14 June 2013 AMRDEC SED Overview Presented to: HAMA Approved for public release; Distribution unlimited Presented by: William Craig Director Software Engineering.

Slides:



Advertisements
Similar presentations
Zara.
Advertisements

L3 Communications Holdings Inc. (LLL) Jim Clark Doug Coursen Addison Doyle Andrew Felten Kevin Freeman SIA Analyst Program Wednesday March 28, 2007.
Panel 5: The Latest in OA Innovation and C4ISR 4 November, 2014 Mike Rice President / Senior Systems Engineer R2E Inc.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 2 Crane of the Future: A VITAL ENTERPRISE 29 MAR 2011 Patricia Herndon.
U.S. Army Research, Development and Engineering Command *Unclassified – For Public Release - Unlimited* Simulation and Training Technology Center 25 July.
ARINC Overview Alliance Baltimore November 16, 2007.
Advanced Manufacturing Technologies for Extending Microprocessor Availability Proactive Solution to Military Microprocessor Availability and Affordability.
International CyberSecurity Collaboration: The Technical Cooperation Program Approved for public release; distribution is unlimited. 09 March 2010 Joshua.
About Accenture Panel 3.
Page 1 Business Architecture – From Business Strategy to the Alignment of IT Rich Waller An Insurance Industry Case Study April 15, 2009.
Office of the Secretary of Defense Defense Microelectronics Activity (DMEA) Defense Microelectronics Activity (DMEA) Doug Casanova Defense Microelectronics.
Distribution A: Approved for public release; distribution is unlimited Get the right M&S technology to the right place, at the right time, for the Decision.
Significant Work. Extraordinary People. SRA. Property Management Solutions for Unique Identification, AIT, and the Supply Chain March 30, 2011 Susan Pearson,
Copyright © 2011 Raytheon Company. All rights reserved Customer Success Is Our Mission is a registered trademark of Raytheon Company. Statement A: Approved.
Procure-to-Pay Process Enhancement Project March 15, 2006.
IEEE JOINT TASK FORCE ON QUADRENNIAL ENERGY REVIEW Skilled Work Force Issues Presentation to the U.S. Department of Energy by the IEEE Joint Task Force.
Copyright © 2009 Accenture All Rights Reserved. 1 Copyright © 2008 Accenture All Rights Reserved. Client background This client is one of the world's largest.
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
© 2003 proprietary material of VARTA Microbattery GmbH mobility for you M&S AL Oct/24/2003 Standard Li Ion Battery Packs VARTA Microbattery Standard Li-Ion.
0 WareOnEarth Proprietary0 WareOnEarth Communications, Inc., An SMS Company The information contained herein is proprietary to WareOnEarth Communications,
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Next Generation Trnsport Trnsport Users Group Conference Field Management TAG November 7, 2005.
HOW DO INFORMATION SYSTEM SUPPORT THE MAJOR BUSINESS FUNCTION?
Copyright  Purchasing Mega-Trends  Federal Strategic Sourcing Initiative (FSSI)  FSSI Impact on 8(a) Program  Supplier Assessment Process 
Finance & Investment Club Fall 2012 Supply Chain Management Software and Services.
Northington Technical Services & Northington Consulting one company—two capabilities Small business: verified SDVOSB, started 2002 Federal sector: Aerospace.
Unclassified U.S. ARMY TANK AUTOMOTIVE RESEARCH, DEVELOPMENT AND ENGINEERING CENTER Reverse Engineering Re-defined Requirements TARDEC 25 AUG Presented.
Preparing for the era of the mega-fund May 2012 D Glenn Sedgwick.
NARA INITIATIVES ON GEOSPATIAL DATA RECORDS FGDC Coordination Group Meeting, May 3, 2005 Ken Thibodeau, Director Electronic Records Archives Program Management.
16.1 © 2006 by Prentice Hall 16 Chapter Managing International Information Systems.
OEM’s and The Aftermarket… A New Direction… Renewed Partnership Charlie Gorman ETI April 18, 2012 ToolTech
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Vers national spatial data infrastructure training program NSDI Cooperative Agreements Program (CAP) Introduction to the Cooperative Agreements.
1 Case Study – Replacing our Claims Applications Jerry Dalla Corte Vice President, Head Office Operations March 27, 2008.
Federal Aviation Administration 0 Complex Integrated Avionics and System Safety June 9, Complex Integrated Avionic Systems and System Safety Presentation.
Flexible Use of Airspace and Collaborative Decision Making The aim of this presentation is to provide the aviation industry with the understanding of the.
91 st Annual Meeting & Exposition April 1 – 4, 2012 Anaheim, California 91 st Annual Meeting & Exposition April 1 – 4, 2012 Anaheim, California University.
C-17 Program Description Three Contracts (All Solicited prior to 1 Jan 04) – Development – Production – Sustainment 180 Aircraft by Aug 08/126 currently.
Update on IT Consolidation Initiative Presented by Rick Boggs to Commonwealth Technology Council March 27, 2008.
CMMI User 2003 (01OCT03)1 Army/Contractor Integrated Team: SED & SAIC Dick Stutzke SAIC Applied Technology Group 6725 Odyssey Drive Huntsville, Alabama.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Frost & Sullivan Global Growth Partnership Services Aerospace & Defence Research Programme 2013.
1 CMBG 2009 Planning for Obsolescence June 27, 2009 John Parler South Carolina Electric & Gas.
OFFICE OF INNOVATION & TECHNOLOGY CITY OF PHILADELPHIA Innovation & Technology Status Update Adel W. EbeidCity of Philadelphia, Office of Innovation &
Ethernet Switch Replacement
Chapter 1- Introduction
ISO 9001:2008/ AS9100 Registered Management Systems Registration
The Future of the Print Industry – Our Focus
CloudSuite Assessment (CSA): Overview Deck
Multi-Purpose Reconfigurable Training System (MRTS) Overview
캐나다.
Control system network security issues and recommendations
CTMA Investment - $200K; Industry Cost Share - $464K
MIGRATING TO NEW TECHNOLOGY
AT&T Global Supplier Diversity
J. A. “Drew” Hamilton, Jr., Ph.D.
41st Annual Targets, UAVs & Range Operations Symposium & Exhibition
TORFQ ACTIONS TO BE RELEASED
Software, & Integration Realignment
National Defense Industrial Association
Across the entire value chain
AFSAC Online Tech Order Index Feb 1, 2012
Managing International Information Systems
Technology Convergence
Primary Customers by Domain
TECHNOLOGY INFORMATION TECHNOLOGY. IT DEFINITION Stands for "Information Technology," and is pronounced "I.T." It refers to anything related to computing.
ESS Projected Awards: 6-12 months out
Presentation transcript:

14 June 2013 AMRDEC SED Overview Presented to: HAMA Approved for public release; Distribution unlimited Presented by: William Craig Director Software Engineering Directorate U.S. Army Aviation and Missile Research, Development, and Engineering Center

2 FileName.pptx Outline AMRDEC SED Overview Contract Data Areas of Business Opportunity Cyber Security Obsolescence Mobile Application Development 3D Printing Foreign Military Sales Conclusion

3 FileName.pptx SED Quad Chart

4 FileName.pptx Current AMCOM EXPRESS Contracts ContractAward TypeCeilingPeriod of Performance Prime SCRSFull & Open$820MFeb 12 – Feb 15SAIC BASESSmall Business$172MAug 10 – Aug 15IRTC Lower Tier IV&VSmall Business$78.8MAug 10 – Aug 15Radiance Systems & Software Security Engineering Small Business$62.7MNov 11 – Oct 15COLSA JSIL Tech ServicesFull & Open$194MSep 12 – Sep 17AMS IUID SupportSmall Business$57MOct 12 – Dec 17Avion

5 FileName.pptx Planned AMCOM EXPRESS Contracts ContractAward TypeEstimated Ceiling Estimated Award Date Systems/Software Technology Analysis Small Business$60MFY14 Fielded Systems Support Small Business$100MFY 14 Non Tactical Software Applications Small Business$125MFY 14 SED Programmatic Support Small Business$45MFY 14

6 FileName.pptx Cyber Security How much information? Study conducted by the global information industry center at the University of California, San Diego. Study looked at only the amount of information U.S. residents consumed in the their homes and outside the home for non-work-related reasons. Study found that the average American spent about 12 hours digesting 34 Gigabytes (one byte of information is equivalent to one letter of text) of information daily in "Considering that on average we work for almost three hours a day [at home] and sleep for seven, this means that three quarters of our waking time in the home is receiving information, much of it electronic," the authors write. Yearly, the American info habit consumes 3.6 zettabytes, or 3.6 billion trillion bytes. To put that in perspective, if 3.6 zettabytes of text were printed in books and stacked tightly across the continental United States and Alaska, it would create a pile 7-feet high (2 meters).

7 FileName.pptx Obsolescence Significant Issue for Aging Army Systems Many fielded Army systems are struggling with obsolescence issues. In some cases the cost and lead-time for the parts are extreme. There are many opportunities to re-design these obsolete parts with more modern, available, and less expensive components. In many cases the cost and lead-times can be reduced by >50% using modern technologies and in some cases COTS. In many cases there is a lack of use rights that excludes competition The obsolescence-related business opportunities are not limited to US Army systems. Many foreign militaries rely on US Army systems; some still in US Army inventory and others that are no longer in the US Army inventory. These countries are interested in solutions for obsolete parts as well. In most cases these customers are interested in small quantities (less than 100). Older weapon systems use out dated technologies, system requirements, and system designs

8 FileName.pptx Mobile Application Development 9 mobile programs Over 30 mobile apps in development Mobile Apps Categories –Aviation Control Simulation Apps –Outreach Apps –Aircraft Trainer Apps –Geographical Surveillance Apps –Augmented Reality Apps –Weapon Simulator Apps –Tactical Camera Apps –Missile Simulation Apps –Soldier Instrument Training Apps –Business Apps SED Mobile Applications

9 FileName.pptx 3D Printing Entered the mainstream marketplace in 2007 Sales have grown by 7.2 Percent each year Sales are projected to jump from about $1.7 Billion in 2011 to $3.7 Billion 2015

10 FileName.pptx Army Foreign Military Sales FY2003 – FY2006$18+B FY2007 – FY2010$63.5B FY2009$24.2B FY2011 $12B FY2012$19.6B (144 Different Nations)

11 FileName.pptx Conclusion There is business for those who are innovative and provide customer value.

12 FileName.pptx Back up Charts

13 FileName.pptx Cyber Security In developed countries information technology is vital and pervasive Such dependence has a corresponding vulnerability Cyber Security activities are absolutely essential (Military, Industry, Personal Lives)

14 FileName.pptx Cyber Security Strategic Pillars

15 FileName.pptx Cyber Security Strategic Partnerships

16 FileName.pptx Cyber Security Nation States Open Source: Cyber War by Richard A. Clarke, pp A Realistic Measurement Of Cyber War Strength Must Include All Three Factors The Less Wired A Nation Is, The Higher Its Score On Dependence Cyber Dependence Is A Disadvantage In A Cyber War Nation State Assessment By Richard Clarke (Former National Coordinator For Security, Infrastructure Protection, And Counterterrorism For President Clinton): “The U.S. economy and government are the most dependent in the world on the Internet and therefore the most vulnerable to cyber attacks.” - GAO DoD Cyber Efforts, p. 1 Cyber Strength Assessment

17 FileName.pptx Cyber Security Cyber Huntsville Chair Of Federal/State/Local Gov’t Cyber Working Group First Gov’t Cyber WG Meeting 24 May 2012 Gov’t Liaison For Cyber Huntsville BoD Invitees Include: PEO MS RTC SMDC TSMO TVA ALARNG AMC G6/G2 AMCOM AMRDEC CIO Army G2X City of Huntsville DHS FBI Huntsville Utilities Inspector General LOGSA MDA MSIC NASA NEC-R PEO Aviation

18 FileName.pptx Obsolescence Obsolescence Challenges Affects the system –Requirements, Software, Hardware, … In many cases the Government does not own the drawing package from the OEM or does not have the complete TDP –Restricted technical data packages prevent fair and open competition –Data rights for the OEM part when software is involved Ability to pass functional tests using legacy test equipment that tests tight tolerances –Test equipment can have proprietary claims too Government specification changes (relax requirements?) Keeping production/manufacturing costs low for small quantities Outsourcing of the semiconductor industry Source code was developed without regard to the past 20 years modern software engineering processes Outdated design and system architectures –Semiconductor industry moves in 3 to 4 year cycles when evolving technologies

19 FileName.pptx Obsolescence Obsolescence Mitigation Best Practices/Considerations Ensure full and open rights of technical data packages Use best of industry system engineering guidelines –Reconsider the original system/component requirements to allow “wiggle room” for modern solutions –Architectures that encapsulate and modularize –Common design components Use modern technologies to reduce material component count –FPGAs to replace complete obsolete designs Teaming opportunities between industry and government –Development –Small quantity production

20 FileName.pptx Mobile Application Development Why Mobile Applications? Average age across all 5 branches of the military is at or below 30. June 2012 – DOD Mobile Strategy –Develop Mobile and Web Apps –Improve Infrastructure –Implement mobile device management system Rapid Application Prototyping –Apps are smaller pieces of larger applications –Quick to prototype.

21 FileName.pptx Mobile Apps Development Challenges Mobile Device (e.g. iPad) Operating System changes annually –Information Assurance (IA) issue –Air Worthiness Release (AWR) issue Pilots will want to run their military applications on their personal (i.e. non-secure) devices; must protect sensitive aircraft performance related data –IA issue