5 septembre 2018 | International, C4ISR

DoD extends deadline for its $10B cloud contract

By:

The Pentagon has pushed back the response deadline for its $10 billion, single-award Joint Enterprise Defense Infrastructure cloud contract by nearly a month, according to an Aug. 31 FedBizOpps posting.

The Department of Defense made amendments to five documents associated with the contract, which, according to the new posting, were part of the consideration for moving the request for proposal due date to Oct. 9, rather than the previous Sept. 17 deadline.

In addition to the amended documents, the DoD released 59 industry comments and corresponding government answers about the first RFP amendment made Aug. 23.

The contract has already received industry protest prior to award, after many criticized the DoD's intent to award the contract to a single cloud provider. The due date for that protest, moved to Dec. 3 after an update was made, is still well beyond the new bidding deadline.

https://www.federaltimes.com/govcon/2018/09/04/dod-extends-deadline-for-its-10b-cloud-contract

Sur le même sujet

  • KONGSBERG secures NOK 1.2 billion order for deliveries to F-35 Joint Strike Fighters

    24 septembre 2023 | International, Aérospatial

    KONGSBERG secures NOK 1.2 billion order for deliveries to F-35 Joint Strike Fighters

    Kongsberg Defence & Aerospace has signed an agreement with Lockheed Martin Aeronautics worth NOK 1.2 billion to supply parts for the F-35 Joint Strike Fighter Program.

  • DARPA Seeks Secure Microchip Supply Chain

    1 juin 2020 | International, C4ISR

    DARPA Seeks Secure Microchip Supply Chain

    "Once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible," explains a DARPA spokesperson. By THERESA HITCHENSon May 29, 2020 at 2:46 PM WASHINGTON: DARPA has launched a four-year project to find ways to design security features into microchips as they are being made to help ensure the future supply chain. While the name of the project is daunting — Automatic Implementation of Secure Silicon (AISS) — and the technical requirements are a serious challenge, the concept is pretty simple. “AISS aims to automate the process of incorporating security into chip designs, making it easier and potentially more cost effective for any organization with even a small design team (start-ups, mid-size companies, etc.) to build security measures into their designs,” a DARPA spokesperson told Breaking D today. “Overall, with AISS DARPA aims to bring greater automation to the chip design process to profoundly decrease the burden of including security measures,” the spokesperson said. The two winning teams, according to a May 27 DARPA press release, are: The two AISS research teams are: Synopsys, Arm, Boeing, Florida Institute for Cybersecurity Research at the University of Florida, Texas A&M University, UltraSoC, and the University of California, San Diego Northrop Grumman, IBM, University of Arkansas, and University of Florida “Research and development on the $75 million program was commenced two weeks ago and incremental capabilities are expected to roll out to the chip design community over the next four years,” the spokesperson said in an email. “Our hope is that many of the capabilities will start appearing as features in commercial design automation software before the program completion.” Digital integrated circuits are the engines that drive modern computers, and everyday digital devices such as smart phones. They are critical to the evolution of the Internet of Things (IoT). As such, they increasingly have become a key target of hacking by US adversaries and cyber criminals alike, DARPA explains. “Threats to IC chips are well known, and despite various measures designed to mitigate them, hardware developers have largely been slow to implement security solutions due to limited expertise, high cost and complexity,” the DARPA release says. “Further, when unsecure circuits are used in critical systems, the lack of embedded countermeasures exposes them to exploitation.” Indeed, the Department of Commerce on May 15 took another swipe at Chinese telecoms behemoth Huawei and tightened its earlier efforts to block it from exporting its semiconductors and products to the US and allies. The Trump administration alleges that Huawei's hardware and software, in particular that related to 5G wireless technology, are full of deliberate security holes in order to enable Chinese government spying. The ruling by Commerce's Bureau of Industry and Security, which will take effect in September, seeks to prevent companies around the world from using American-made software and machinery develop chips for Huawei or its subsidiary firms. The problem for device-makers, particularly in the IoT world where the market is largely for commercial products (think smart refrigerators), is that fixing potential security holes often isn't seen as worth the time, effort and most importantly, money. “The inclusion of security also often requires certain trade-offs with the typical design objectives, such as size, performance, and power dissipation,” the DARPA spokesperson said. “For example, something like a sprinkler isn't likely to require the highest level of security protections. Investing in security mechanisms that take up a lot of space on the underlying chip, or significantly impact chip performance likely doesn't make sense based on the sprinkler's expected use and application.” And yet, that future IoT sprinkler also will be other IoT devices and computer networks in operation by an individual, a company or a facility, such as a weapons depot. Even more unfortunately, the spokesperson explained, “modern chip design methods are unforgiving – once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible.” Thus, the AISS program is aimed at spurring research into two areas that can address four types of microchip vulnerability, the release says: “side channel attacks, hardware Trojans, reverse engineering, and supply chain attacks, such as counterfeiting, recycling, re-marking, cloning, and over-production.” The first area of research will be focusing on “development of a ‘security engine' that combines the latest academic research and commercial technology into an upgradable platform that can be used to defend chips against attacks, and provide an infrastructure to manage these hardened chips as they progress through their lifecycle,” DARPA said. The second area, led by software specialists Synopsys, “involves integrating the security engine technology developed in the first research area into system-on-chip (SOC) platforms in a highly automated way,” the DARPA release said. The Synopsys team also will be working on how to integrate new security designs and manufacturing tools with currently available off-the-shelf products. Nicholas Paraskevopoulous, sector VP for emerging capabilities development at Northrop Grumman, said in a May 27 press release that the firm's “design tools will enable the development of secure and trusted integrated circuits with reduced costs.” Northrop Grumman is involved in the first AISS research area. Synopsis could not be reached for comment by press time. https://breakingdefense.com/2020/05/darpa-seeks-secure-microchip-supply-chain/

  • French Naval Group and Germany’s ThyssenKrupp square off in Egyptian warship deal

    13 septembre 2018 | International, Naval

    French Naval Group and Germany’s ThyssenKrupp square off in Egyptian warship deal

    By: Pierre Tran PARIS – Naval Group finds itself in direct competition with German rival ThyssenKrupp Marine Systems in Egypt's acquisition of two more corvettes, Hervé Guillou, CEO of the French shipbuilder told Defense News. The contest comes after Egypt in 2014 placed an order for four Naval Group Gowind corvettes worth some €1 billion, with options for two more units. Winning that two-year option has since become anything but certain for the French company. “TKMS is not sitting on its hands,” Guillou said on Tuesday on the sidelines of the Summer Defense University event at the military staff college here. There already is a “permanent presence of the Germans” in Egypt, which operates a fleet of German submarines, Guillou explained. Egypt attracts strong international interest, with the Chinese, Koreans, Dutch shipbuilder Damen and French electronics company Thales very active, he added. The TKMS offer consists of two Meko 200 corvettes, worth €1 billion (US $1.2 billion) excluding weapons, business publication La Tribune reported Sept. 3. That is double the value of the two Gowind 2500 corvettes pitched by Naval Group, the report said. A spokesman for Naval Group declined to comment on the prices. If TKMS were to snatch the business in the end, the French interministerial committee overseeing arms export likely would approve a sale of MBDA-made Aster 15 missiles for the German ships, a French government official said. The company, a joint venture by Airbus, BAE Systems and Leonardo, is pursuing a “platform neutral” sales pitch, placing an emphasis on boosting foreign sales, according to an industry source. Guillou said he attended Egypt's launch on Sept. 6 of the first locally built Gowind, christened Port Said. “It all went well,” he said. The Egyptian Navy sails a FREMM multimission frigate and two Mistral-class helicopter carriers. The four Gowind corvettes will complement that fleet. The day before the Egyptian launch, Guillou was in Poland pitching three Scorpene diesel-electric submarines to the Polish authorities. “There is political support at the highest level,” he said, referring to the French government backing. That offer competes with TKMS offering its 212CD and Saab the A26 boat. Full article: https://www.defensenews.com/naval/2018/09/12/french-naval-group-and-germanys-thyssenkrupp-square-off-in-egyptian-warship-deal

Toutes les nouvelles