time measurements of hits (& misses) Might incorporate a miss distance indicatorAugmented Reality Simulation of live fire in non-live fire training Laser Beam?, Addition to viewer? Would want it to be as representative as possible.For this challenge we are looking for Technologies that “Improving small arms accuracyat sea”.
As you can see we have a busy agenda for your today and I would ask that you keep your questions until, for technical questions, the session just before lunch and for more general questions – such as how to apply – for the final Q&A session. There will also be an opportunity to ask questions in networking over lunch and later this afternoon.
As you can see we have a busy agenda for your today and I would ask that you keep your questions until, for technical questions, the session just before lunch and for more general questions – such as how to apply – for the final Q&A session. There will also be an opportunity to ask questions in networking over lunch and later this afternoon.
As you can see we have a busy agenda for your today and I would ask that you keep your questions until, for technical questions, the session just before lunch and for more general questions – such as how to apply – for the final Q&A session. There will also be an opportunity to ask questions in networking over lunch and later this afternoon.
Potential exploitation routes could include additional research to further develop or test the concept from MOD or other UK government departmentEach project will be invited to attend a stakeholder day, at Porton Down or Portsdown West, to present the outcomes and review exploitation routes
As you can see we have a busy agenda for your today and I would ask that you keep your questions until, for technical questions, the session just before lunch and for more general questions – such as how to apply – for the final Q&A session. There will also be an opportunity to ask questions in networking over lunch and later this afternoon.
Back to the ‘engagement’ tab now;> And there’s one source of information that is particularly useful, and that is the CDE Portal page.
Follow the link to the Portal page where you will find a particularly important document – the Quick Start Guide.What this actually is, is a step-by-step process to using the Portal. If you’ve not used the Portal before we would thoroughly recommend downloading a copy of this and having it to hand throughout the process.
Right, now moving on to the specific information that your proposal must contain, to put it into a strong position when competing with the others. These may seem like simple points but they are often missed.
The assessors of your proposal need to be able to envisage what is the proposed future capability benefit.It’s not about delivering that benefit immediately with a successful CDE project – this is only the first step.A reminder that CDE operates in the ‘proof of concept’ space but you need to start with the end in sight.We are about doing just enough work to inform a decision about the likely value of taking a concept to full development. Then maximising the opportunity to promote the outputs of that proof of concept phase to the widest range of possible exploitation paths.You need to indentify the major forseeable technological risk associated with developing your innovation, and then show us that you can overcome it.A successful CDE project will produce a compelling, evidence-based output that will persuade decision makers to unlock the investment to develop the technology into a future capability. So remember this at the very beginning when putting together your proposal.
60 minutes.Two episodes of East Enders.That is all a CDE assessor has to form a view of your proposal and make a recommendation to the Decision conference.To assimilate and So, when you put your proposal together keep that in mind.
So, how might you conduct a basic health check on your proposal as you’re developing it?These checks apply to any CDE proposal whether it’s for a themed call or the Defence Open Call.
Make a claim we can consider and measure you against. A clear claim that the technology or innovation will contribute to a future hypothesised capability benefit.The claim must be compelling and attractive so that our interest is raised.If your proposal is for the Open call you have the opportunity to take some risk, starting with your claim.
It should describe how the technological development will contribute to the realisation of that capability benefit
Number 3 – your proposal must describe a logical programme of work to deliver the proposed technological development.
Number 4 - Your CDE proposal should describe the body of evidence that the programme of work will generate.What will be delivered?Going back to what I said before, the assessors need to see what will come out at the end of the project that will unlock any future capability development?
And finally number 5 – How that body of evidence you have generated will demonstrate tangible progress towards the realisation of the originally claimed future capability benefit.Again, it’s all about unlocking that investment decision.
So to remind you of those 5 points in the CDE proposal health check:
Now some essentials for submitting a proposal to this, and other, CDE themed calls.
Government furnished X – And by that we mean information or equipment provided by us.Don’t rely on the provision of any of this.For the proof-of-concept space that CDE operates in, we would always recommend you find alternative means of executing your projects or testing your innovations.You should use public data sets, for example in this call, – many of which you can find on the internet.
For CDE phase one projects, we would advise you to avoid reliance on any sort of human or animal testing, which would require going through the strict MOD ethics clearance procedures. This takes time, so for a short, sharp initial CDE project it may not be viable.It may be that you can partition your programme of work into a first stage that doesn’t require ethical clearance, so that the team could assess the output after this stage before going further into the work.Any advice on this aspect, please do ask the team today before submitting your proposals.
A reminder – All CDE competitions are at the Unclassified level. Everything within your proposal must be unclassified.Ask yourself – would it pass the train test? In other words, if you left the proposal document on a train, would it compromise UK national security interests? If in doubt, leave it out!
The deadline for today’s themed call is Tuesday 19 February 2013 at 1700 hrs sharp.Do not leave it until the last minute to submit your proposal on the Portal.Give yourself plenty of time to review your proposal.If you leave it until the last minute you run the risk of missing the deadline as the server will have frozen under the amount of people submitting at the same time.Please do it the day before, a couple of days before or even the week before the deadline.You will save yourself a lot of stress.
A reminder again of that deadline.Also another really important point – you will find this information in the call document published online – you must put the appropriate line in your proposal title to identify that it is for this themed call. For this one you must put ‘Maritime Security Operations + challenge 1, 2 or 3’ as a prefix in the title.If you miss this deadline you will be significantly lowering your chances of success. The Defence Open Call is not a likely back-up option. For the reasons you heard earlier this morning, the Open Call is much harder to be successful in, due to the higher threshold for innovation.
Specifically for this themed call today, if you have any technical questions, please go directly to the team that you’ve met here today. You can contact them using this email address.However,Capacity to answer these queries is limited in terms of volume and scope. Queries should be limited to a few simple questions or if provided with a short (few paragraphs) description of your proposal, the technical team will provide, without commitment or prejudice, broad yes/no answers. This query facility is not to be used for extensive technical discussions, detailed review of proposals or supporting the iterative development of ideas. Whilst all reasonable efforts will be made to answer queries, CDE and Dstl reserve the right to impose management controls when higher than average volumes of queries or resource demands restrict fair access to all potential proposal submitters.
Call document and presentations online.Webinar.Network.Q&A.
Welcome and good morning.My name is Gavin Copeland and I am part of the MOD’s Centre for Defence Enterprise where I head up our work on engagement, communications and external relations.