25 juillet 2024 | International, Terrestre

US, Vietnam discuss supplying Hanoi with C-130 military transport planes, sources say

Sur le même sujet

  • A tweaked DoD cloud strategy looks beyond Amazon

    5 février 2019 | International, C4ISR

    A tweaked DoD cloud strategy looks beyond Amazon

    By: Jessie Bur A recent Department of Defense memorandum indicates that the agency wants to pursue multiple commercial cloud vendors as it attempts to modernize its IT and data infrastructure, though a single provider will still have singular influence over the agency's “general purpose cloud.” “DoD is driving toward an enterprise cloud environment that is composed of a general purpose cloud and multiple fit-for-purpose clouds,” the memorandum to Congress, released Feb. 4, said. “In addition, it should be recognized that the Department will still need non-cloud data center capability for applications that are not suited for the cloud. Over time, with the adoption of an enduring enterprise cloud strategy, the non-cloud environment should become smaller.” That general purpose slot will be filled by the awardee of the $10 billion Joint Enterprise Defense Infrastructure contract, which has been criticized for its single-award intent as giving the winner an outsized control of the defense cloud market. Many companies vying to support the Pentagon's cloud requirements claimed that the odds were stacked in Amazon's favor. The approach spurred protests and a lawsuit in fact. According to the memorandum, the fit-for-purpose environment will be made up of the Defense Information Systems Agency's milCloud suite, as well as other unnamed vendors. Throughout the cloud migration process, DoD will stick to four guiding principles: War-fighter First — any cloud solution must at all times address the needs of improving lethality while not jeopardizing the safety and mission of American war fighters. Cloud-Smart, Data-Smart — cloud solutions must streamline transformation and embrace modern capabilities while enhancing data transparency and visibility. Leverage Commercial Industry Best Practices — the cloud strategy should promote competition and innovation while preventing lock-in of one particular solution or technology. Create a Culture Better Suited for Modern Technology Evolution — the strategy will need to create a culture of learning and innovation while discouraging custom, federated approaches. This approach to commercial cloud is not entirely unexpected, as DoD Chief Information Officer Dana Deasey said during an October 2018 press event for the Defense Enterprise Office Solution cloud contractthat the agency would be delineating between general purpose and fit for purpose contracts. "This marks a milestone in our efforts to adopt the cloud and also in our larger efforts to modernize information technology across the DOD enterprise," Deasy said in a statement on the memo to Congress. “A modern digital infrastructure is critical to support the war fighter, defend against cyberattacks and enable the department to leverage emerging technologies like machine learning and artificial intelligence.” The new strategy also means that DoD will move away from a cybersecurity posture that focuses on perimeter defense and instead prioritize the protection of data and systems. “DoD will produce a unified cybersecurity architecture that addresses cloud and the needs of classified and unclassified missions and data. The capabilities will be tested and assessed independently and frequently to ensure that cybersecurity attributes remain effective against developing threats,” the memo said, adding that the CIO will determine the command and control requirements between the agency and the cloud service providers. Cloud contracts will also likely include requirements for training and workforce development to ensure that DoD can develop the expertise necessary to use and protect their new cloud environments. And any potential migrations to cloud will have to come with thorough evaluations of legacy DoD applications. “It is imperative that DoD has a cloud strategy to ensure that legacy applications are not moved to cloud without properly re-architecting them to make use of the data, security, resiliency and application advantages that cloud provides,” the memo said. “Additionally, DoD should independently test and assess cloud network security to verify security compliance and incident response and review all contractor and third-party testing results to ensure that performance and security monitoring are sufficient.” https://www.federaltimes.com/it-networks/cloud/2019/02/04/dod-to-officially-pursue-a-multi-vendor-cloud-strategy

  • Pentagon seeks better insight into F-35 sub-tier suppliers

    14 décembre 2018 | International, Aérospatial

    Pentagon seeks better insight into F-35 sub-tier suppliers

    Pat Host, Washington, DC - Jane's Defence Weekly Key Points The Pentagon is seeking better insight into F-35 sub-tier suppliers It is likely that the Pentagon is looking for vulnerability points or perhaps more accurate pricing The Pentagon is seeking a better understanding of the risks presented by key components and organisations in the Lockheed Martin F-35 Lightning II Joint Strike Fighter (JSF) sustainment supply chain that could have an impact on overall programme cost, schedule, and performance. The F-35 Joint Program Office (JPO) relies heavily on Lockheed Martin and F135 engine developer Pratt & Whitney to provide insight into sustainment supply chain risks for the air system. The JPO has a good understanding of Lockheed Martin, Pratt & Whitney, and their major suppliers, but the Pentagon said there is often limited visibility into the sub-tier suppliers who provide critical components and personnel to support sustainment. Naval Air Systems Command (NAVAIR) on 3 December posted a request for proposal (RFP) on Federal Business Opportunities for F-35 JPO Sustainment Supply Chain Risk Management (SCRM). The contractor will need to produce and maintain an F-35 supply chain mapping and associated risk assessment. The contractor will map the air system sustainment supply chain to at least the third tier, up to a total of 250 suppliers. The map will need to show how suppliers are mapped, both vertically and horizontally. The contractor will provide a high-level risk analysis, comprising a minimum of the supplier ownership history and manufacturing locations within the last 10 years for all 250 suppliers mapped. The contractor will then provide a full risk analysis for 80 of the 250 suppliers identified, including, at a minimum: ownership history, financial information, partnerships, legal issues, and countries of origin and manufacturing locations. https://www.janes.com/article/85171/pentagon-seeks-better-insight-into-f-35-sub-tier-suppliers

  • How Army network modernization efforts ensure equipment works with allies

    30 juillet 2020 | International, C4ISR

    How Army network modernization efforts ensure equipment works with allies

    Andrew Eversden A critical piece of the U.S. Army's network modernization push is ensuring its systems work with allies. In future battles, the Army will not fight alone; it will be joined by coalition partners, as well as other U.S. services. As the Army moves to improve its integrated tactical network, it must ensure that its network tools work with coalition and service partners The Army recently completed a critical design review of Capability Set '21 a set of new network tools that will be delivered to soldiers next year. The service is in the first phase of procuring the new capabilities. A “key factor” involved in delivery to soldiers at the battalion level and below is a move to a 75 percent “secure but unclassified” network that provides improved communication between coalition partners, said Col. Garth Winterle, project manager for tactical radios at the Army's Program Executive Office Command, Control, Communications-Tactical. “We're moving off of an all-secret network to one that's a lot more flexible and actually encourages coalition interoperability,” Winterle said. One opportunity to test interoperability was Defender Europe 2020, which was meant to be one of the largest European exercises involving both the U.S. Army and NATO allies, but had to be scaled down due to the coronavirus pandemic. Still, the Army was able to test interoperability. There were a series of pre-Defender Europe exercises to assess capabilities “to inform future network design,” according to Justine Ruggio, director of communications for the Network Cross-Functional Team at Army Futures Command. These assessments included several pieces of Capability Set '21, including communications exercises and validation exercises with the Army's fielded Command Post Computing Environment software, Tactical Server Infrastructure and Commercial Coalition Equipment “to enable the use of the Mission Partner Environment, which allowed all participants to share classified information during the exercise, including the Polish and U.K.,” Ruggio said. During the pre-Defender Europe tests, “we were able to bridge the Polish and U.K. unit into an integrated command structure using our secret releasable network and create that common command-and-control picture,” Col. Lesley Kipling, the mission command lead and Army National Guard liaison officer to the Network CFT, said in an interview with C4ISRNET. Secret but releasable information is classified at the secret level and can be released to certain coalition partners who have sufficient clearance from their home country. An exercise scheduled for next year, called Warfighter 21-4, will allow for additional interoperability assessments with U.K. and French forces. According to Ruggio, one focus area will be on interoperability using the Network CFT's DevOps model to iterate the Command Post Computing Environment, continue to assess Commercial Coalition Equipment and evaluate the Mission Partner Environment. The event will be aligned with Capability Set '23, the next iteration of network tools. Kipling added that the cross-functional team and its partners are “continuing” to work on policies and training for properly connecting to a coalition network “so that it's not learning on the fly, but that these procedures and policies are codified in a way that they can be standardized and any user can execute whenever they're put in a situation,” she said. Brig. Gen. Joseph Papenfus, chief Information officer and deputy chief of staff of the G6 of U.S. Army Europe, said that the scaled-back nature of Defender Europe did affect network interoperability testing because soldiers were unable to come over from the United States. That means that U.S. Army Europe will focus heavily on European partners during the smaller exercises, Papenfus said, including validating network integration and establishing a secret but releasable network with NATO. “Every opportunity that we have to see how a piece of equipment works within the larger set of the network, we take advantage of that,” Ruggio said. https://www.c4isrnet.com/yahoo-syndication/2020/07/29/how-army-network-modernization-efforts-ensure-equipment-works-with-allies/

Toutes les nouvelles