17 octobre 2019 | International, Aérospatial

USAF Slashes Helo Training Time With Virtual Reality

By using virtual reality (VR) devices, the U.S. Air Force's 23rd Flying Training Squadron (FTS) at Fort Rucker, Alabama, has slashed flying time by 35 percent, given students 15 hours of additional practice time with aircraft controls, and cut the time needed to complete undergraduate pilot training by six weeks for the first six students using the experimental program.

The 23d FTS is responsible for all Air Force undergraduate rotary-wing pilot training and is a geographically separated unit under the 58th Special Operations Wing (SOW) at Kirtland (New Mexico) AFB. It is the sole entry point for Air Force careers in the Bell UH-1N, Sikorsky HH-60G, and Bell-Boeing CV-22 tiltrotor.

The experimental training program began in 2017 when the squadron found internal training efficiencies that led to a 25 percent increase in overall student pilot production. They decided to take their innovation efforts further by combining technology and innovation.

The squadron initially stood up the program with six VR systems loaded with software for a Bell 412, paid for with $350,000 in 58th SOW innovation funds. Specialized Undergraduate Pilot Training-Helicopter (SUPT-H) class 20-02 was the first class to use the VR training systems starting in May 2019. The students' introduction to VR took place during the initial 19-day academics portion of the curriculum. “After 23.5 hours of VR instruction, students were able to hover, taxi, and perform various other helicopter maneuvers unassisted by their instructor pilots on their very first flight [in an actual aircraft],” said Capt. Matt Strick, 23rd FTS innovation flight lead. “We assessed the students to be at least seven days ahead of schedule at that point.”

The initial goal of the project, called “Project da Vinci” or "Rotary-Wing Next," was reducing the time needed to teach the syllabus from 28 weeks to 14 weeks and to increase student production from 60 to 120 students a year without needing additional aircraft or flying hours. “We're seeing the vast potential of this program unfold right in front of us,” said Lt. Col. Jake Brittingham, 23rd FTS commander. “This is just the start,” he said. “We are focused on ensuring we continue to get even more efficient with our training, while at the same time maintaining the quality of our graduates the Air Force needs and expects.”

The program's VR software is being updated to reflect the unit's Bell TH-1H primary trainer. “The [VR] acquisition proved challenging because of federal computer purchasing laws and limitations and took some time and effort between us, the 42nd Contracting Squadron at Maxwell AFB, 19th AF, and the 338th Specialized Contracting Squadron at Randolph AFB to make the initial purchase,” Brittingham said. “We really couldn't have done this in eight months without the help of the contracting team enabling us to make these purchases smarter and faster.”

https://www.ainonline.com/aviation-news/defense/2019-10-16/usaf-slashes-helo-training-time-virtual-reality

Sur le même sujet

  • The DoD needs data-centric security, and here’s why

    30 septembre 2020 | International, C4ISR, Sécurité

    The DoD needs data-centric security, and here’s why

    Drew Schnabel The U.S. Department of Defense is set to adopt an initial zero-trust architecture by the end of the calendar year, transitioning from a network-centric to a data-centric modern security model. Zero trust means an organization does not inherently trust any user. Trust must be continually assessed and granted in a granular fashion. This allows defense agencies to create policies that provide secure access for users connecting from any device, in any location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. How does the Pentagon's AI center plan to give the military a battlefield advantage? The Pentagon's artificial intelligence hub is working on tools to help in joint, all-domain operations as department leaders seek to use data to gain an advantage on the battlefield. Andrew Eversden To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. Initially, the JIE was an innovative concept that took the DoD from a highly fragmented architecture, in which each agency managed its own cybersecurity strategy, to an architecture in which there is a unified SSA. However, one of the early challenges identified for the JIE was managing cloud cybersecurity as part of the SSA. The components in the JIE — the Joint Regional Security Stacks family's internet access points and cloud access points — have traditionally focused on securing the network, rather than the data or user. As more DoD employees and contractors work remotely and data volumes increase, hardware cannot scale to support them. This has created ongoing concerns with performance, reliability, latency and cost. A cloud-first approach In response, the DoD leverages authorized solutions from the Federal Risk and Authorization Management Program, and it references the Secure Cloud Computing Architecture guidance for a standard approach for boundary and application-level security for impact Level 4 and 5 data hosted in commercial cloud environments. The purpose of the SCCA is to provide a barrier of protection between the DoD Information Services Network and the commercial cloud services that the DoD uses while optimizing the cost-performance trade in cybersecurity. Defense agencies are now exploring enterprise-IT-as-a-service options to move to cloud, and reduce the need for constant updates and management of hardware. Through enterprise-IT-as-a-service models, defense agencies will be able to scale easily, reduce management costs and achieve a more competitive edge over their adversaries. Before the pandemic hit, defense agencies were already moving to support a more mobile workforce, where employees can access data from anywhere on any device. However, a cyber-centric military requires security to be more deeply ingrained into employee culture rather than physical protection of the perimeter. The next evolution to secure DISA and DoD networks is to embrace a secure access edge model with zero-trust capabilities. The SASE model moves essential security functions — such as web gateway firewalls, zero-trust capabilities, data loss prevention and secure network connectivity — all to the cloud. Then, federal employees have direct access to the cloud, while security is pushed as close to the user/data/device as possible. SP 800-27, zero-trust guidance from the National Institute of Standards and Technology, provides a road map to migrate and deploy zero trust across the enterprise environment. This guidance outlines the necessary tenants of zero trust, including securing all communication regardless of network location, and granting access on a per-session basis. This creates a least-privilege-access model to ensure the right person, device and service have access to the data they need while protecting high-value assets. As the DoD transforms the JIE architecture to an as-a-service model with zero-trust capabilities, defense agencies will experience cost savings, greater scalability, better performance for the end user and war fighter, improved visibility, and control across DoD networks — and ultimately a stronger and more holistic cybersecurity capability moving forward. https://www.c4isrnet.com/opinion/2020/09/29/the-dod-needs-data-centric-security-and-heres-why/

  • Move of Canadian Forces aerospace testing organization to Ottawa delayed by construction problems, other issues

    10 septembre 2023 | International, Aérospatial

    Move of Canadian Forces aerospace testing organization to Ottawa delayed by construction problems, other issues

    Fifty-four Aerospace Engineering Test Establishment members are in temporary space now, and the move from Alberta won't finish until 2026.

  • Heavy polar icebreaker questions mount for Coast Guard

    27 juillet 2018 | International, Naval

    Heavy polar icebreaker questions mount for Coast Guard

    By: Andrew C. Jarocki WASHINGTON ― Potential funding woes and questions about the aggressive proposed timelines have cast doubts about the future of the Coast Guard's new heavy polar ice breaker. The Government Accountability Office is dubious the service's lone heavy polar icebreaker can make it to its proposed 2023 retirement date and questioned whether the Coast Guard's construction schedule was too optimistic. The Coast Guard is planing to replace the Polar Star with the new heavy icebreaker the same year, something GAO said may not be “realistic and feasible.” The watchdog noted the aging Polar Star could reach the end of its service life as soon as 2020, and the “highly optimistic” delivery date of the new vessel could be delayed and leave the service without a heavy polar icebreaker to defend strategic Arctic interests for several years. Vice Adm. Daniel Abel, deputy commandant for operations, recently told the Coast Guard and Maritime Transportation Subcommittee at a hearing that the Polar Star is “limping along, and nothing with a US flag could rescue her [in the Arctic] if something happened, putting our polar capabilities at risk." To further complicate matters, House appropriators are currently debating cutting $750 million in funding for the Coast Guard. Vice Adm. Michael McAllister, deputy commandant for mission support, said at the hearing that the entire program schedule is at risk if the appropriations cut is finalized but that he remained confident that the Coast Guard is “well-poised to award the detailed construction contract in fiscal year 2019” for the heavy polar ice breaker. https://www.defensenews.com/naval/2018/07/26/heavy-polar-icebreaker-questions-mount-for-coast-guard

Toutes les nouvelles