16 février 2018 | International, Terrestre

Safran développe des robots pour l'armée de terre

30/01/2018 à 07h05

Safran travaille avec cinq PME à la création de robots pour l'armée de terre. Parmi ces nouveaux supplétifs, un véhicule autonome développé avec PSA et Valeo.

L'armée française aura d'ici quelques années des véhicules robots assistant les unités de combats au sol. Safran a été retenu comme chef de fil industriel dans le cadre du programme dénommé Furious (FUturs systèmes Robotiques Innovants en tant qu'OUtilS au profit du combattant embarqué et débarqué).

Les missions assignées à ces futurs robots terrestres seront l'exploration de b'timents, le transport de charge et de matériels pour fantassins. Les objectifs de ce programme insistent "sur leurs capacités novatrices comme l'autonomie de déplacement en évitant les obstacles dans tous types d'environnements."

Ce projet, qui prépare le futur programme d'insertion de robots terrestres au sein des forces armées, consiste à tester trois prototypes de tailles différentes au sein d'une section d'infanterie dès 2019, a précisé la Direction générale de l'armement (DGA) qui a passé ce marché. Le plus gros des trois robots sera le véhicule autonome eRider développé par Safran Electronics & Defense en partenariat avec Valeo et PSA.

Cinq PME sont associées au programme mené par Safran

Les tests seront effectués au centre d'entraînement aux actions en zone urbaine (Cenzub) hébergé dans le camp militaire de Sissonne, (Aisne).

Compte tenu du calendrier serré du projet (18 mois pour la première étape) Safran s'est associé à cinq PME: Effidence, Technical Studio, Kompai et 4D Virtualiz. L'industriel a également sollicité la collaboration de laboratoires robotiques français: le CNRS, l'Institut Pascal, l'IRSTEA, les Mines de Paris et le LORIA notamment.

Le projet Furious s'insère dans le cadre de Scorpion, programme de renouvellement des capacités de combat de l'armée de terre.

http://bfmbusiness.bfmtv.com/entreprise/safran-developpe-des-robots-pour-l-armee-de-terre-1361069.html

Sur le même sujet

  • How Army network modernization efforts ensure equipment works with allies

    6 août 2020 | International, C4ISR

    How Army network modernization efforts ensure equipment works with allies

    Andrew Eversden A critical piece of the U.S. Army's network modernization push is ensuring its systems work with allies. In future battles, the Army will not fight alone; it will be joined by coalition partners, as well as other U.S. services. As the Army moves to improve its integrated tactical network, it must ensure that its network tools work with coalition and service partners The Army recently completed a critical design review of Capability Set '21 a set of new network tools that will be delivered to soldiers next year. The service is in the first phase of procuring the new capabilities. A “key factor” involved in delivery to soldiers at the battalion level and below is a move to a 75 percent “secure but unclassified” network that provides improved communication between coalition partners, said Col. Garth Winterle, project manager for tactical radios at the Army's Program Executive Office Command, Control, Communications-Tactical. “We're moving off of an all-secret network to one that's a lot more flexible and actually encourages coalition interoperability,” Winterle said. One opportunity to test interoperability was Defender Europe 2020, which was meant to be one of the largest European exercises involving both the U.S. Army and NATO allies, but had to be scaled down due to the coronavirus pandemic. Still, the Army was able to test interoperability There were a series of pre-Defender Europe exercises to assess capabilities “to inform future network design,” according to Justine Ruggio, director of communications for the Network Cross-Functional Team at Army Futures Command. These assessments included several pieces of Capability Set '21, including communications exercises and validation exercises with the Army's fielded Command Post Computing Environment software, Tactical Server Infrastructure and Commercial Coalition Equipment “to enable the use of the Mission Partner Environment, which allowed all participants to share classified information during the exercise, including the Polish and U.K.,” Ruggio said. During the pre-Defender Europe tests, “we were able to bridge the Polish and U.K. unit into an integrated command structure using our secret releasable network and create that common command-and-control picture,” Col. Lesley Kipling, the mission command lead and Army National Guard liaison officer to the Network CFT, said in an interview with C4ISRNET. Secret but releasable information is classified at the secret level and can be released to certain coalition partners who have sufficient clearance from their home country. An exercise scheduled for next year, called Warfighter 21-4, will allow for additional interoperability assessments with U.K. and French forces. According to Ruggio, one focus area will be on interoperability using the Network CFT's DevOps model to iterate the Command Post Computing Environment, continue to assess Commercial Coalition Equipment and evaluate the Mission Partner Environment. The event will be aligned with Capability Set '23, the next iteration of network tools. Kipling added that the cross-functional team and its partners are “continuing” to work on policies and training for properly connecting to a coalition network “so that it's not learning on the fly, but that these procedures and policies are codified in a way that they can be standardized and any user can execute whenever they're put in a situation,” she said. Brig. Gen. Joseph Papenfus, chief Information officer and deputy chief of staff of the G6 of U.S. Army Europe, said that the scaled-back nature of Defender Europe did affect network interoperability testing because soldiers were unable to come over from the United States. That means that U.S. Army Europe will focus heavily on European partners during the smaller exercises, Papenfus said, including validating network integration and establishing a secret but releasable network with NATO. “Every opportunity that we have to see how a piece of equipment works within the larger set of the network, we take advantage of that,” Ruggio said. https://www.c4isrnet.com/yahoo-syndication/2020/07/29/how-army-network-modernization-efforts-ensure-equipment-works-with-allies

  • Defense Department Seeks ‘Rapid Cloud Migration’ Ideas for MilCloud

    4 septembre 2018 | International, C4ISR

    Defense Department Seeks ‘Rapid Cloud Migration’ Ideas for MilCloud

    BY FRANK KONKEL MilCloud 2.0 is about to host a lot more data, and the Defense Department wants ideas for how to get it there faster. The Defense Department's technical arm wants to see what capabilities exist in the marketplace to improve the migration of data and applications to milCloud 2.0, the Pentagon's on-premise cloud. On Wednesday, the Defense Information Systems Agency issued a request for informationto industry seeking input on “rapid cloud migration” as it aims to understand capabilities relevant to “automated cloud migration techniques.” The RFI, which does not constitute a solicitation but could lead to one-on-one discussions with vendors, comes three months after Pentagon memo directed all “fourth-estate” defense agencies to migrate all data and applications to milCloud 2.0 by 2020. In the interim, the Office of the Department of Defense Chief Information Officer had planned to coordinate with affected agencies, including DISA, to plan their cloud migrations. MilCloud 2.0 went live earlier this year as part of a three-year, $500 million contract won by CSRA, which has since been purchased by defense contractor General Dynamics. The RFI makes clear the Pentagon's current migration strategy, which includes “manual cloning and conversion of server images, which are then provisioned, into the new cloud environment, or provisioning, building and configuring applications on virtual servers from scratch,” is not sufficient. “This RFI seeks migration solutions that can accurately duplicate the suite of servers used with an application from their current environment into a cloud environment built on Apache CloudStack technology and KVM hypervisor,” the RFI states. “The scope of duplication includes all applications used with the system, configuration of network and network security controls when proper APIs are exposed, and identification of interactions within the application system and to external systems when needed network traffic is made available for analysis.” Options, the RFI says, could include the “use of vendor-provided tools or analytic capabilities if packet captures, or other network monitoring information.” Industry responses must be received by Sept. 10. https://www.defenseone.com/technology/2018/08/defense-department-seeks-rapid-cloud-migration-ideas-milcloud/150934/

  • Colombia to buy Saab fighter aircraft, Swedish public radio reports

    5 novembre 2024 | International, C4ISR, Sécurité

    Colombia to buy Saab fighter aircraft, Swedish public radio reports

Toutes les nouvelles