SlideShare a Scribd company logo
1 of 33
Software Technologies In Defence
By
N.V.N. Chaitanya
10135A1201
Information Technology
Contents
Introduction
Need of software in Defence
Microsoft Defence Solutions
The Platform for Defence
Commercial Software Vs. Open source Software
Network Centric Warfare(NCW)
Software Solutions in Army
Software Solutions in Navy
Software Solutions in Air Force
Conclusion
5/22/2013 GVPCE(A) 2
Introduction
• Technology is a strategic weapon across all industries
and organizations, now it is also true in the case of
military and the Department of Defence(DoD).
• The DoD is well known for its hardware-based
weaponry, unmistakable in aircraft, satellite, missiles
and other systems in its arsenal for defending the
country.
5/22/2013 GVPCE(A) 3
Contd..
There are Three
major groups under
the Department of
Defence(DoD)
•Army
•Air Force
•Navy
5/22/2013 GVPCE(A) 4
Need of Software in Defence
• As the defence shifts its focus from metal and
mechanics to unmanned vehicles, drones, and smart
bombs, software is becoming a crucial piece of
weaponry.
• As an Air Force general explains it, “The B-52 aircraft
was lived and died on the quality of its sheet metal.
Today our aircraft will live or die on the quality of our
software.”
5/22/2013 GVPCE(A) 5
Contd..
• As advanced software systems and embedded
software technologies become the brains behind
modern warfare.
• From remotely piloted aircraft and smart bombs to
autonomous vehicles and advanced fighter
jets, software is crucial to the success of today’s
weapons systems.
• Measure  Source Lines of Code(SLOC)
5/22/2013 GVPCE(A) 6
Contd..
0
1000
2000
3000
4000
5000
6000
7000
SLOC
SLOC
5/22/2013 GVPCE(A) 7
Microsoft Defence Solutions
Connecting
government to
citizens
connecting
information to
government workers
connecting
government agencies
together
Microsoft Connected Government Framework
(CGF)
5/22/2013 GVPCE(A) 8
Contd..
CGF provides four
key Capabilities
Improving Command
and Control
Improving Better
Situational Awareness
Enhancing Network
Centric Operations
Deploying Innovative
Technologies
5/22/2013 GVPCE(A) 9
The Platform for Defence
• The Platform Layer : Microsoft provides a
secure, scalable and easy to manage foundation on
which defence organisations can overlay the
applications they need.
• It provides a foundation of certain capabilities on
which the technologies and applications required to
manage defence.
5/22/2013 GVPCE(A) 10
Contd..
 Applications and Devices Capability
It enables defence personnel and commanders
anywhere to work effectively using PCs, PDAs, Tablet
PCs, phones and notebooks.
Technologies :
Windows Vista™, Windows Mobile, Microsoft
Office.
5/22/2013 GVPCE(A) 11
Contd..
 Network Capability
Provide a unifying layer of common services
across your entire environment with technologies that
connect people and systems securely and reliably.
Technologies :
Windows Server, Microsoft Virtual
Server, Windows Storage Server.
5/22/2013 GVPCE(A) 12
Contd..
 Security Capability
Ensure end-to-end protection to implement
networked solutions confidently across the entire
environment.
Technologies :
Microsoft Identity Integration Server, Microsoft
Internet Security and Acceleration Server, Microsoft
Forefront™ Security.
5/22/2013 GVPCE(A) 13
Contd..
 Collaboration Capability
It Connects defence personnel and commanders
with the information and resources they need to work
more efficiently.
Technologies :
Microsoft Exchange Server, Microsoft Office
SharePoint Server, Microsoft Office Communicator.
5/22/2013 GVPCE(A) 14
Contd..
 Communications Capability:
It enable defence personnel and commanders to
Communicate in the way that suits the situation by
switching seamlessly between video
conferencing, telephone, email and instant messaging.
Technologies:
Microsoft Communications Server, Microsoft Live
Meeting.
5/22/2013 GVPCE(A) 15
Commercial Software(CS) Vs. Open
source Software(OSS)
The most obvious contrast between the two
approaches is that OSS allows the original
source code of a program to be made freely
available to the public for modification and
redistribution.
Where as CS is created by certified commercial
developers. Over the past few years, a series of
critical considerations has motivated military
organisations to adopt Commercial Software
for their mission-critical deployments for the
Security purposes.
5/22/2013 GVPCE(A) 16
Network Centric Warfare(NCW)
• Network-Centric Warfare is a
command system that
translates the rapid and
secure sharing of information
among combat superiority.
• NCW enables military
organisations to share
intelligence and information
process it and then react to it
in a timely manner.
5/22/2013 GVPCE(A) 17
Software Solutions in Army
Microsoft Military Messaging
solutions :
• It enable defence
organisations to issue
formal communications
with speed and ease.
• Official reports, notices and
other information can be
sent with integrity and
confidentiality .
• All messages are fully
auditable and can be
archived for up to 30 years.
5/22/2013 GVPCE(A) 18
Contd..
It includes Precedence
levels :
 Routine
 Urgent
 Priority
 Immediate
 Flash
Security Classification
levels:
 Unclassified
 Confidential
 Secret
 Top Secret
5/22/2013 GVPCE(A) 19
Contd..
Fusion Net:
 Fusion Net is a distributed system deployed by the U.S. Army
to disseminate ‘ground truth’ intelligence and unit
management information throughout the Battle space.
 Before Fusion Net, battlefield event information was scattered
among numerous Army systems and databases, which
couldn’t communicate with one another.
5/22/2013 GVPCE(A) 20
Contd..
 Fusion Net provides the communication of information
among different systems and databases in real time.
 It is implemented throughout the current theatre of
operations so that the data capture rate and, the information
availability rate for battlefield events to increase from 75 to
1500 percent.
5/22/2013 GVPCE(A) 21
Contd..
Distributed Common Ground System-Army (DCGS-A)
 The DCGS-A family of systems ensures that the essential
intelligence and battle space awareness information from all
intelligence sources is provided to the Army War fighter when
and where they need it.
 The system’s capabilities are based on a service-oriented
architecture (SOA) that enables the delivery of multiple levels
of intelligence data (voice, video, and geospatial) to
combatant commanders.
5/22/2013 GVPCE(A) 22
Contd..
Distributed Common Ground System-Army (DCGS-A)
 DCGS-A uses the latest cloud technology to rapidly
gather, collaborate and share intelligence data from multiple
sources to the battlefield commanders.
 With this system we can Increase the situational awareness
and reduces risk to the Commander when executing missions.
5/22/2013 GVPCE(A) 23
Software Solutions in Navy
• Polar Navy :
 It is an efficient, user friendly, cross-platform marine
navigation software.
 It provides consistent user experience with native look and
feel on Apple Mac OS , Microsoft Windows and Linux
systems, Apple iPhone and iPad mobile devices.
5/22/2013 GVPCE(A) 24
Contd..
Polar Navy consists of Three
Versions :
 Polar view NS :
 It is a complete user
friendly on-board marine
navigation system. Which
deals about the
Weather, Tides and GPS
systems.
5/22/2013 GVPCE(A) 25
Contd..
• Polar Com :
It consists of
 Comprehensive set of
navigation instruments
including
position, speed, course, win
d, depth
 Highly visible digital and
analog instruments
5/22/2013 GVPCE(A) 26
Contd..
Polar view MX :
• It is a marine app for Apple iOS.
• It acts as a Vector and Raster chart viewer for iPhone and
iPad.
5/22/2013 GVPCE(A) 27
Software Solutions in Air Force
• Net-T(Network Tactical)
 A software upgrade called Net-T effectively turns U.S. War
planes into wireless routers in the sky, Allowing ground forces
to share information with each other.
5/22/2013 GVPCE(A) 28
Contd..
 Using Net-T, commanders on the ground can share video
data, map coordinates and other information types without
the use of traditional satellite or radio communication.
 Requirement:
 The groups on the ground need 'line of sight' to the aircraft in
the air, this opens up communication possibilities to support
ground operations across all services.
5/22/2013 GVPCE(A) 29
Contd..
How to operate:
• Elliott tested Net-T on the A-10 Thunderbolt II ground attack
aircraft and said that the system doesn't require a lot of input
from the pilot once it's properly configured.
• It's a single button push, After that, the pilot must maintain
within the range and stay up with the users.
• Net-T will be in operational use by 2014.
5/22/2013 GVPCE(A) 30
Conclusion
The transition of defence from Platform centric warfare
to the Network centric warfare the usage of emerging
technologies in software is ever increased so that the Software is
becoming a crucial piece of Weaponry in the modern defence
system.
5/22/2013 GVPCE(A) 31
References
• http://www.wikipedia.com
• http://www.howstuffworks.com
• http://download.microsoft.com/download/5/8/1/581FEBAF-116D-
41B3-8CDE-1829F93C5ABE/OSSvCS_Defence_WhitePaper_W.pdf
• www.microsoft.com/industry/government/guides/dod/default.asp
x
• http://www.networkworld.com/news/2013/-airforce-wireless-
routers
• http://indianarmy.nic.in/
• www.army.mil/
• www.nausena-bharti.nic.in/
• www.ndianairforce.nic.in/
5/22/2013 GVPCE(A) 32
THANK YOU..!
5/22/2013 GVPCE(A) 33

More Related Content

What's hot

Unmanned Aerial Vehicle-UAVs
Unmanned Aerial Vehicle-UAVsUnmanned Aerial Vehicle-UAVs
Unmanned Aerial Vehicle-UAVsHimanshu Rathore
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national securityMUTHU LAKSHMI
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operationsClifford Stone
 
Uav presentation
Uav presentationUav presentation
Uav presentationMeshut
 
UNMANNED AERIAL VEHICLE
UNMANNED AERIAL VEHICLEUNMANNED AERIAL VEHICLE
UNMANNED AERIAL VEHICLEThirumal Aero
 
Falcon Shield: Countering the drone threat
Falcon Shield: Countering the drone threatFalcon Shield: Countering the drone threat
Falcon Shield: Countering the drone threatLeonardo
 
Unmanned Aerial Systems and its history
Unmanned Aerial Systems and its historyUnmanned Aerial Systems and its history
Unmanned Aerial Systems and its historyAmr Emad
 
The Concept of Network Centric Warfare feat. India
The Concept of Network Centric Warfare feat. IndiaThe Concept of Network Centric Warfare feat. India
The Concept of Network Centric Warfare feat. IndiaSubhasis Hazra
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionD.A. Mohan
 
Abstract Black box flight recorders
Abstract    Black box flight recorders Abstract    Black box flight recorders
Abstract Black box flight recorders vishnu murthy
 
Information warfare.11
Information warfare.11Information warfare.11
Information warfare.11Dr. Alok Yadav
 
Artificial Intelligence Drone
Artificial Intelligence DroneArtificial Intelligence Drone
Artificial Intelligence DroneBasilA2
 
Police and Law Enforcement Drones: Drones In The Field
Police and Law Enforcement Drones: Drones In The FieldPolice and Law Enforcement Drones: Drones In The Field
Police and Law Enforcement Drones: Drones In The FieldDronefly
 
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2DroneSec
 

What's hot (20)

Unmanned Aerial Vehicle-UAVs
Unmanned Aerial Vehicle-UAVsUnmanned Aerial Vehicle-UAVs
Unmanned Aerial Vehicle-UAVs
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national security
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
Uav presentation
Uav presentationUav presentation
Uav presentation
 
Drone Technology
Drone TechnologyDrone Technology
Drone Technology
 
UNMANNED AERIAL VEHICLE
UNMANNED AERIAL VEHICLEUNMANNED AERIAL VEHICLE
UNMANNED AERIAL VEHICLE
 
Falcon Shield: Countering the drone threat
Falcon Shield: Countering the drone threatFalcon Shield: Countering the drone threat
Falcon Shield: Countering the drone threat
 
Unmanned aerial vehicle
Unmanned aerial vehicleUnmanned aerial vehicle
Unmanned aerial vehicle
 
Unmanned Aerial Systems and its history
Unmanned Aerial Systems and its historyUnmanned Aerial Systems and its history
Unmanned Aerial Systems and its history
 
The Concept of Network Centric Warfare feat. India
The Concept of Network Centric Warfare feat. IndiaThe Concept of Network Centric Warfare feat. India
The Concept of Network Centric Warfare feat. India
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An Introduction
 
Abstract Black box flight recorders
Abstract    Black box flight recorders Abstract    Black box flight recorders
Abstract Black box flight recorders
 
2. History of drones
2. History of drones2. History of drones
2. History of drones
 
Information warfare.11
Information warfare.11Information warfare.11
Information warfare.11
 
Drones
DronesDrones
Drones
 
Artificial Intelligence Drone
Artificial Intelligence DroneArtificial Intelligence Drone
Artificial Intelligence Drone
 
Police and Law Enforcement Drones: Drones In The Field
Police and Law Enforcement Drones: Drones In The FieldPolice and Law Enforcement Drones: Drones In The Field
Police and Law Enforcement Drones: Drones In The Field
 
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
Drone
DroneDrone
Drone
 

Similar to Software technologies in defence ppt

@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
 
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...ICSA, LLC
 
24091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r0224091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r02Manoj Punamia
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresMohammed Saqib
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
Ctek Cellular Automation & Control Catalag 2014
Ctek Cellular Automation & Control Catalag 2014Ctek Cellular Automation & Control Catalag 2014
Ctek Cellular Automation & Control Catalag 2014Lynn Woodruff
 
A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing IJECEIAES
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Digital Security by Design Vision
Digital Security by Design VisionDigital Security by Design Vision
Digital Security by Design VisionKTN
 
Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...DESMOND YUEN
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutionsIJCNCJournal
 
View Slides
View SlidesView Slides
View SlidesVideoguy
 
Cloud Computing for National Security Applications
Cloud Computing for National Security ApplicationsCloud Computing for National Security Applications
Cloud Computing for National Security Applicationswhite paper
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13Cohesive Networks
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Adil Khan
 

Similar to Software technologies in defence ppt (20)

@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
 
24091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r0224091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r02
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Ctek Cellular Automation & Control Catalag 2014
Ctek Cellular Automation & Control Catalag 2014Ctek Cellular Automation & Control Catalag 2014
Ctek Cellular Automation & Control Catalag 2014
 
Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Digital Security by Design Vision
Digital Security by Design VisionDigital Security by Design Vision
Digital Security by Design Vision
 
Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...
 
AE8751 - Unit II.pdf
AE8751 - Unit II.pdfAE8751 - Unit II.pdf
AE8751 - Unit II.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
View Slides
View SlidesView Slides
View Slides
 
Cloud Computing for National Security Applications
Cloud Computing for National Security ApplicationsCloud Computing for National Security Applications
Cloud Computing for National Security Applications
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
 
Military Defense Solutions Overview
Military Defense Solutions OverviewMilitary Defense Solutions Overview
Military Defense Solutions Overview
 
Resume_Pratik
Resume_PratikResume_Pratik
Resume_Pratik
 

More from Santosh Kumar

human computer interface
human computer interfacehuman computer interface
human computer interfaceSantosh Kumar
 
Holographic memory systems
Holographic memory systemsHolographic memory systems
Holographic memory systemsSantosh Kumar
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technologySantosh Kumar
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system pptSantosh Kumar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 

More from Santosh Kumar (8)

Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Holographic memory systems
Holographic memory systemsHolographic memory systems
Holographic memory systems
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technology
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
M commerce ppt
M commerce pptM commerce ppt
M commerce ppt
 

Recently uploaded

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Software technologies in defence ppt

  • 1. Software Technologies In Defence By N.V.N. Chaitanya 10135A1201 Information Technology
  • 2. Contents Introduction Need of software in Defence Microsoft Defence Solutions The Platform for Defence Commercial Software Vs. Open source Software Network Centric Warfare(NCW) Software Solutions in Army Software Solutions in Navy Software Solutions in Air Force Conclusion 5/22/2013 GVPCE(A) 2
  • 3. Introduction • Technology is a strategic weapon across all industries and organizations, now it is also true in the case of military and the Department of Defence(DoD). • The DoD is well known for its hardware-based weaponry, unmistakable in aircraft, satellite, missiles and other systems in its arsenal for defending the country. 5/22/2013 GVPCE(A) 3
  • 4. Contd.. There are Three major groups under the Department of Defence(DoD) •Army •Air Force •Navy 5/22/2013 GVPCE(A) 4
  • 5. Need of Software in Defence • As the defence shifts its focus from metal and mechanics to unmanned vehicles, drones, and smart bombs, software is becoming a crucial piece of weaponry. • As an Air Force general explains it, “The B-52 aircraft was lived and died on the quality of its sheet metal. Today our aircraft will live or die on the quality of our software.” 5/22/2013 GVPCE(A) 5
  • 6. Contd.. • As advanced software systems and embedded software technologies become the brains behind modern warfare. • From remotely piloted aircraft and smart bombs to autonomous vehicles and advanced fighter jets, software is crucial to the success of today’s weapons systems. • Measure  Source Lines of Code(SLOC) 5/22/2013 GVPCE(A) 6
  • 8. Microsoft Defence Solutions Connecting government to citizens connecting information to government workers connecting government agencies together Microsoft Connected Government Framework (CGF) 5/22/2013 GVPCE(A) 8
  • 9. Contd.. CGF provides four key Capabilities Improving Command and Control Improving Better Situational Awareness Enhancing Network Centric Operations Deploying Innovative Technologies 5/22/2013 GVPCE(A) 9
  • 10. The Platform for Defence • The Platform Layer : Microsoft provides a secure, scalable and easy to manage foundation on which defence organisations can overlay the applications they need. • It provides a foundation of certain capabilities on which the technologies and applications required to manage defence. 5/22/2013 GVPCE(A) 10
  • 11. Contd..  Applications and Devices Capability It enables defence personnel and commanders anywhere to work effectively using PCs, PDAs, Tablet PCs, phones and notebooks. Technologies : Windows Vista™, Windows Mobile, Microsoft Office. 5/22/2013 GVPCE(A) 11
  • 12. Contd..  Network Capability Provide a unifying layer of common services across your entire environment with technologies that connect people and systems securely and reliably. Technologies : Windows Server, Microsoft Virtual Server, Windows Storage Server. 5/22/2013 GVPCE(A) 12
  • 13. Contd..  Security Capability Ensure end-to-end protection to implement networked solutions confidently across the entire environment. Technologies : Microsoft Identity Integration Server, Microsoft Internet Security and Acceleration Server, Microsoft Forefront™ Security. 5/22/2013 GVPCE(A) 13
  • 14. Contd..  Collaboration Capability It Connects defence personnel and commanders with the information and resources they need to work more efficiently. Technologies : Microsoft Exchange Server, Microsoft Office SharePoint Server, Microsoft Office Communicator. 5/22/2013 GVPCE(A) 14
  • 15. Contd..  Communications Capability: It enable defence personnel and commanders to Communicate in the way that suits the situation by switching seamlessly between video conferencing, telephone, email and instant messaging. Technologies: Microsoft Communications Server, Microsoft Live Meeting. 5/22/2013 GVPCE(A) 15
  • 16. Commercial Software(CS) Vs. Open source Software(OSS) The most obvious contrast between the two approaches is that OSS allows the original source code of a program to be made freely available to the public for modification and redistribution. Where as CS is created by certified commercial developers. Over the past few years, a series of critical considerations has motivated military organisations to adopt Commercial Software for their mission-critical deployments for the Security purposes. 5/22/2013 GVPCE(A) 16
  • 17. Network Centric Warfare(NCW) • Network-Centric Warfare is a command system that translates the rapid and secure sharing of information among combat superiority. • NCW enables military organisations to share intelligence and information process it and then react to it in a timely manner. 5/22/2013 GVPCE(A) 17
  • 18. Software Solutions in Army Microsoft Military Messaging solutions : • It enable defence organisations to issue formal communications with speed and ease. • Official reports, notices and other information can be sent with integrity and confidentiality . • All messages are fully auditable and can be archived for up to 30 years. 5/22/2013 GVPCE(A) 18
  • 19. Contd.. It includes Precedence levels :  Routine  Urgent  Priority  Immediate  Flash Security Classification levels:  Unclassified  Confidential  Secret  Top Secret 5/22/2013 GVPCE(A) 19
  • 20. Contd.. Fusion Net:  Fusion Net is a distributed system deployed by the U.S. Army to disseminate ‘ground truth’ intelligence and unit management information throughout the Battle space.  Before Fusion Net, battlefield event information was scattered among numerous Army systems and databases, which couldn’t communicate with one another. 5/22/2013 GVPCE(A) 20
  • 21. Contd..  Fusion Net provides the communication of information among different systems and databases in real time.  It is implemented throughout the current theatre of operations so that the data capture rate and, the information availability rate for battlefield events to increase from 75 to 1500 percent. 5/22/2013 GVPCE(A) 21
  • 22. Contd.. Distributed Common Ground System-Army (DCGS-A)  The DCGS-A family of systems ensures that the essential intelligence and battle space awareness information from all intelligence sources is provided to the Army War fighter when and where they need it.  The system’s capabilities are based on a service-oriented architecture (SOA) that enables the delivery of multiple levels of intelligence data (voice, video, and geospatial) to combatant commanders. 5/22/2013 GVPCE(A) 22
  • 23. Contd.. Distributed Common Ground System-Army (DCGS-A)  DCGS-A uses the latest cloud technology to rapidly gather, collaborate and share intelligence data from multiple sources to the battlefield commanders.  With this system we can Increase the situational awareness and reduces risk to the Commander when executing missions. 5/22/2013 GVPCE(A) 23
  • 24. Software Solutions in Navy • Polar Navy :  It is an efficient, user friendly, cross-platform marine navigation software.  It provides consistent user experience with native look and feel on Apple Mac OS , Microsoft Windows and Linux systems, Apple iPhone and iPad mobile devices. 5/22/2013 GVPCE(A) 24
  • 25. Contd.. Polar Navy consists of Three Versions :  Polar view NS :  It is a complete user friendly on-board marine navigation system. Which deals about the Weather, Tides and GPS systems. 5/22/2013 GVPCE(A) 25
  • 26. Contd.. • Polar Com : It consists of  Comprehensive set of navigation instruments including position, speed, course, win d, depth  Highly visible digital and analog instruments 5/22/2013 GVPCE(A) 26
  • 27. Contd.. Polar view MX : • It is a marine app for Apple iOS. • It acts as a Vector and Raster chart viewer for iPhone and iPad. 5/22/2013 GVPCE(A) 27
  • 28. Software Solutions in Air Force • Net-T(Network Tactical)  A software upgrade called Net-T effectively turns U.S. War planes into wireless routers in the sky, Allowing ground forces to share information with each other. 5/22/2013 GVPCE(A) 28
  • 29. Contd..  Using Net-T, commanders on the ground can share video data, map coordinates and other information types without the use of traditional satellite or radio communication.  Requirement:  The groups on the ground need 'line of sight' to the aircraft in the air, this opens up communication possibilities to support ground operations across all services. 5/22/2013 GVPCE(A) 29
  • 30. Contd.. How to operate: • Elliott tested Net-T on the A-10 Thunderbolt II ground attack aircraft and said that the system doesn't require a lot of input from the pilot once it's properly configured. • It's a single button push, After that, the pilot must maintain within the range and stay up with the users. • Net-T will be in operational use by 2014. 5/22/2013 GVPCE(A) 30
  • 31. Conclusion The transition of defence from Platform centric warfare to the Network centric warfare the usage of emerging technologies in software is ever increased so that the Software is becoming a crucial piece of Weaponry in the modern defence system. 5/22/2013 GVPCE(A) 31
  • 32. References • http://www.wikipedia.com • http://www.howstuffworks.com • http://download.microsoft.com/download/5/8/1/581FEBAF-116D- 41B3-8CDE-1829F93C5ABE/OSSvCS_Defence_WhitePaper_W.pdf • www.microsoft.com/industry/government/guides/dod/default.asp x • http://www.networkworld.com/news/2013/-airforce-wireless- routers • http://indianarmy.nic.in/ • www.army.mil/ • www.nausena-bharti.nic.in/ • www.ndianairforce.nic.in/ 5/22/2013 GVPCE(A) 32