+ All Categories
Home > Documents > 14 June 2013

14 June 2013

Date post: 25-Feb-2016
Category:
Upload: toby
View: 28 times
Download: 0 times
Share this document with a friend
Description:
Presented to: HAMA. AMRDEC SED Overview. Approved for public release; Distribution unlimited. Presented by : William Craig Director Software Engineering Directorate U.S. Army Aviation and Missile Research, Development, and Engineering Center. 14 June 2013. Outline. - PowerPoint PPT Presentation
21
FileName.pptx 14 June 2013 AMRDEC SED Overview Presented to: HAMA Approved for public release; Distribution unlimited Presented by: William Craig Director Software Engineering Directorate U.S. Army Aviation and Missile Research, Development, and Engineering Center
Transcript
Page 1: 14 June 2013

14 June 2013

AMRDECSED Overview

Presented to:

HAMA

Approved for public release;Distribution unlimited

Presented by:

William CraigDirector

Software Engineering DirectorateU.S. Army Aviation and Missile Research,

Development, and Engineering Center

Page 2: 14 June 2013

2 FileName.pptx

Outline

AMRDEC SED OverviewContract DataAreas of Business Opportunity

Cyber SecurityObsolescenceMobile Application Development3D PrintingForeign Military Sales

Conclusion

Page 3: 14 June 2013

3 FileName.pptx

SED Quad Chart

Page 4: 14 June 2013

4 FileName.pptx

Current AMCOM EXPRESS Contracts

Contract Award Type Ceiling Period of Performance

Prime

SCRS Full & Open $820M Feb 12 – Feb 15 SAIC

BASES Small Business $172M Aug 10 – Aug 15 IRTC

Lower Tier IV&V Small Business $78.8M Aug 10 – Aug 15 Radiance

Systems & Software Security

Engineering

Small Business $62.7M Nov 11 – Oct 15 COLSA

JSIL Tech Services Full & Open $194M Sep 12 – Sep 17 AMS

IUID Support Small Business $57M Oct 12 – Dec 17 Avion

Page 5: 14 June 2013

5 FileName.pptx

Planned AMCOM EXPRESSContracts

Contract Award Type EstimatedCeiling

Estimated Award Date

Systems/Software Technology

Analysis

Small Business $60M FY14

Fielded Systems Support

Small Business $100M FY 14

Non Tactical Software

Applications

Small Business $125M FY 14

SED Programmatic Support

Small Business $45M FY 14

Page 6: 14 June 2013

6 FileName.pptx

Cyber Security

How much information?

Study conducted by the global information industry center at the University of California, San Diego.

Study looked at only the amount of information U.S. residents consumed in the their homes and outside the home for non-work-related reasons.

Study found that the average American spent about 12 hours digesting 34 Gigabytes (one byte of information is equivalent to one letter of text) of information daily in 2008.

"Considering that on average we work for almost three hours a day [at home] and sleep for seven, this means that three quarters of our waking time in the home is receiving information, much of it electronic," the authors write. 

Yearly, the American info habit consumes 3.6 zettabytes,or 3.6 billion trillion bytes. 

To put that in perspective, if 3.6 zettabytes of text were printed in books and stacked tightly across the continental United States and Alaska, it would create a pile 7-feet high (2 meters). 

Page 7: 14 June 2013

7 FileName.pptx

Obsolescence Significant Issue for Aging Army Systems

• Many fielded Army systems are struggling with obsolescence issues. In some cases the cost and lead-time for the parts are extreme. There are many opportunities to re-design these obsolete parts with more modern, available, and less expensive components. In many cases the cost and lead-times can be reduced by >50% using modern technologies and in some cases COTS.

• In many cases there is a lack of use rights that excludes competition• The obsolescence-related business opportunities are not limited to US

Army systems. Many foreign militaries rely on US Army systems; some still in US Army inventory and others that are no longer in the US Army inventory. These countries are interested in solutions for obsolete parts as well. In most cases these customers are interested in small quantities (less than 100).

• Older weapon systems use out dated technologies, system requirements, and system designs

Page 8: 14 June 2013

8 FileName.pptx

Mobile Application Development

• 9 mobile programs• Over 30 mobile apps in

development• Mobile Apps Categories

– Aviation Control Simulation Apps– Outreach Apps– Aircraft Trainer Apps– Geographical Surveillance Apps– Augmented Reality Apps– Weapon Simulator Apps– Tactical Camera Apps– Missile Simulation Apps – Soldier Instrument Training Apps– Business Apps

SED Mobile Applications

Page 9: 14 June 2013

9 FileName.pptx

3D Printing

Entered the mainstream marketplace in 2007

Sales have grown by 7.2 Percent each year

Sales are projected to jump from about $1.7 Billion in 2011 to $3.7 Billion 2015

Page 10: 14 June 2013

10 FileName.pptx

Army Foreign Military Sales

FY2003 – FY2006 $18+B

FY2007 – FY2010 $63.5B

FY2009 $24.2B

FY2011 $12B

FY2012 $19.6B (144 Different Nations)

Page 11: 14 June 2013

11 FileName.pptx

Conclusion

There is business for those who are innovative and provide

customer value.

Page 12: 14 June 2013

12 FileName.pptx

Back upCharts

Page 13: 14 June 2013

13 FileName.pptx

Cyber Security

• In developed countries information technology is vital and pervasive

• Such dependence has a corresponding vulnerability

• Cyber Security activities are absolutely essential (Military, Industry, Personal Lives)

Page 14: 14 June 2013

14 FileName.pptx

Cyber SecurityStrategic Pillars

Page 15: 14 June 2013

15 FileName.pptx

Cyber SecurityStrategic Partnerships

Page 16: 14 June 2013

16 FileName.pptx

Cyber SecurityNation States

Open Source:Cyber War by Richard A. Clarke, pp. 147-149

NationCyber

OffenseCyber

DependenceCyber

Defense TotalU.S. 8 2 1 11Russia 7 5 4 16China 5 4 6 15Iran 4 5 3 12North Korea 2 9 7 18

Overall Cyber War Strength

• A Realistic Measurement Of Cyber War Strength Must Include All Three Factors• The Less Wired A Nation Is, The Higher Its Score On Dependence• Cyber Dependence Is A Disadvantage In A Cyber War

• Nation State Assessment By Richard Clarke (Former National Coordinator For Security, Infrastructure Protection, And Counterterrorism For President Clinton):

“The U.S. economy and government are the most dependent in the world on the Internet and therefore the most vulnerable to cyber attacks.”

- GAO-11-75 DoD Cyber Efforts, p. 1

Cyber Strength Assessment

Page 17: 14 June 2013

17 FileName.pptx

Cyber SecurityCyber Huntsville

• Chair Of Federal/State/Local Gov’t Cyber Working Group

• First Gov’t Cyber WG Meeting 24 May 2012• Gov’t Liaison For Cyber Huntsville BoD

• Invitees Include:• PEO MS• RTC• SMDC• TSMO• TVA

• ALARNG• AMC G6/G2• AMCOM• AMRDEC CIO• Army G2X• City of Huntsville• DHS• FBI

• Huntsville Utilities• Inspector General• LOGSA• MDA• MSIC• NASA• NEC-R• PEO Aviation

Page 18: 14 June 2013

18 FileName.pptx

ObsolescenceObsolescence Challenges

• Affects the system– Requirements, Software, Hardware, …

• In many cases the Government does not own the drawing package from the OEM or does not have the complete TDP– Restricted technical data packages prevent fair and open competition– Data rights for the OEM part when software is involved

• Ability to pass functional tests using legacy test equipment that tests tight tolerances– Test equipment can have proprietary claims too

• Government specification changes (relax requirements?)• Keeping production/manufacturing costs low for small quantities• Outsourcing of the semiconductor industry• Source code was developed without regard to the past 20 years modern

software engineering processes• Outdated design and system architectures

– Semiconductor industry moves in 3 to 4 year cycles when evolving technologies

Page 19: 14 June 2013

19 FileName.pptx

ObsolescenceObsolescence Mitigation

Best Practices/Considerations

• Ensure full and open rights of technical data packages• Use best of industry system engineering guidelines

– Reconsider the original system/component requirements to allow “wiggle room” for modern solutions

– Architectures that encapsulate and modularize– Common design components

• Use modern technologies to reduce material component count – FPGAs to replace complete obsolete designs

• Teaming opportunities between industry and government– Development– Small quantity production

Page 20: 14 June 2013

20 FileName.pptx

Mobile Application Development

Why Mobile Applications?

• Average age across all 5 branches of the military is at or below 30.

• June 2012 – DOD Mobile Strategy– Develop Mobile and Web Apps– Improve Infrastructure– Implement mobile device

management system• Rapid Application

Prototyping– Apps are smaller pieces of

larger applications– Quick to prototype.

Page 21: 14 June 2013

21 FileName.pptx

Mobile Apps DevelopmentChallenges

• Mobile Device (e.g. iPad) Operating System changes annually– Information Assurance (IA) issue– Air Worthiness Release (AWR) issue

• Pilots will want to run their military applications on their personal (i.e. non-secure) devices; must protect sensitive aircraft performance related data– IA issue


Recommended