SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Software Technologies In Defence
By
N.V.N. Chaitanya
10135A1201
Information Technology
Contents
Introduction
Need of software in Defence
Microsoft Defence Solutions
The Platform for Defence
Commercial Software Vs. Open source Software
Network Centric Warfare(NCW)
Software Solutions in Army
Software Solutions in Navy
Software Solutions in Air Force
Conclusion
5/22/2013 GVPCE(A) 2
Introduction
• Technology is a strategic weapon across all industries
and organizations, now it is also true in the case of
military and the Department of Defence(DoD).
• The DoD is well known for its hardware-based
weaponry, unmistakable in aircraft, satellite, missiles
and other systems in its arsenal for defending the
country.
5/22/2013 GVPCE(A) 3
Contd..
There are Three
major groups under
the Department of
Defence(DoD)
•Army
•Air Force
•Navy
5/22/2013 GVPCE(A) 4
Need of Software in Defence
• As the defence shifts its focus from metal and
mechanics to unmanned vehicles, drones, and smart
bombs, software is becoming a crucial piece of
weaponry.
• As an Air Force general explains it, “The B-52 aircraft
was lived and died on the quality of its sheet metal.
Today our aircraft will live or die on the quality of our
software.”
5/22/2013 GVPCE(A) 5
Contd..
• As advanced software systems and embedded
software technologies become the brains behind
modern warfare.
• From remotely piloted aircraft and smart bombs to
autonomous vehicles and advanced fighter
jets, software is crucial to the success of today’s
weapons systems.
• Measure  Source Lines of Code(SLOC)
5/22/2013 GVPCE(A) 6
Contd..
0
1000
2000
3000
4000
5000
6000
7000
SLOC
SLOC
5/22/2013 GVPCE(A) 7
Microsoft Defence Solutions
Connecting
government to
citizens
connecting
information to
government workers
connecting
government agencies
together
Microsoft Connected Government Framework
(CGF)
5/22/2013 GVPCE(A) 8
Contd..
CGF provides four
key Capabilities
Improving Command
and Control
Improving Better
Situational Awareness
Enhancing Network
Centric Operations
Deploying Innovative
Technologies
5/22/2013 GVPCE(A) 9
The Platform for Defence
• The Platform Layer : Microsoft provides a
secure, scalable and easy to manage foundation on
which defence organisations can overlay the
applications they need.
• It provides a foundation of certain capabilities on
which the technologies and applications required to
manage defence.
5/22/2013 GVPCE(A) 10
Contd..
 Applications and Devices Capability
It enables defence personnel and commanders
anywhere to work effectively using PCs, PDAs, Tablet
PCs, phones and notebooks.
Technologies :
Windows Vista™, Windows Mobile, Microsoft
Office.
5/22/2013 GVPCE(A) 11
Contd..
 Network Capability
Provide a unifying layer of common services
across your entire environment with technologies that
connect people and systems securely and reliably.
Technologies :
Windows Server, Microsoft Virtual
Server, Windows Storage Server.
5/22/2013 GVPCE(A) 12
Contd..
 Security Capability
Ensure end-to-end protection to implement
networked solutions confidently across the entire
environment.
Technologies :
Microsoft Identity Integration Server, Microsoft
Internet Security and Acceleration Server, Microsoft
Forefront™ Security.
5/22/2013 GVPCE(A) 13
Contd..
 Collaboration Capability
It Connects defence personnel and commanders
with the information and resources they need to work
more efficiently.
Technologies :
Microsoft Exchange Server, Microsoft Office
SharePoint Server, Microsoft Office Communicator.
5/22/2013 GVPCE(A) 14
Contd..
 Communications Capability:
It enable defence personnel and commanders to
Communicate in the way that suits the situation by
switching seamlessly between video
conferencing, telephone, email and instant messaging.
Technologies:
Microsoft Communications Server, Microsoft Live
Meeting.
5/22/2013 GVPCE(A) 15
Commercial Software(CS) Vs. Open
source Software(OSS)
The most obvious contrast between the two
approaches is that OSS allows the original
source code of a program to be made freely
available to the public for modification and
redistribution.
Where as CS is created by certified commercial
developers. Over the past few years, a series of
critical considerations has motivated military
organisations to adopt Commercial Software
for their mission-critical deployments for the
Security purposes.
5/22/2013 GVPCE(A) 16
Network Centric Warfare(NCW)
• Network-Centric Warfare is a
command system that
translates the rapid and
secure sharing of information
among combat superiority.
• NCW enables military
organisations to share
intelligence and information
process it and then react to it
in a timely manner.
5/22/2013 GVPCE(A) 17
Software Solutions in Army
Microsoft Military Messaging
solutions :
• It enable defence
organisations to issue
formal communications
with speed and ease.
• Official reports, notices and
other information can be
sent with integrity and
confidentiality .
• All messages are fully
auditable and can be
archived for up to 30 years.
5/22/2013 GVPCE(A) 18
Contd..
It includes Precedence
levels :
 Routine
 Urgent
 Priority
 Immediate
 Flash
Security Classification
levels:
 Unclassified
 Confidential
 Secret
 Top Secret
5/22/2013 GVPCE(A) 19
Contd..
Fusion Net:
 Fusion Net is a distributed system deployed by the U.S. Army
to disseminate ‘ground truth’ intelligence and unit
management information throughout the Battle space.
 Before Fusion Net, battlefield event information was scattered
among numerous Army systems and databases, which
couldn’t communicate with one another.
5/22/2013 GVPCE(A) 20
Contd..
 Fusion Net provides the communication of information
among different systems and databases in real time.
 It is implemented throughout the current theatre of
operations so that the data capture rate and, the information
availability rate for battlefield events to increase from 75 to
1500 percent.
5/22/2013 GVPCE(A) 21
Contd..
Distributed Common Ground System-Army (DCGS-A)
 The DCGS-A family of systems ensures that the essential
intelligence and battle space awareness information from all
intelligence sources is provided to the Army War fighter when
and where they need it.
 The system’s capabilities are based on a service-oriented
architecture (SOA) that enables the delivery of multiple levels
of intelligence data (voice, video, and geospatial) to
combatant commanders.
5/22/2013 GVPCE(A) 22
Contd..
Distributed Common Ground System-Army (DCGS-A)
 DCGS-A uses the latest cloud technology to rapidly
gather, collaborate and share intelligence data from multiple
sources to the battlefield commanders.
 With this system we can Increase the situational awareness
and reduces risk to the Commander when executing missions.
5/22/2013 GVPCE(A) 23
Software Solutions in Navy
• Polar Navy :
 It is an efficient, user friendly, cross-platform marine
navigation software.
 It provides consistent user experience with native look and
feel on Apple Mac OS , Microsoft Windows and Linux
systems, Apple iPhone and iPad mobile devices.
5/22/2013 GVPCE(A) 24
Contd..
Polar Navy consists of Three
Versions :
 Polar view NS :
 It is a complete user
friendly on-board marine
navigation system. Which
deals about the
Weather, Tides and GPS
systems.
5/22/2013 GVPCE(A) 25
Contd..
• Polar Com :
It consists of
 Comprehensive set of
navigation instruments
including
position, speed, course, win
d, depth
 Highly visible digital and
analog instruments
5/22/2013 GVPCE(A) 26
Contd..
Polar view MX :
• It is a marine app for Apple iOS.
• It acts as a Vector and Raster chart viewer for iPhone and
iPad.
5/22/2013 GVPCE(A) 27
Software Solutions in Air Force
• Net-T(Network Tactical)
 A software upgrade called Net-T effectively turns U.S. War
planes into wireless routers in the sky, Allowing ground forces
to share information with each other.
5/22/2013 GVPCE(A) 28
Contd..
 Using Net-T, commanders on the ground can share video
data, map coordinates and other information types without
the use of traditional satellite or radio communication.
 Requirement:
 The groups on the ground need 'line of sight' to the aircraft in
the air, this opens up communication possibilities to support
ground operations across all services.
5/22/2013 GVPCE(A) 29
Contd..
How to operate:
• Elliott tested Net-T on the A-10 Thunderbolt II ground attack
aircraft and said that the system doesn't require a lot of input
from the pilot once it's properly configured.
• It's a single button push, After that, the pilot must maintain
within the range and stay up with the users.
• Net-T will be in operational use by 2014.
5/22/2013 GVPCE(A) 30
Conclusion
The transition of defence from Platform centric warfare
to the Network centric warfare the usage of emerging
technologies in software is ever increased so that the Software is
becoming a crucial piece of Weaponry in the modern defence
system.
5/22/2013 GVPCE(A) 31
References
• http://www.wikipedia.com
• http://www.howstuffworks.com
• http://download.microsoft.com/download/5/8/1/581FEBAF-116D-
41B3-8CDE-1829F93C5ABE/OSSvCS_Defence_WhitePaper_W.pdf
• www.microsoft.com/industry/government/guides/dod/default.asp
x
• http://www.networkworld.com/news/2013/-airforce-wireless-
routers
• http://indianarmy.nic.in/
• www.army.mil/
• www.nausena-bharti.nic.in/
• www.ndianairforce.nic.in/
5/22/2013 GVPCE(A) 32
THANK YOU..!
5/22/2013 GVPCE(A) 33

Weitere ähnliche Inhalte

Was ist angesagt?

Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLSeungjoo Kim
 
Drone Military Automation INDIA DRDO Pitch Deck
Drone Military Automation INDIA DRDO Pitch DeckDrone Military Automation INDIA DRDO Pitch Deck
Drone Military Automation INDIA DRDO Pitch DeckHemant Sarthak
 
Electronic Warfare ( EW ) Training Crash Course
Electronic Warfare ( EW ) Training Crash CourseElectronic Warfare ( EW ) Training Crash Course
Electronic Warfare ( EW ) Training Crash CourseBryan Len
 
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Big Data Value Association
 
The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?Norbert Schepers
 
Uav presentation
Uav presentationUav presentation
Uav presentationMeshut
 
Drones presentation
Drones presentationDrones presentation
Drones presentationAmna Abrar
 
Overview Of Unmanned Aircraft Systems (UAS)
Overview Of Unmanned Aircraft Systems (UAS)Overview Of Unmanned Aircraft Systems (UAS)
Overview Of Unmanned Aircraft Systems (UAS)Mark Lewellen
 
Technical Seminar PPT
Technical Seminar PPTTechnical Seminar PPT
Technical Seminar PPTKshitiz_Vj
 
Aeronautical communication seminar presentation
Aeronautical communication seminar presentationAeronautical communication seminar presentation
Aeronautical communication seminar presentationArun Kc
 
Technology for national security.ppt
Technology for national security.pptTechnology for national security.ppt
Technology for national security.pptNithish Balaji P
 
Drones and their Increasing Number of Applications
Drones and their Increasing Number of ApplicationsDrones and their Increasing Number of Applications
Drones and their Increasing Number of ApplicationsJeffrey Funk
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technologyYusuf Shaik
 

Was ist angesagt? (20)

11. Future of Drones
11. Future of Drones11. Future of Drones
11. Future of Drones
 
Drone ppt
Drone pptDrone ppt
Drone ppt
 
Drones
DronesDrones
Drones
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
 
Drone Military Automation INDIA DRDO Pitch Deck
Drone Military Automation INDIA DRDO Pitch DeckDrone Military Automation INDIA DRDO Pitch Deck
Drone Military Automation INDIA DRDO Pitch Deck
 
Electronic Warfare ( EW ) Training Crash Course
Electronic Warfare ( EW ) Training Crash CourseElectronic Warfare ( EW ) Training Crash Course
Electronic Warfare ( EW ) Training Crash Course
 
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
 
Army Futures Command
Army Futures CommandArmy Futures Command
Army Futures Command
 
The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?The Drone Wars: Warfare of the Future?
The Drone Wars: Warfare of the Future?
 
1. Introduction to drones
1. Introduction to drones1. Introduction to drones
1. Introduction to drones
 
Uav presentation
Uav presentationUav presentation
Uav presentation
 
Drones presentation
Drones presentationDrones presentation
Drones presentation
 
Overview Of Unmanned Aircraft Systems (UAS)
Overview Of Unmanned Aircraft Systems (UAS)Overview Of Unmanned Aircraft Systems (UAS)
Overview Of Unmanned Aircraft Systems (UAS)
 
Technical Seminar PPT
Technical Seminar PPTTechnical Seminar PPT
Technical Seminar PPT
 
Aeronautical communication seminar presentation
Aeronautical communication seminar presentationAeronautical communication seminar presentation
Aeronautical communication seminar presentation
 
Technology for national security.ppt
Technology for national security.pptTechnology for national security.ppt
Technology for national security.ppt
 
Drones and their Increasing Number of Applications
Drones and their Increasing Number of ApplicationsDrones and their Increasing Number of Applications
Drones and their Increasing Number of Applications
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Advanced driver assistance systems
Advanced driver assistance systemsAdvanced driver assistance systems
Advanced driver assistance systems
 
Drones
DronesDrones
Drones
 

Ähnlich wie Software technologies in defence ppt

@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
 
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...ICSA, LLC
 
24091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r0224091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r02Manoj Punamia
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresMohammed Saqib
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
Ctek Cellular Automation & Control Catalag 2014
Ctek Cellular Automation & Control Catalag 2014Ctek Cellular Automation & Control Catalag 2014
Ctek Cellular Automation & Control Catalag 2014Lynn Woodruff
 
A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing IJECEIAES
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Digital Security by Design Vision
Digital Security by Design VisionDigital Security by Design Vision
Digital Security by Design VisionKTN
 
Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...DESMOND YUEN
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutionsIJCNCJournal
 
View Slides
View SlidesView Slides
View SlidesVideoguy
 
Cloud Computing for National Security Applications
Cloud Computing for National Security ApplicationsCloud Computing for National Security Applications
Cloud Computing for National Security Applicationswhite paper
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13Cohesive Networks
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Adil Khan
 

Ähnlich wie Software technologies in defence ppt (20)

@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
 
24091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r0224091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r02
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Ctek Cellular Automation & Control Catalag 2014
Ctek Cellular Automation & Control Catalag 2014Ctek Cellular Automation & Control Catalag 2014
Ctek Cellular Automation & Control Catalag 2014
 
Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Digital Security by Design Vision
Digital Security by Design VisionDigital Security by Design Vision
Digital Security by Design Vision
 
Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...
 
AE8751 - Unit II.pdf
AE8751 - Unit II.pdfAE8751 - Unit II.pdf
AE8751 - Unit II.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
View Slides
View SlidesView Slides
View Slides
 
Cloud Computing for National Security Applications
Cloud Computing for National Security ApplicationsCloud Computing for National Security Applications
Cloud Computing for National Security Applications
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
 
Military Defense Solutions Overview
Military Defense Solutions OverviewMilitary Defense Solutions Overview
Military Defense Solutions Overview
 
Resume_Pratik
Resume_PratikResume_Pratik
Resume_Pratik
 

Mehr von Santosh Kumar

human computer interface
human computer interfacehuman computer interface
human computer interfaceSantosh Kumar
 
Holographic memory systems
Holographic memory systemsHolographic memory systems
Holographic memory systemsSantosh Kumar
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technologySantosh Kumar
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system pptSantosh Kumar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 

Mehr von Santosh Kumar (8)

Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Holographic memory systems
Holographic memory systemsHolographic memory systems
Holographic memory systems
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technology
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
M commerce ppt
M commerce pptM commerce ppt
M commerce ppt
 

Kürzlich hochgeladen

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Software technologies in defence ppt

  • 1. Software Technologies In Defence By N.V.N. Chaitanya 10135A1201 Information Technology
  • 2. Contents Introduction Need of software in Defence Microsoft Defence Solutions The Platform for Defence Commercial Software Vs. Open source Software Network Centric Warfare(NCW) Software Solutions in Army Software Solutions in Navy Software Solutions in Air Force Conclusion 5/22/2013 GVPCE(A) 2
  • 3. Introduction • Technology is a strategic weapon across all industries and organizations, now it is also true in the case of military and the Department of Defence(DoD). • The DoD is well known for its hardware-based weaponry, unmistakable in aircraft, satellite, missiles and other systems in its arsenal for defending the country. 5/22/2013 GVPCE(A) 3
  • 4. Contd.. There are Three major groups under the Department of Defence(DoD) •Army •Air Force •Navy 5/22/2013 GVPCE(A) 4
  • 5. Need of Software in Defence • As the defence shifts its focus from metal and mechanics to unmanned vehicles, drones, and smart bombs, software is becoming a crucial piece of weaponry. • As an Air Force general explains it, “The B-52 aircraft was lived and died on the quality of its sheet metal. Today our aircraft will live or die on the quality of our software.” 5/22/2013 GVPCE(A) 5
  • 6. Contd.. • As advanced software systems and embedded software technologies become the brains behind modern warfare. • From remotely piloted aircraft and smart bombs to autonomous vehicles and advanced fighter jets, software is crucial to the success of today’s weapons systems. • Measure  Source Lines of Code(SLOC) 5/22/2013 GVPCE(A) 6
  • 8. Microsoft Defence Solutions Connecting government to citizens connecting information to government workers connecting government agencies together Microsoft Connected Government Framework (CGF) 5/22/2013 GVPCE(A) 8
  • 9. Contd.. CGF provides four key Capabilities Improving Command and Control Improving Better Situational Awareness Enhancing Network Centric Operations Deploying Innovative Technologies 5/22/2013 GVPCE(A) 9
  • 10. The Platform for Defence • The Platform Layer : Microsoft provides a secure, scalable and easy to manage foundation on which defence organisations can overlay the applications they need. • It provides a foundation of certain capabilities on which the technologies and applications required to manage defence. 5/22/2013 GVPCE(A) 10
  • 11. Contd..  Applications and Devices Capability It enables defence personnel and commanders anywhere to work effectively using PCs, PDAs, Tablet PCs, phones and notebooks. Technologies : Windows Vista™, Windows Mobile, Microsoft Office. 5/22/2013 GVPCE(A) 11
  • 12. Contd..  Network Capability Provide a unifying layer of common services across your entire environment with technologies that connect people and systems securely and reliably. Technologies : Windows Server, Microsoft Virtual Server, Windows Storage Server. 5/22/2013 GVPCE(A) 12
  • 13. Contd..  Security Capability Ensure end-to-end protection to implement networked solutions confidently across the entire environment. Technologies : Microsoft Identity Integration Server, Microsoft Internet Security and Acceleration Server, Microsoft Forefront™ Security. 5/22/2013 GVPCE(A) 13
  • 14. Contd..  Collaboration Capability It Connects defence personnel and commanders with the information and resources they need to work more efficiently. Technologies : Microsoft Exchange Server, Microsoft Office SharePoint Server, Microsoft Office Communicator. 5/22/2013 GVPCE(A) 14
  • 15. Contd..  Communications Capability: It enable defence personnel and commanders to Communicate in the way that suits the situation by switching seamlessly between video conferencing, telephone, email and instant messaging. Technologies: Microsoft Communications Server, Microsoft Live Meeting. 5/22/2013 GVPCE(A) 15
  • 16. Commercial Software(CS) Vs. Open source Software(OSS) The most obvious contrast between the two approaches is that OSS allows the original source code of a program to be made freely available to the public for modification and redistribution. Where as CS is created by certified commercial developers. Over the past few years, a series of critical considerations has motivated military organisations to adopt Commercial Software for their mission-critical deployments for the Security purposes. 5/22/2013 GVPCE(A) 16
  • 17. Network Centric Warfare(NCW) • Network-Centric Warfare is a command system that translates the rapid and secure sharing of information among combat superiority. • NCW enables military organisations to share intelligence and information process it and then react to it in a timely manner. 5/22/2013 GVPCE(A) 17
  • 18. Software Solutions in Army Microsoft Military Messaging solutions : • It enable defence organisations to issue formal communications with speed and ease. • Official reports, notices and other information can be sent with integrity and confidentiality . • All messages are fully auditable and can be archived for up to 30 years. 5/22/2013 GVPCE(A) 18
  • 19. Contd.. It includes Precedence levels :  Routine  Urgent  Priority  Immediate  Flash Security Classification levels:  Unclassified  Confidential  Secret  Top Secret 5/22/2013 GVPCE(A) 19
  • 20. Contd.. Fusion Net:  Fusion Net is a distributed system deployed by the U.S. Army to disseminate ‘ground truth’ intelligence and unit management information throughout the Battle space.  Before Fusion Net, battlefield event information was scattered among numerous Army systems and databases, which couldn’t communicate with one another. 5/22/2013 GVPCE(A) 20
  • 21. Contd..  Fusion Net provides the communication of information among different systems and databases in real time.  It is implemented throughout the current theatre of operations so that the data capture rate and, the information availability rate for battlefield events to increase from 75 to 1500 percent. 5/22/2013 GVPCE(A) 21
  • 22. Contd.. Distributed Common Ground System-Army (DCGS-A)  The DCGS-A family of systems ensures that the essential intelligence and battle space awareness information from all intelligence sources is provided to the Army War fighter when and where they need it.  The system’s capabilities are based on a service-oriented architecture (SOA) that enables the delivery of multiple levels of intelligence data (voice, video, and geospatial) to combatant commanders. 5/22/2013 GVPCE(A) 22
  • 23. Contd.. Distributed Common Ground System-Army (DCGS-A)  DCGS-A uses the latest cloud technology to rapidly gather, collaborate and share intelligence data from multiple sources to the battlefield commanders.  With this system we can Increase the situational awareness and reduces risk to the Commander when executing missions. 5/22/2013 GVPCE(A) 23
  • 24. Software Solutions in Navy • Polar Navy :  It is an efficient, user friendly, cross-platform marine navigation software.  It provides consistent user experience with native look and feel on Apple Mac OS , Microsoft Windows and Linux systems, Apple iPhone and iPad mobile devices. 5/22/2013 GVPCE(A) 24
  • 25. Contd.. Polar Navy consists of Three Versions :  Polar view NS :  It is a complete user friendly on-board marine navigation system. Which deals about the Weather, Tides and GPS systems. 5/22/2013 GVPCE(A) 25
  • 26. Contd.. • Polar Com : It consists of  Comprehensive set of navigation instruments including position, speed, course, win d, depth  Highly visible digital and analog instruments 5/22/2013 GVPCE(A) 26
  • 27. Contd.. Polar view MX : • It is a marine app for Apple iOS. • It acts as a Vector and Raster chart viewer for iPhone and iPad. 5/22/2013 GVPCE(A) 27
  • 28. Software Solutions in Air Force • Net-T(Network Tactical)  A software upgrade called Net-T effectively turns U.S. War planes into wireless routers in the sky, Allowing ground forces to share information with each other. 5/22/2013 GVPCE(A) 28
  • 29. Contd..  Using Net-T, commanders on the ground can share video data, map coordinates and other information types without the use of traditional satellite or radio communication.  Requirement:  The groups on the ground need 'line of sight' to the aircraft in the air, this opens up communication possibilities to support ground operations across all services. 5/22/2013 GVPCE(A) 29
  • 30. Contd.. How to operate: • Elliott tested Net-T on the A-10 Thunderbolt II ground attack aircraft and said that the system doesn't require a lot of input from the pilot once it's properly configured. • It's a single button push, After that, the pilot must maintain within the range and stay up with the users. • Net-T will be in operational use by 2014. 5/22/2013 GVPCE(A) 30
  • 31. Conclusion The transition of defence from Platform centric warfare to the Network centric warfare the usage of emerging technologies in software is ever increased so that the Software is becoming a crucial piece of Weaponry in the modern defence system. 5/22/2013 GVPCE(A) 31
  • 32. References • http://www.wikipedia.com • http://www.howstuffworks.com • http://download.microsoft.com/download/5/8/1/581FEBAF-116D- 41B3-8CDE-1829F93C5ABE/OSSvCS_Defence_WhitePaper_W.pdf • www.microsoft.com/industry/government/guides/dod/default.asp x • http://www.networkworld.com/news/2013/-airforce-wireless- routers • http://indianarmy.nic.in/ • www.army.mil/ • www.nausena-bharti.nic.in/ • www.ndianairforce.nic.in/ 5/22/2013 GVPCE(A) 32