28 avril 2020 | International, Aérospatial

COVID-19 Forces USN To Expedite USAF Workshare Agreement

Lee Hudson

The U.S. Navy has expedited its component workshare agreement with an Air Force aviation depot because of coronavirus-related workforce shortages.

Fleet Readiness Center East (FRCE) located in North Carolina was initially scheduled to begin working on a Boeing F-18 cabin safety valve later this year while the Oklahoma City Air Logistics Complex's test chamber was closed for scheduled maintenance. But the time line was accelerated when Tinker AFB in Oklahoma had a significant number of workers unavailable due to COVID-19 risk mitigation efforts.

The cabin safety valve is an integral part of the aircraft's environmental control system, Mary Linton, an aerospace engineer on the Gas Turbine Compressor-Pneumatics Fleet Support Team at FRCE, said in an April 27 statement. The valve is a component on both legacy F/A-18 Hornets and newer Super Hornets that acts as a backup to maintain cabin pressure above 23,000 ft. The part also serves as a supplement to the cabin air pressure regulator when the aircraft is in a rapid dive.

“The original intent of bringing this workload to FRCE was to support Tinker Air Force Base through a major support equipment rework effort,” Linton said. “All of the great effort that went into establishing this capability proved even more critical to maintaining the readiness of the F-18 fleet as we navigate through the COVID-19 crisis.”

The FRCE team was prepared to begin repairing, checking and testing the cabin safety valves in May, beginning with 20 per month before getting to a monthly rate of 40 by July, said John Miller, a planner and estimator with the Maintenance, Repair and Overhaul Logistics department at FRCE.

To date, FRCE has completed 18 of the 40 units inducted so far, with plans to funnel 10 more into the pipeline. Once those first units are completed, the team must wait for additional valves to maintain the workflow.

“The availability of components is still in flux due to COVID-19 and other factors, but the transition should move smoothly,” Miller said.

https://aviationweek.com/defense-space/budget-policy-operations/covid-19-forces-usn-expedite-usaf-workshare-agreement

Sur le même sujet

  • Chinese Actor SecShow Conducts Massive DNS Probing on Global Scale

    11 juin 2024 | International,

    Chinese Actor SecShow Conducts Massive DNS Probing on Global Scale

    New research reveals SecShow, a Chinese actor using DNS probes to measure responses from open resolvers.

  • Cyber’s uncertain future: These radical technologies and negative trends must be overcome

    10 novembre 2020 | International, C4ISR, Sécurité

    Cyber’s uncertain future: These radical technologies and negative trends must be overcome

    James Van de Velde The fate of the world may literally hinge on which states develop and appropriately introduce the radical technologies that are likely to disrupt cyberspace and the world. What are they, and what disruption do they pose? Here are a few, split into two categories: Radical-leveling technologies have leapt from linear to exponential capabilities and will shape the future competition: Additive manufacturing (i.e., 3D printing): “Who can manufacture what” may no longer be decided by governments. Human-machine interfacing: Where will this lead intelligence collection, privacy and security? The Internet of Things' expanded attack surface: The IoT may invite a near-constant struggle between good and malicious cyberspace actors throughout our government, intelligence, defense and commercial lives. Chain algorithm (i.e., blockchain) and cryptocurrencies: We have yet to discern how blockchain technology will be integrated into both public and private networks, such as for protecting the national currency of states, and what such integration will mean for intelligence collection and effects operations. Algorithmic-driven operations: Relying on algorithms in operations may aid both our and our adversaries' operations. Data analytics: Successful application of data analytics will help reduce false positives and aid in forensics (by discerning trends better). But new ways to collect, manage and analyze data will have to be discerned. Data localization: States are likely to Balkanize cyberspace into defensive pockets to capture and protect data (rather than surrender control entirely to the cloud or to servers outside their states). Russia and China are already Balkanizing their networks; many states will follow Russia and China's lead. New forms of encryption, including decentralized, local and private encryption: Enabled by quantum computing, new forms of encryption will make cyber operations more difficult. Emerging technologies represent new tech — currently developed or developed within five to 10 years — that will shape the future competition: Artificial intelligence (i.e., machine learning): China has declared that it plans to be the world's leader in AI and integrate it as much as possible into its technology and military forces and strategy. How will AI assist or thwart cyber intelligence collection, or affect the development of offensive or defensive cyberspace operations? Setting norms for AI will present new intellectual, technical and legal challenges. Quantum computing: The integration of quantum computing will assist and thwart cyber intelligence collection, as well as affect the development of offensive and defensive cyberspace operations. China's announced 2030 goal to develop a high-performing quantum computer with decryption capability is an existential threat to Western society, as it would afford adversaries unprecedented leverage and advantage over U.S. society. Shifting to quantum-resistant algorithms and encryption present certain costs and technical challenges, and a likely long-term transition. Nanotechnology: How will life as well as state vs. state competition change if devices that can impact the environment, health care or energy efficiency are built on the scale of atoms and molecules? Neuroscience technologies — biology and cyber: We have yet to discern how biology and cyberspace will converge to afford biological levels of cybersecurity and cyber biosecurity. The United States will also face challenging technological, political, historical, numerical and policy trends that will complicate efforts to absorb these technologies; the United States may soon have to adopt asymmetric strategies to contend with its competitors: The United States is telling itself that it is a status quo power (and that attempting domain dominance in cyberspace is somehow dangerous, wrong or imperial). The country currently suffers from “cyberspace fatigue” — a sense that our daily loss via cyberspace to ransomware, financial and proprietary theft, privacy invasion, and political influence is inevitable and inescapable. China and Russia both enjoy “asymmetry in interest.” That is, both Russia and China believe they care more about their foreign policy, national security, and cyberspace interests and activities than the United States and Americans generally do. It will soon be impossible for the United States to compete with China via numbers — even in cyberspace. Chinese forces will soon outnumber U.S. forces in every sector, including cyberspace forces. As the private sector compiles and controls unprecedented amounts of data on U.S. and non-U.S. citizens around the world, new public-private sector relationships must be devised. The private sector will have many more times the quantity of data on individuals and commercial activity than the U.S. government could ever obtain. China is now “out-cycling” the United States. The Chinese can do acquisition faster now than the United States, which means they will be able to collect on technological countermeasures and adopt counter-countermeasures to our attempts to defeat Chinese technology. The United States has yet to acknowledge explicitly that we are not so much in a “great power” competition, but instead we are in an era of the rise of authoritarian, anti-liberal democratic states. This is a much more serious problem, as, if left unacknowledged, the United States will appear as morally equivalent. The U.S. government may no longer be the lead for all complex technologies, including those involved in national security, computing, sensing or data analytics. Sad fact. We have — to date — accepted policy inferiority in cyberspace. We defend against malicious cyberspace operations, but we have been reluctant to conduct the escalation necessary to restore the norms we seek to protect. https://www.c4isrnet.com/opinion/2020/11/09/cybers-uncertain-future-these-radical-technologies-and-negative-trends-must-be-overcome/

  • UN SUCCESSEUR DE NOUVELLE GÉNÉRATION POUR LE GRIPEN

    29 juin 2020 | International, Aérospatial

    UN SUCCESSEUR DE NOUVELLE GÉNÉRATION POUR LE GRIPEN

    Par Stefan Barensky - 25 juin 2020 Stockholm souhaite moderniser sa force aérienne face à la menace posée par Moscou. Cela va passer par l'intégration dans son armée de l'air d'avions de combat Gripen E/F de Saab, mais aussi par la mise en chantier d'un chasseur de nouvelle génération. Il y avait déjà le NGF (Next Generation Fighter) franco-germano-espagnol du Système de combat aérien futur (Scaf) et le Tempest britannique, mais l'Europe va bientôt se retrouver avec un troisième chasseur de nouvelle génération en développement. L'annonce est intervenue discrètement, et de manière laconique, le 15 juin, dans un discours en téléconférence du ministre de la Défense suédois, Peter Hultqvist, lors du forum des chefs de mission de l'Otan, dont son pays n'est pas membre. Parlant du danger que représentent pour les démocraties les efforts de déstabilisation par la désinformation, il a surtout mis en avant son intention de mettre sur pied une agence de défense psychologique. https://www.aerospatium.info/un-successeur-de-nouvelle-generation-pour-le-gripen/

Toutes les nouvelles