1 / 21

14 June 2013

Presented to: HAMA. AMRDEC SED Overview. Approved for public release; Distribution unlimited. Presented by : William Craig Director Software Engineering Directorate U.S. Army Aviation and Missile Research, Development, and Engineering Center. 14 June 2013. Outline.

toby
Download Presentation

14 June 2013

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Presented to: HAMA AMRDEC SED Overview Approved for public release; Distribution unlimited Presented by: William Craig Director Software Engineering Directorate U.S. Army Aviation and Missile Research, Development, and Engineering Center 14 June 2013

  2. Outline AMRDEC SED Overview Contract Data Areas of Business Opportunity Cyber Security • Obsolescence • Mobile Application Development • 3D Printing • Foreign Military Sales • Conclusion

  3. SED Quad Chart

  4. Current AMCOM EXPRESS Contracts

  5. Planned AMCOM EXPRESSContracts

  6. Cyber Security How much information? Study conducted by the global information industry center at the University of California, San Diego. Study looked at only the amount of information U.S. residents consumed in the their homes and outside the home for non-work-related reasons. Study found that the average American spent about 12 hours digesting 34 Gigabytes (one byte of information is equivalent to one letter of text) of information daily in 2008. "Considering that on average we work for almost three hours a day [at home] and sleep for seven, this means that three quarters of our waking time in the home is receiving information, much of it electronic," the authors write.  Yearly, the American info habit consumes 3.6 zettabytes, or 3.6 billion trillion bytes.  To put that in perspective, if 3.6 zettabytes of text were printed in books and stacked tightly across the continental United States and Alaska, it would create a pile 7-feet high (2 meters). 

  7. ObsolescenceSignificant Issue for Aging Army Systems • Many fielded Army systems are struggling with obsolescence issues. In some cases the cost and lead-time for the parts are extreme. There are many opportunities to re-design these obsolete parts with more modern, available, and less expensive components. In many cases the cost and lead-times can be reduced by >50% using modern technologies and in some cases COTS. • In many cases there is a lack of use rights that excludes competition • The obsolescence-related business opportunities are not limited to US Army systems. Many foreign militaries rely on US Army systems; some still in US Army inventory and others that are no longer in the US Army inventory. These countries are interested in solutions for obsolete parts as well. In most cases these customers are interested in small quantities (less than 100). • Older weapon systems use out dated technologies, system requirements, and system designs

  8. Mobile Application Development SED Mobile Applications • 9 mobile programs • Over 30 mobile apps in development • Mobile Apps Categories • Aviation Control Simulation Apps • Outreach Apps • Aircraft Trainer Apps • Geographical Surveillance Apps • Augmented Reality Apps • Weapon Simulator Apps • Tactical Camera Apps • Missile Simulation Apps • Soldier Instrument Training Apps • Business Apps

  9. 3D Printing Entered the mainstream marketplace in 2007 Sales have grown by 7.2 Percent each year Sales are projected to jump from about $1.7 Billion in 2011 to $3.7 Billion 2015

  10. FY2003 – FY2006 $18+B FY2007 – FY2010 $63.5B FY2009 $24.2B FY2011 $12B FY2012 $19.6B (144 Different Nations) Army Foreign Military Sales

  11. Conclusion There is business for those who are innovative and provide customer value.

  12. Back up Charts

  13. Cyber Security • In developed countries information technology is vital and pervasive • Such dependence has a corresponding vulnerability • Cyber Security activities are absolutely essential (Military, Industry, Personal Lives)

  14. Cyber SecurityStrategic Pillars

  15. Cyber SecurityStrategic Partnerships

  16. Cyber SecurityNation States Cyber Strength Assessment • Nation State Assessment By Richard Clarke (Former National Coordinator For Security, Infrastructure Protection, And Counterterrorism For President Clinton): • A Realistic Measurement Of Cyber War Strength Must Include All Three Factors • The Less Wired A Nation Is, The Higher Its Score On Dependence • Cyber Dependence Is A Disadvantage In A Cyber War “The U.S. economy and government are the most dependent in the world on the Internet and therefore the most vulnerable to cyber attacks.” - GAO-11-75 DoD Cyber Efforts, p. 1 Open Source: Cyber War by Richard A. Clarke, pp. 147-149

  17. Cyber SecurityCyber Huntsville • Chair Of Federal/State/Local Gov’t Cyber Working Group • First Gov’t Cyber WG Meeting 24 May 2012 • Gov’t Liaison For Cyber Huntsville BoD • Invitees Include: • ALARNG • AMC G6/G2 • AMCOM • AMRDEC CIO • Army G2X • City of Huntsville • DHS • FBI • Huntsville Utilities • Inspector General • LOGSA • MDA • MSIC • NASA • NEC-R • PEO Aviation • PEO MS • RTC • SMDC • TSMO • TVA

  18. ObsolescenceObsolescence Challenges • Affects the system • Requirements, Software, Hardware, … • In many cases the Government does not own the drawing package from the OEM or does not have the complete TDP • Restricted technical data packages prevent fair and open competition • Data rights for the OEM part when software is involved • Ability to pass functional tests using legacy test equipment that tests tight tolerances • Test equipment can have proprietary claims too • Government specification changes (relax requirements?) • Keeping production/manufacturing costs low for small quantities • Outsourcing of the semiconductor industry • Source code was developed without regard to the past 20 years modern software engineering processes • Outdated design and system architectures • Semiconductor industry moves in 3 to 4 year cycles when evolving technologies

  19. ObsolescenceObsolescence Mitigation Best Practices/Considerations • Ensure full and open rights of technical data packages • Use best of industry system engineering guidelines • Reconsider the original system/component requirements to allow “wiggle room” for modern solutions • Architectures that encapsulate and modularize • Common design components • Use modern technologies to reduce material component count • FPGAs to replace complete obsolete designs • Teaming opportunities between industry and government • Development • Small quantity production

  20. Mobile Application Development Why Mobile Applications? • Average age across all 5 branches of the military is at or below 30. • June 2012 – DOD Mobile Strategy • Develop Mobile and Web Apps • Improve Infrastructure • Implement mobile device management system • Rapid Application Prototyping • Apps are smaller pieces of larger applications • Quick to prototype.

  21. Mobile Apps DevelopmentChallenges • Mobile Device (e.g. iPad) Operating System changes annually • Information Assurance (IA) issue • Air Worthiness Release (AWR) issue • Pilots will want to run their military applications on their personal (i.e. non-secure) devices; must protect sensitive aircraft performance related data • IA issue

More Related