Back to news

December 26, 2024 | International, Aerospace

This Army unit is the first to field new company and battalion drones

On the same subject

  • iBASEt s’associe à Amazon Web Services pour lancer une plateforme de fabrication Cloud dédiée au marché de l’Aérospatiale et de la Défense

    June 17, 2019 | International, Aerospace, Other Defence

    iBASEt s’associe à Amazon Web Services pour lancer une plateforme de fabrication Cloud dédiée au marché de l’Aérospatiale et de la Défense

    POSTED BY: AEROMORNING La plateforme conçue par iBASEt et hébergée gr'ce au Cloud Amazon offre une infrastructure de fabrication moderne, une amélioration de l'évolutivité et une réduction du coût de possession LE BOURGET (France), le 13 juin 2019 – iBASEt, fournisseur de solutions logicielles industrielles (MES/MMO, MRO, gestion de qualité et fournisseurs) annonce sa collaboration avec Amazon, dans le cadre du programme Usine intelligente d'AWS. Objectif : le lancement sur AWS d'une suite logicielle de fabrication numérique créée par iBASEt, basée sur le Cloud et dédiée aux fabricants du secteur de l'aérospatiale et de la défense. En coopération avec AWS, iBASEt fournit aux constructeurs de l'aérospatiale et de la défense une plateforme permettant d'exploiter des services natifs afin de créer et déployer rapidement toutes sortes d'applications et de gérer leurs mises à jour plus efficacement. Cette solution offre aux constructeurs du marché de l'Aérospatiale et de la Défense une visibilité et un contrôle accrus de leurs opérations avec un coût de possession réduit, une plus grande sécurité, une meilleure gestion des performances, une résolution des problèmes, des mises à jour logicielles automatiques et une mise en œuvre simplifiée, dans un secteur à la fois complexe et fortement réglementé. Sung Kim, directeur de la technologie chez iBASEt explique : « En travaillant avec AWS, sur la plateforme commerciale, nos clients bénéficieront d'un environnement Cloud capable d'accroître l'efficacité et le contrôle de leurs opérations de fabrication, mais aussi de leur continuité numérique. Conférant une puissante infrastructure, le Cloud permet d'exploiter toute une gamme de services natifs afin d'adapter différentes technologies de façon homogène, reliant les opérations et la gestion de la maintenance dans un flux de données intégré à la chaîne de valeur et au cycle de vie du produit ». Josef Waltl, directeur du segment mondial des logiciels industriels chez Amazon Web Services déclare : « Nous nous réjouissons de compter iBASEt dans notre réseau de partenaires AWS. La société iBASEt rejoint ainsi une liste de partenaires APN (AWS Partner Network) stratégiques, spécialisés dans les logiciels industriels. Ensemble, et au bénéfice des constructeurs de l'Aérospatiale et de la Défense, nous allons pouvoir conjuguer la puissante plateforme d'iBASEt dédiée aux processus de fabrication modernes aux avantages d'AWS Cloud. La solution de fabrication d'iBASEt tirera parti des meilleures pratiques d'AWS en matière de sécurité et de haute disponibilité, dans un environnement Cloud qui offre un déploiement rapide reposant sur des processus automatisés ». Le programme Usine intelligente d'Amazon aide les entreprises à se concentrer sur l'optimisation de leurs opérations de fabrication, sans se soucier de l'infrastructure nécessaire. Cette approche repose sur les services Cloud AWS IoT, l'Edge Computing (ou traitement des données à la périphérie), les data lake ainsi que des outils d'analyse avancés. L'objectif est d'améliorer les opérations de fabrication en capturant, harmonisant, analysant, visualisant et exécutant les silos de données de l'usine. Résultat : une amélioration des principaux indicateurs de performance tels que la qualité, la production et le taux de rendement global. AWS accompagne également les industriels dans l'utilisation de l'intelligence artificielle et de l'apprentissage automatique pour établir des analyses prédictives en temps réel. iBASEt a récemment annoncé la signature d'un accord avec la société aérospatiale Lockheed Martin (NYSE : LMT). En effet, le constructeur américain a choisi la suite logicielle de fabrication numérique d'iBASEt comme système d'exécution de la fabrication pour sa division aéronautique, laquelle conçoit et construit des avions militaires. Salon du Bourget iBASEt sera présent au 53ème Salon International de l'Aéronautique et de l'Espace du 17 au 23 juin 2019 stand B86. Le Salon du Bourget, événement centenaire, est le plus grand et le plus ancien salon aéronautique et spatial au monde. Depuis son lancement, le salon a été au cœur de l'évolution du marché mondial de l'aéronautique, dont il est devenu au fil des ans le plus important lieu de rencontre. A propos d'iBASEt iBASEt est l'un des principaux fournisseurs de solutions logicielles pour les industries complexes et hautement réglementées, telles que l'aérospatiale et la défense, les dispositifs médicaux, le nucléaire, l'équipement industriel, l'électronique et la construction navale. Le logiciel iBASEt de fabrication numérique rationalise et intègre les systèmes de gestion des opérations et d'exécution de production (MES/MOM), de maintenance, réparation et révision (MRO) et de gestion de qualité pour la production et de fournisseurs (EQMS). iBASEt est utilisé par plusieurs organisations industrielles leaders dans le cadre de leurs projets de fabrication numérique de produits. http://www.aeromorning.com/blog/ibaset-sassocie-a-amazon-web-services-pour-lancer-une-plateforme-de-fabrication-cloud-dediee-au-marche-de-laerospatiale-et-de-la-defense/

  • Pentagon CIO says the department’s cloud efforts are more than just JEDI

    August 4, 2020 | International, C4ISR, Security

    Pentagon CIO says the department’s cloud efforts are more than just JEDI

    Andrew Eversden WASHINGTON — The Pentagon's top IT official provided an update July 30 on a wide range of ongoing initiatives underway at the department as it continues to grapple with a remote workforce amid the coronavirus pandemic. Chief Information Officer Dana Deasy highlighted several ongoing projects related to artificial intelligence, big data and cloud computing, while also discussing the department's Commercial Virtual Remote Environment that's allowed nearly 1 million Department of Defense employees to collaborate while working from home. Here's a roundup of what Deasy told reporters: Cloud developments The Defense Department has struggled for more than a year to procure its enterprisewide cloud, known as the Joint Enterprise Defense Infrastructure, a platform DoD leadership has continuously said will break down data silos and enhance artificial intelligence capabilities. But, as Deasy has stated repeatedly, JEDI is not going to be the DoD's only cloud. “Cloud has always been much more than JEDI,” Deasy said. Work on the JEDI cloud, which was awarded to Microsoft in October last year and subsequently protested by Amazon Web Services, is on hold after a federal judge issued an injunction earlier this year upon determining it was likely the DoD erred in its evaluations of the two tech companies' proposals. The DoD is taking corrective action on the award, with Deasy saying the department intends to re-announce the winner “probably sometimes towards the very end of August, barring any last minute, unforeseen additional issues that are raised.” In the meantime, the DoD has stamped the Air Force's Platform One cloud offering as an enterprise service, giving DoD components a certified place to go for DevSecOps, Deasy said. “What the big message there was, we actually for the first time had designated a cloud across DoD that could be used for a common way of doing DevSecOps,” he said. AI and JADC2 The Joint Artificial Intelligence Center is pivoting to focus on Joint All-Domain Command and Control, a Pentagon-led effort to connect sensors and shooters. Through its Joint Common Foundation, Deasy said, the JAIC has tools and capabilities to develop AI capabilities at scale. “That has now allowed us as we've matured to say: ‘What we've always known we really need to ... get JAIC focused on is the joint all-domain space,‘ ” Deasy said, adding that the center is looking at joint fires, the electromagnetic spectrum and strategic mobility. The JAIC, he said, is working on a cognitive assistant to deliver commanders relevant data from the hoards of information that come from the battlefield to quicken decision-making. But he added that the JAIC will expand into other areas of joint all-domain operations. “JADC2 is made up of a bunch of different areas ... including electromagnetic spectrum, how do we move forces, how do we target,” Deasy said. “But right now it's all about how do you take streams of information and allow the machine and human to interact together to make better decisions.” The new chief data officer In June, the DoD announced that former Special Operations Command chief data officer Dave Spirk would become the DoD's new CDO. Deasy told reporters July 30 that Spirk will focus on “strengthening data governance, interoperability, and data protection across the department,” which he went on to describe as a “major effort.” “The chief data officer is on a directed, 90-day listening tour where he is talking to senior leaders in the Pentagon, war fighters and at the combatant commands, industry and academia to assess the overall department's progress,” Deasy said. “At the conclusion of the 90-day tour, Dave will provide a written assessment with a plan of action.” Deasy added that a DoD data strategy will be released “in the coming months.” https://www.c4isrnet.com/battlefield-tech/it-networks/2020/07/31/pentagon-cio-provides-updates-on-several-it-initiatives/

  • Audit finds cyber vulnerabilities in US missile defense system

    December 17, 2018 | International, C4ISR

    Audit finds cyber vulnerabilities in US missile defense system

    By: Geoff Ziezulewicz The Army, Navy and Missile Defense Agency are failing to take basic cybersecurity steps to ensure that information on America's ballistic missile defense system won't fall into nefarious hands, according to a Defense Department Inspector General audit released Friday. Investigators visited five sites that manage ballistic missile defense elements and technical information, but the names of the commands were redacted in the publicly released report. “The Army, Navy and MDA did not protect networks and systems that process, store, and transmit (missile defense) technical information from unauthorized access and use,” the declassified report states. Such inadequacies “may allow U.S. adversaries to circumvent (missile defense) capabilities, leaving the United States vulnerable to missile attacks,” the report states. They found officials failed to employ safeguards familiar to most people online in 2018, the latest development to raise questions about the U.S. military's cybersecurity vulnerabilities. Among the shortcomings: Administrators for classified networks had no intrusion detection and prevention systems in place to watch for cyberattacks, much less stop them, according to the report. At one site, officials said they had requested to purchase those cyber safeguards in December 2017 but nine months later it still hadn't been approved. “Without intrusion detection and prevention capabilities, (the site) cannot detect malicious attempts to access its networks and prevent cyberattacks designed to obtain unauthorized access and exfiltrate sensitive (missile defense) technical information,” the report states. Officials also failed to patch system flaws after receiving vulnerability alerts, one of which had first been identified in 1990 and had still not been fixed by April. Another vulnerability that could be exploited by an attacker was first identified in 2013 but also was never pathced, according to the report. “Countless cyber incident reports show that the overwhelming majority of incidents are preventable by implementing basic cyber hygiene and data safeguards, which include regularly patching known vulnerabilities,” the IG report states. “(Missile defense) technical information that is critical to national security could be compromised through cyberattacks that are designed to exploit these weaknesses.” Some facilities failed to force employees to use common access cards, or CAC, when accessing the classified system, a basic cybersecurity practice known as multi-factor identification. Instead, officials were able to access the sensitive information using just a username and password, the report states. Hackers use phishing and other tactics to exploit passwords and gain access to such systems. New hires are supposed to be allowed network access without a card for only their first two weeks on the job. But IG investigators found users on the systems without CAC cards for up to seven years. At one site, a domain administrator never configured the network to allow only CAC holder access. “Allowing users to access networks using single factor authentication increases the potential that cyber attackers could exploit passwords and gain access to sensitive (missile defense) technical information,” the report states. Investigators also found unlocked server racks at some locations, another key vulnerability to insider snoopers. “The insider threat risk necessitates that organizations implement controls...to reduce the risk of malicious personnel manipulating a server's ability to function as intended and compromising sensitive and classified data,” the report states. External storage devices held unencrypted data and some sites failed to track who was accessing data, and why. Other administrators told investigators that they lacked the ability to record or monitor data downloaded from the network onto these devices. Unless these officials enforce the encryption of such removed data and monitor its downloading and transferring, “they will be at increased risk of not protecting sensitive and classified (missile defense) technical information from malicious users,” the report states. Investigators also found that some supposedly secure sites were failing to even lock their doors. One location had a security door that hadn't worked for years. “Although security officials were aware of the problem, they did not take appropriate actions to prevent unauthorized personnel from gaining unauthorized access to the facility,” the report states. Other sites featured no security cameras to monitor personnel movement and security officers failed to conduct badge checks. While the report makes recommendations to fix the documented problems, officials for the inspected agencies offered no comments on the non-classified draft report of the audit. Friday's scathing IG audit marked the latest in a string of reports detailing shoddy cybersecurity throughout the armed forces and defense contractors. During the same week, the Wall St. Journal reported that Chinese hackers are targeting military systems and those of defense contractors working on Navy projects. Beijing-linked cyber raids have attempted to steal everything from missile plans to ship-maintenance data in a series of hacks over the past 18 months, the Journal reports. As a result, Navy Secretary Richard Spencer has ordered a “comprehensive cybersecurity review” to assess if the Navy's cyber efforts “are optimally focused, organized, and resourced to prevent serious breaches,” spokesman Capt. Greg Hicks said. The review will also look at authorities, accountability and if the efforts reflect and incorporate government and industry best practices, he said. “Secretary Spencer's decision to direct a review reflects the serious to which the DoN prioritizes cybersecurity in this era of renewed great power competition,” Hicks said. https://www.navytimes.com/news/your-navy/2018/12/14/audit-finds-cyber-vulnerabilities-in-us-missile-defense-system

All news