6 avril 2022 | International, Naval

Laser weapons development should involve multiple suppliers, says Northrop

A modular approach to laser weapon development that encourages companies to specialize in individual subsystems rather than the whole integrated product could help the Pentagon expand the industrial base for these kinds of future weapons technologies.

https://www.defensenews.com/industry/techwatch/2022/04/04/laser-weapons-development-should-involve-multiple-suppliers-says-northrop/

Sur le même sujet

  • Cyber Command’s acquisition authority still in its infancy

    10 septembre 2018 | International, C4ISR

    Cyber Command’s acquisition authority still in its infancy

    By: Mark Pomerleau U.S. Cyber Command is still in the beginning stages of building out an acquisition capability. Eight years after its launch and about two years after being granted limited acquisition authority from Congress, the command is still working to demonstrate that its wares and abilities make good use of funds and that it is capable of managing contracts, its acquisition executive said. “I will say we are in our infancy from an acquisition perspective. We are putting the foundation of the personnel and the skills,” Stephen Schanberger said Sept. 6 at the Billington Cybersecurity Summit. “We're in the beginning stages right now.” In the fiscal 2016 defense authorization bill, Congress gave Cyber Command limited acquisition authority capped at $75 million with a sunsetting in 2021. Congressional aides have equated this authority to that of Special Operations Command, noting that they wanted to employ a crawl, walk, run mentality to make sure Cyber Command can execute it. Schanberger said the command is asking for more on both fronts, with a ceiling of $250 million and a sunset of 2025 — the timeline being the most important element as it makes it easier to work with vendors who know contracts might not be in doubt three years from now. For Congress's part, Schanberger said they want the command to show it can use the authority in the way it's supposed to and start to stand up the backbone of a contracting organization. This includes being able to put together solicitation packages, plan contracting strategy for years ahead and be able to effectively implement and put out proposals and award them without making a mess, he said. Schanberger said the command currently has one contracting officer and one specialist and a couple of contractors aside from himself in the contracting shop, though he expects those numbers to double in the next three months. Cyber Command issued its first contract under this limited authority in October 2017. Schanberger said the command awarded only one contract in fiscal 2017, due in part to the fact they lacked a contract writing system, which is now in place. In fiscal 2018, the command is on track to award roughly $40 million in contracts and in fiscal 2019 is on a path to get close to its cap, Schanberger said. Congress has also asked what the delineation lines are between the acquisition efforts of Cyber Command and those of the services, Schanberger said. “Right now what we really look at are what are the gaps between us and our service partners and how do we help fill those gaps,” he said. “Typically, there are a couple of programs where we did the prototyping efforts and we transitioned that to the services. That's where we see our most value ... things that can benefit all our service cyber components.” Some within Congress have expressed that Cyber Command has approached acquisition cautiously and are concerned the services aren't budgeting and providing the tools and capabilities that the cyber mission force needs. Schanberger said he thinks that command has demonstrated that it can issue contracts effectively, efficiently and quickly. However, he noted, he still does not think the command has the wherewithal internally to run something as big as the Unified Platform, one of DoD's most critical cyber programs, from a resource perspective. https://www.fifthdomain.com/dod/cybercom/2018/09/07/cyber-commands-acquisition-authority-still-in-its-infancy

  • How Army network modernization efforts ensure equipment works with allies

    6 août 2020 | International, C4ISR

    How Army network modernization efforts ensure equipment works with allies

    Andrew Eversden A critical piece of the U.S. Army's network modernization push is ensuring its systems work with allies. In future battles, the Army will not fight alone; it will be joined by coalition partners, as well as other U.S. services. As the Army moves to improve its integrated tactical network, it must ensure that its network tools work with coalition and service partners The Army recently completed a critical design review of Capability Set '21 a set of new network tools that will be delivered to soldiers next year. The service is in the first phase of procuring the new capabilities. A “key factor” involved in delivery to soldiers at the battalion level and below is a move to a 75 percent “secure but unclassified” network that provides improved communication between coalition partners, said Col. Garth Winterle, project manager for tactical radios at the Army's Program Executive Office Command, Control, Communications-Tactical. “We're moving off of an all-secret network to one that's a lot more flexible and actually encourages coalition interoperability,” Winterle said. One opportunity to test interoperability was Defender Europe 2020, which was meant to be one of the largest European exercises involving both the U.S. Army and NATO allies, but had to be scaled down due to the coronavirus pandemic. Still, the Army was able to test interoperability There were a series of pre-Defender Europe exercises to assess capabilities “to inform future network design,” according to Justine Ruggio, director of communications for the Network Cross-Functional Team at Army Futures Command. These assessments included several pieces of Capability Set '21, including communications exercises and validation exercises with the Army's fielded Command Post Computing Environment software, Tactical Server Infrastructure and Commercial Coalition Equipment “to enable the use of the Mission Partner Environment, which allowed all participants to share classified information during the exercise, including the Polish and U.K.,” Ruggio said. During the pre-Defender Europe tests, “we were able to bridge the Polish and U.K. unit into an integrated command structure using our secret releasable network and create that common command-and-control picture,” Col. Lesley Kipling, the mission command lead and Army National Guard liaison officer to the Network CFT, said in an interview with C4ISRNET. Secret but releasable information is classified at the secret level and can be released to certain coalition partners who have sufficient clearance from their home country. An exercise scheduled for next year, called Warfighter 21-4, will allow for additional interoperability assessments with U.K. and French forces. According to Ruggio, one focus area will be on interoperability using the Network CFT's DevOps model to iterate the Command Post Computing Environment, continue to assess Commercial Coalition Equipment and evaluate the Mission Partner Environment. The event will be aligned with Capability Set '23, the next iteration of network tools. Kipling added that the cross-functional team and its partners are “continuing” to work on policies and training for properly connecting to a coalition network “so that it's not learning on the fly, but that these procedures and policies are codified in a way that they can be standardized and any user can execute whenever they're put in a situation,” she said. Brig. Gen. Joseph Papenfus, chief Information officer and deputy chief of staff of the G6 of U.S. Army Europe, said that the scaled-back nature of Defender Europe did affect network interoperability testing because soldiers were unable to come over from the United States. That means that U.S. Army Europe will focus heavily on European partners during the smaller exercises, Papenfus said, including validating network integration and establishing a secret but releasable network with NATO. “Every opportunity that we have to see how a piece of equipment works within the larger set of the network, we take advantage of that,” Ruggio said. https://www.c4isrnet.com/yahoo-syndication/2020/07/29/how-army-network-modernization-efforts-ensure-equipment-works-with-allies

  • The Spanish Air Force Buys Another 16 PC-21s & Associated Simulators

    13 mars 2023 | International, Aérospatial

    The Spanish Air Force Buys Another 16 PC-21s & Associated Simulators

    The contract signed with the Direcci?n General de Armamento y Material (DGAM) makes Spain the largest PC-21 operator in Europe

Toutes les nouvelles