18 octobre 2021 | International, Terrestre

A future Bradley replacement and a new troop vehicle | Defense News Weekly Full Episode, 10.16.21

See the newest tech and hear from leadership in this special episode of Defense News Weekly covers the Association of the U.S. Army conference.

https://www.defensenews.com/video/2021/10/18/a-future-bradley-replacement-and-a-new-troop-vehicle-defense-news-weekly-full-episode-101621

Sur le même sujet

  • Here’s what the battlefield tech industry predicts for 2019

    4 janvier 2019 | International, C4ISR

    Here’s what the battlefield tech industry predicts for 2019

    By: Mike Gruss The new year will likely bring a new secretary of defense, a renewed emphasis on changing how the Pentagon buys weapons systems and a continued focus on watching technological development by the Chinese government. C4ISRNET asked industry leaders what trends they expect to emerge in the battlefield landscape in 2019. Here's what they said: Accelerated acquisition “Right now, your toaster can tell your refrigerator that it needs to order more bread, but the world's most advanced military is still challenged to connect its huge array of systems. That's just not sustainable. Before the military can start tackling huge technological leaps like artificial intelligence, we have to change the way we develop weapon systems. I see 2019 as the point when the DoD really starts moving away from buying proprietary, stove-piped, closed hardware systems and instead looks to the commercial software world as a model for how we develop and integrate weapon systems. Focusing on commercial-style software development is how we'll be able to develop truly open, upgradeable, cyber-resilient systems quickly. And by quickly I'm saying weeks or months for a new system, not years or decades. The pace of technology is moving faster than ever before, especially in the software world. We need to accept that and move with it if we want to stay ahead.” — Todd Probert, vice president of mission support and modernization at Raytheon An increased need for a coordinated response “Today's environment is evolving to warfare coordinated across multiple domains driving our forces to be more adaptable and coordinated in our response. As this threat environment accelerates, we recognize that our customers require methods that will enable them to operate seamlessly and simultaneously across domains. We see C4ISR technologies as the foundation for managing and responding to these more complex missions on a shorter timeline. We will continue to invest in transformational technologies that will help make multidomain operations more predictive and more effective. This includes: Machine-to-machine communication across new and legacy datalinks; Fusion to enable information from several sources into one unified picture of the battlespace and reduce the data to decision timeline; Artificial intelligence to provide decision makers with the ability to react quickly to problems that demand fast-paced analysis and decision making. AI offers the technology to change the human role from “in-the-loop” controller to “on-the-loop” thinker who can focus on strategy versus the execution detail; ‘Algorithmic warfare' to support a partnership between humans and computer systems, exponentially increasing the pace of processing, exploitation, dissemination and C2 operations; and Advanced multi-level secure modeling and simulation to manage patterns of life and actionable changes. — Brent Upson, director of ISR Systems at Lockheed Martin A move to small form factor networking “In 2019 we expect the DoD to significantly increase its investment in small form factor networking, secure wireless and virtualization-enabled compute necessary to improve war-fighter mobility and situational awareness in tactical and expeditionary programs. Tactical communications programs have proven the efficacy of size weight and power (SWaP) reduction by moving to small form factor equipment, and the savings enable entirely new IT-enabled use cases at the network edge. In particular, tactical deployments of classified wireless using commercial technologies, data center services and storage, and defensive cybersecurity solutions will see sizable new adoption in 2019.” — Peggy Miller, chief executive officer at PacStar Audio for authentication “Audio will be the buzz word of 2019 for network solutions. Introducing audio as a security layer in IP video provides a new layer of overall security to physical security solutions. Audio technology allows security professionals to interact with people remotely, as well as provide an automated response to prevent situations from escalating to an incident by identifying aggressive voices, glass breaking and even gunshots. With this new audio technology and analytical capabilities, security professionals can proactively detect, interpret and respond to events and emergency situations.” — John Merlino, government business development manager at Axis Communications, Inc. Attacks on data in the cloud “In the past two years, enterprises have widely adopted the Software-as-a-Service model, such as Office 365, as well as Infrastructure- and Platform-as-a-Service cloud models, such as AWS and Azure. With this move, far more corporate data now resides in the cloud. In 2019, we expect a significant increase in attacks that follow the data to the cloud. With the increased adoption of Office 365, we have noticed a surge of attacks on the service — especially attempts to compromise email. One threat the McAfee cloud team uncovered was the botnet KnockKnock, which targeted system accounts that typically do not have multifactor authentication. We have also seen the emergence of exploits of the trust model in the Open Authorization standard. One was launched by Fancy Bear, the Russian cyber-espionage group, phishing users with a fake Google security app to gain access to user data. "Similarly, during the last couple of years we have seen many high-profile data breaches attributed to misconfigured Amazon S3 buckets. This is clearly not the fault of AWS. Based on the shared responsibility model, the customer is on the hook to properly configure IaaS/PaaS infrastructure and properly protect their enterprise data and user access. Complicating matters, many of these misconfigured buckets are owned by vendors in their supply chains, rather than by the target enterprises. With access to thousands of open buckets and credentials, bad actors are increasingly opting for these easy pickings.” — Sekhar Sarukkai, vice president of engineering, cloud at McAfee The expansion of technology to counter small drones "The ever-expanding proliferation of small UAS (sUAS) has resulted in a rapid rise in sUAS incidents, leaving security personnel starved for a holistic solution to this new and evolving threat. A hobbyist unwittingly flying near a flight line or a drone pilot with nefarious intentions present both risk and unmet challenges. Counter-sUAS (C-sUAS) technology is an essential tool for assessing airspace activity, understanding the severity of drone incursions, and informing new protocols to mitigate potential threats. With C-sUAS technology, security personnel can now observe a drone's behavior and deploy appropriate offensive or defensive countermeasures, which may include direct contact with the pilot or coordination with local law enforcement. In all cases, detection of sUAS activity is the critical foundation of any C-sUAS program. “2018 was a year of testing and evaluating. Rapid prototyping, experimental deployments, and government testing events validated that no single C-sUAS system is a one-size-fits-all solution. Moreover, C-sUAS technology must be flexible to meet the needs of each specific environment.” — Phil Pitsky, vice president of U.S. federal operations at Dedrone https://www.c4isrnet.com/industry/2019/01/02/heres-what-the-battlefield-tech-industry-predicts-for-2019/

  • How JADC2 is like a high-tech grill, according to one Marine colonel

    23 février 2023 | International, C4ISR

    How JADC2 is like a high-tech grill, according to one Marine colonel

    It’s tricky to define the multibillion-dollar Pentagon initiative aimed at linking up the military’s many forces and data.

  • Coast Guard needs help with IT infrastructure, cloud consolidation

    19 juin 2019 | International, Naval, Autre défense

    Coast Guard needs help with IT infrastructure, cloud consolidation

    by Jackson Barnett The U.S. Coast Guard is seeking input on an IT infrastructure consolidation plan that will help migrate part of its system to the cloud to ensure operators around the world have access to critical networks. The request for sources is the first step in what appears to be a plan for the Coast Gaurd to contract with the private sector on IT infrastructure transformation. The idea is to shift IT services to an “Infrastructure Managed Services” model, one that would contract out infrastructure services to private companies to assist in cybersecurity and network optimization. The move spawned from the Coast Guard's fiscal 2018-22 Strategic Plan, which calls for greater cyber strength and efficient IT infrastructure. “The security environment is also affected by the rising importance of the cyber domain – where adversarial nation states, non-state actors, and individuals are attacking our digital infrastructure and eroding the protections historically provided by our geographic borders,” the strategic plan states. The challenge to secure and re-structure the Coast Guard's networks and IT infrastructure span global operations, different security classifications and many data centers, according to the request. The networks support more than 54,000 users worldwide at 823 global sites. The current networks are based on a slew of Microsoft operating systems, some more than a decade old. The Coast Guard has been watching the development of Department of Defense's JEDI cloud contract, Adm. Karl Schultz said in August. Now, the Coast Guard hopes to migrate some of its data to the cloud while keeping some of it on the government servers it operates. “USCG recognizes it must partner with Industry” the request states. https://www.fedscoop.com/coast-guard-cloud-it-consolidation-procurement/

Toutes les nouvelles