SlideShare une entreprise Scribd logo
1  sur  33
Software Technologies In Defence
By
N.V.N. Chaitanya
10135A1201
Information Technology
Contents
Introduction
Need of software in Defence
Microsoft Defence Solutions
The Platform for Defence
Commercial Software Vs. Open source Software
Network Centric Warfare(NCW)
Software Solutions in Army
Software Solutions in Navy
Software Solutions in Air Force
Conclusion
5/22/2013 GVPCE(A) 2
Introduction
• Technology is a strategic weapon across all industries
and organizations, now it is also true in the case of
military and the Department of Defence(DoD).
• The DoD is well known for its hardware-based
weaponry, unmistakable in aircraft, satellite, missiles
and other systems in its arsenal for defending the
country.
5/22/2013 GVPCE(A) 3
Contd..
There are Three
major groups under
the Department of
Defence(DoD)
•Army
•Air Force
•Navy
5/22/2013 GVPCE(A) 4
Need of Software in Defence
• As the defence shifts its focus from metal and
mechanics to unmanned vehicles, drones, and smart
bombs, software is becoming a crucial piece of
weaponry.
• As an Air Force general explains it, “The B-52 aircraft
was lived and died on the quality of its sheet metal.
Today our aircraft will live or die on the quality of our
software.”
5/22/2013 GVPCE(A) 5
Contd..
• As advanced software systems and embedded
software technologies become the brains behind
modern warfare.
• From remotely piloted aircraft and smart bombs to
autonomous vehicles and advanced fighter
jets, software is crucial to the success of today’s
weapons systems.
• Measure  Source Lines of Code(SLOC)
5/22/2013 GVPCE(A) 6
Contd..
0
1000
2000
3000
4000
5000
6000
7000
SLOC
SLOC
5/22/2013 GVPCE(A) 7
Microsoft Defence Solutions
Connecting
government to
citizens
connecting
information to
government workers
connecting
government agencies
together
Microsoft Connected Government Framework
(CGF)
5/22/2013 GVPCE(A) 8
Contd..
CGF provides four
key Capabilities
Improving Command
and Control
Improving Better
Situational Awareness
Enhancing Network
Centric Operations
Deploying Innovative
Technologies
5/22/2013 GVPCE(A) 9
The Platform for Defence
• The Platform Layer : Microsoft provides a
secure, scalable and easy to manage foundation on
which defence organisations can overlay the
applications they need.
• It provides a foundation of certain capabilities on
which the technologies and applications required to
manage defence.
5/22/2013 GVPCE(A) 10
Contd..
 Applications and Devices Capability
It enables defence personnel and commanders
anywhere to work effectively using PCs, PDAs, Tablet
PCs, phones and notebooks.
Technologies :
Windows Vista™, Windows Mobile, Microsoft
Office.
5/22/2013 GVPCE(A) 11
Contd..
 Network Capability
Provide a unifying layer of common services
across your entire environment with technologies that
connect people and systems securely and reliably.
Technologies :
Windows Server, Microsoft Virtual
Server, Windows Storage Server.
5/22/2013 GVPCE(A) 12
Contd..
 Security Capability
Ensure end-to-end protection to implement
networked solutions confidently across the entire
environment.
Technologies :
Microsoft Identity Integration Server, Microsoft
Internet Security and Acceleration Server, Microsoft
Forefront™ Security.
5/22/2013 GVPCE(A) 13
Contd..
 Collaboration Capability
It Connects defence personnel and commanders
with the information and resources they need to work
more efficiently.
Technologies :
Microsoft Exchange Server, Microsoft Office
SharePoint Server, Microsoft Office Communicator.
5/22/2013 GVPCE(A) 14
Contd..
 Communications Capability:
It enable defence personnel and commanders to
Communicate in the way that suits the situation by
switching seamlessly between video
conferencing, telephone, email and instant messaging.
Technologies:
Microsoft Communications Server, Microsoft Live
Meeting.
5/22/2013 GVPCE(A) 15
Commercial Software(CS) Vs. Open
source Software(OSS)
The most obvious contrast between the two
approaches is that OSS allows the original
source code of a program to be made freely
available to the public for modification and
redistribution.
Where as CS is created by certified commercial
developers. Over the past few years, a series of
critical considerations has motivated military
organisations to adopt Commercial Software
for their mission-critical deployments for the
Security purposes.
5/22/2013 GVPCE(A) 16
Network Centric Warfare(NCW)
• Network-Centric Warfare is a
command system that
translates the rapid and
secure sharing of information
among combat superiority.
• NCW enables military
organisations to share
intelligence and information
process it and then react to it
in a timely manner.
5/22/2013 GVPCE(A) 17
Software Solutions in Army
Microsoft Military Messaging
solutions :
• It enable defence
organisations to issue
formal communications
with speed and ease.
• Official reports, notices and
other information can be
sent with integrity and
confidentiality .
• All messages are fully
auditable and can be
archived for up to 30 years.
5/22/2013 GVPCE(A) 18
Contd..
It includes Precedence
levels :
 Routine
 Urgent
 Priority
 Immediate
 Flash
Security Classification
levels:
 Unclassified
 Confidential
 Secret
 Top Secret
5/22/2013 GVPCE(A) 19
Contd..
Fusion Net:
 Fusion Net is a distributed system deployed by the U.S. Army
to disseminate ‘ground truth’ intelligence and unit
management information throughout the Battle space.
 Before Fusion Net, battlefield event information was scattered
among numerous Army systems and databases, which
couldn’t communicate with one another.
5/22/2013 GVPCE(A) 20
Contd..
 Fusion Net provides the communication of information
among different systems and databases in real time.
 It is implemented throughout the current theatre of
operations so that the data capture rate and, the information
availability rate for battlefield events to increase from 75 to
1500 percent.
5/22/2013 GVPCE(A) 21
Contd..
Distributed Common Ground System-Army (DCGS-A)
 The DCGS-A family of systems ensures that the essential
intelligence and battle space awareness information from all
intelligence sources is provided to the Army War fighter when
and where they need it.
 The system’s capabilities are based on a service-oriented
architecture (SOA) that enables the delivery of multiple levels
of intelligence data (voice, video, and geospatial) to
combatant commanders.
5/22/2013 GVPCE(A) 22
Contd..
Distributed Common Ground System-Army (DCGS-A)
 DCGS-A uses the latest cloud technology to rapidly
gather, collaborate and share intelligence data from multiple
sources to the battlefield commanders.
 With this system we can Increase the situational awareness
and reduces risk to the Commander when executing missions.
5/22/2013 GVPCE(A) 23
Software Solutions in Navy
• Polar Navy :
 It is an efficient, user friendly, cross-platform marine
navigation software.
 It provides consistent user experience with native look and
feel on Apple Mac OS , Microsoft Windows and Linux
systems, Apple iPhone and iPad mobile devices.
5/22/2013 GVPCE(A) 24
Contd..
Polar Navy consists of Three
Versions :
 Polar view NS :
 It is a complete user
friendly on-board marine
navigation system. Which
deals about the
Weather, Tides and GPS
systems.
5/22/2013 GVPCE(A) 25
Contd..
• Polar Com :
It consists of
 Comprehensive set of
navigation instruments
including
position, speed, course, win
d, depth
 Highly visible digital and
analog instruments
5/22/2013 GVPCE(A) 26
Contd..
Polar view MX :
• It is a marine app for Apple iOS.
• It acts as a Vector and Raster chart viewer for iPhone and
iPad.
5/22/2013 GVPCE(A) 27
Software Solutions in Air Force
• Net-T(Network Tactical)
 A software upgrade called Net-T effectively turns U.S. War
planes into wireless routers in the sky, Allowing ground forces
to share information with each other.
5/22/2013 GVPCE(A) 28
Contd..
 Using Net-T, commanders on the ground can share video
data, map coordinates and other information types without
the use of traditional satellite or radio communication.
 Requirement:
 The groups on the ground need 'line of sight' to the aircraft in
the air, this opens up communication possibilities to support
ground operations across all services.
5/22/2013 GVPCE(A) 29
Contd..
How to operate:
• Elliott tested Net-T on the A-10 Thunderbolt II ground attack
aircraft and said that the system doesn't require a lot of input
from the pilot once it's properly configured.
• It's a single button push, After that, the pilot must maintain
within the range and stay up with the users.
• Net-T will be in operational use by 2014.
5/22/2013 GVPCE(A) 30
Conclusion
The transition of defence from Platform centric warfare
to the Network centric warfare the usage of emerging
technologies in software is ever increased so that the Software is
becoming a crucial piece of Weaponry in the modern defence
system.
5/22/2013 GVPCE(A) 31
References
• http://www.wikipedia.com
• http://www.howstuffworks.com
• http://download.microsoft.com/download/5/8/1/581FEBAF-116D-
41B3-8CDE-1829F93C5ABE/OSSvCS_Defence_WhitePaper_W.pdf
• www.microsoft.com/industry/government/guides/dod/default.asp
x
• http://www.networkworld.com/news/2013/-airforce-wireless-
routers
• http://indianarmy.nic.in/
• www.army.mil/
• www.nausena-bharti.nic.in/
• www.ndianairforce.nic.in/
5/22/2013 GVPCE(A) 32
THANK YOU..!
5/22/2013 GVPCE(A) 33

Contenu connexe

Tendances

Tendances (20)

Glv
GlvGlv
Glv
 
Stealth Technology for Airborne System
Stealth Technology for Airborne SystemStealth Technology for Airborne System
Stealth Technology for Airborne System
 
Thunderbolt
ThunderboltThunderbolt
Thunderbolt
 
Falcon Shield: Countering the drone threat
Falcon Shield: Countering the drone threatFalcon Shield: Countering the drone threat
Falcon Shield: Countering the drone threat
 
Aerospace & Defense
Aerospace & DefenseAerospace & Defense
Aerospace & Defense
 
LI-FI Presentation
LI-FI  Presentation LI-FI  Presentation
LI-FI Presentation
 
Laser weapons
Laser weaponsLaser weapons
Laser weapons
 
Missile Technology
Missile TechnologyMissile Technology
Missile Technology
 
mobile Os
mobile Osmobile Os
mobile Os
 
War and Technology
War and Technology War and Technology
War and Technology
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
Li fi technology ppt
Li fi technology pptLi fi technology ppt
Li fi technology ppt
 
Technology for national security.ppt
Technology for national security.pptTechnology for national security.ppt
Technology for national security.ppt
 
INDIAN MISSILES
INDIAN MISSILES INDIAN MISSILES
INDIAN MISSILES
 
Virtual Reality & Augmented Reality
Virtual Reality & Augmented RealityVirtual Reality & Augmented Reality
Virtual Reality & Augmented Reality
 
Jf thunder 17
Jf thunder 17Jf thunder 17
Jf thunder 17
 
Wardriving
WardrivingWardriving
Wardriving
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Voice Control for IoT Devices
Voice Control for IoT DevicesVoice Control for IoT Devices
Voice Control for IoT Devices
 

Similaire à Software technologies in defence ppt

24091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r0224091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r02
Manoj Punamia
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
Mohammed Saqib
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
Iaetsd Iaetsd
 
View Slides
View SlidesView Slides
View Slides
Videoguy
 
Cloud Computing for National Security Applications
Cloud Computing for National Security ApplicationsCloud Computing for National Security Applications
Cloud Computing for National Security Applications
white paper
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
Adil Khan
 

Similaire à Software technologies in defence ppt (20)

@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
L3 Presentation at Williams Foundation Seminar on New Approaches to Air-Land ...
 
24091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r0224091_AFRL_ROI_WP_r02
24091_AFRL_ROI_WP_r02
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Ctek Cellular Automation & Control Catalag 2014
Ctek Cellular Automation & Control Catalag 2014Ctek Cellular Automation & Control Catalag 2014
Ctek Cellular Automation & Control Catalag 2014
 
Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing A secure sharing control framework supporting elastic mobile cloud computing
A secure sharing control framework supporting elastic mobile cloud computing
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Digital Security by Design Vision
Digital Security by Design VisionDigital Security by Design Vision
Digital Security by Design Vision
 
Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...
 
AE8751 - Unit II.pdf
AE8751 - Unit II.pdfAE8751 - Unit II.pdf
AE8751 - Unit II.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
View Slides
View SlidesView Slides
View Slides
 
Cloud Computing for National Security Applications
Cloud Computing for National Security ApplicationsCloud Computing for National Security Applications
Cloud Computing for National Security Applications
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
 
Military Defense Solutions Overview
Military Defense Solutions OverviewMilitary Defense Solutions Overview
Military Defense Solutions Overview
 
Resume_Pratik
Resume_PratikResume_Pratik
Resume_Pratik
 

Plus de Santosh Kumar

Plus de Santosh Kumar (8)

Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Holographic memory systems
Holographic memory systemsHolographic memory systems
Holographic memory systems
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technology
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
M commerce ppt
M commerce pptM commerce ppt
M commerce ppt
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Software technologies in defence ppt

  • 1. Software Technologies In Defence By N.V.N. Chaitanya 10135A1201 Information Technology
  • 2. Contents Introduction Need of software in Defence Microsoft Defence Solutions The Platform for Defence Commercial Software Vs. Open source Software Network Centric Warfare(NCW) Software Solutions in Army Software Solutions in Navy Software Solutions in Air Force Conclusion 5/22/2013 GVPCE(A) 2
  • 3. Introduction • Technology is a strategic weapon across all industries and organizations, now it is also true in the case of military and the Department of Defence(DoD). • The DoD is well known for its hardware-based weaponry, unmistakable in aircraft, satellite, missiles and other systems in its arsenal for defending the country. 5/22/2013 GVPCE(A) 3
  • 4. Contd.. There are Three major groups under the Department of Defence(DoD) •Army •Air Force •Navy 5/22/2013 GVPCE(A) 4
  • 5. Need of Software in Defence • As the defence shifts its focus from metal and mechanics to unmanned vehicles, drones, and smart bombs, software is becoming a crucial piece of weaponry. • As an Air Force general explains it, “The B-52 aircraft was lived and died on the quality of its sheet metal. Today our aircraft will live or die on the quality of our software.” 5/22/2013 GVPCE(A) 5
  • 6. Contd.. • As advanced software systems and embedded software technologies become the brains behind modern warfare. • From remotely piloted aircraft and smart bombs to autonomous vehicles and advanced fighter jets, software is crucial to the success of today’s weapons systems. • Measure  Source Lines of Code(SLOC) 5/22/2013 GVPCE(A) 6
  • 8. Microsoft Defence Solutions Connecting government to citizens connecting information to government workers connecting government agencies together Microsoft Connected Government Framework (CGF) 5/22/2013 GVPCE(A) 8
  • 9. Contd.. CGF provides four key Capabilities Improving Command and Control Improving Better Situational Awareness Enhancing Network Centric Operations Deploying Innovative Technologies 5/22/2013 GVPCE(A) 9
  • 10. The Platform for Defence • The Platform Layer : Microsoft provides a secure, scalable and easy to manage foundation on which defence organisations can overlay the applications they need. • It provides a foundation of certain capabilities on which the technologies and applications required to manage defence. 5/22/2013 GVPCE(A) 10
  • 11. Contd..  Applications and Devices Capability It enables defence personnel and commanders anywhere to work effectively using PCs, PDAs, Tablet PCs, phones and notebooks. Technologies : Windows Vista™, Windows Mobile, Microsoft Office. 5/22/2013 GVPCE(A) 11
  • 12. Contd..  Network Capability Provide a unifying layer of common services across your entire environment with technologies that connect people and systems securely and reliably. Technologies : Windows Server, Microsoft Virtual Server, Windows Storage Server. 5/22/2013 GVPCE(A) 12
  • 13. Contd..  Security Capability Ensure end-to-end protection to implement networked solutions confidently across the entire environment. Technologies : Microsoft Identity Integration Server, Microsoft Internet Security and Acceleration Server, Microsoft Forefront™ Security. 5/22/2013 GVPCE(A) 13
  • 14. Contd..  Collaboration Capability It Connects defence personnel and commanders with the information and resources they need to work more efficiently. Technologies : Microsoft Exchange Server, Microsoft Office SharePoint Server, Microsoft Office Communicator. 5/22/2013 GVPCE(A) 14
  • 15. Contd..  Communications Capability: It enable defence personnel and commanders to Communicate in the way that suits the situation by switching seamlessly between video conferencing, telephone, email and instant messaging. Technologies: Microsoft Communications Server, Microsoft Live Meeting. 5/22/2013 GVPCE(A) 15
  • 16. Commercial Software(CS) Vs. Open source Software(OSS) The most obvious contrast between the two approaches is that OSS allows the original source code of a program to be made freely available to the public for modification and redistribution. Where as CS is created by certified commercial developers. Over the past few years, a series of critical considerations has motivated military organisations to adopt Commercial Software for their mission-critical deployments for the Security purposes. 5/22/2013 GVPCE(A) 16
  • 17. Network Centric Warfare(NCW) • Network-Centric Warfare is a command system that translates the rapid and secure sharing of information among combat superiority. • NCW enables military organisations to share intelligence and information process it and then react to it in a timely manner. 5/22/2013 GVPCE(A) 17
  • 18. Software Solutions in Army Microsoft Military Messaging solutions : • It enable defence organisations to issue formal communications with speed and ease. • Official reports, notices and other information can be sent with integrity and confidentiality . • All messages are fully auditable and can be archived for up to 30 years. 5/22/2013 GVPCE(A) 18
  • 19. Contd.. It includes Precedence levels :  Routine  Urgent  Priority  Immediate  Flash Security Classification levels:  Unclassified  Confidential  Secret  Top Secret 5/22/2013 GVPCE(A) 19
  • 20. Contd.. Fusion Net:  Fusion Net is a distributed system deployed by the U.S. Army to disseminate ‘ground truth’ intelligence and unit management information throughout the Battle space.  Before Fusion Net, battlefield event information was scattered among numerous Army systems and databases, which couldn’t communicate with one another. 5/22/2013 GVPCE(A) 20
  • 21. Contd..  Fusion Net provides the communication of information among different systems and databases in real time.  It is implemented throughout the current theatre of operations so that the data capture rate and, the information availability rate for battlefield events to increase from 75 to 1500 percent. 5/22/2013 GVPCE(A) 21
  • 22. Contd.. Distributed Common Ground System-Army (DCGS-A)  The DCGS-A family of systems ensures that the essential intelligence and battle space awareness information from all intelligence sources is provided to the Army War fighter when and where they need it.  The system’s capabilities are based on a service-oriented architecture (SOA) that enables the delivery of multiple levels of intelligence data (voice, video, and geospatial) to combatant commanders. 5/22/2013 GVPCE(A) 22
  • 23. Contd.. Distributed Common Ground System-Army (DCGS-A)  DCGS-A uses the latest cloud technology to rapidly gather, collaborate and share intelligence data from multiple sources to the battlefield commanders.  With this system we can Increase the situational awareness and reduces risk to the Commander when executing missions. 5/22/2013 GVPCE(A) 23
  • 24. Software Solutions in Navy • Polar Navy :  It is an efficient, user friendly, cross-platform marine navigation software.  It provides consistent user experience with native look and feel on Apple Mac OS , Microsoft Windows and Linux systems, Apple iPhone and iPad mobile devices. 5/22/2013 GVPCE(A) 24
  • 25. Contd.. Polar Navy consists of Three Versions :  Polar view NS :  It is a complete user friendly on-board marine navigation system. Which deals about the Weather, Tides and GPS systems. 5/22/2013 GVPCE(A) 25
  • 26. Contd.. • Polar Com : It consists of  Comprehensive set of navigation instruments including position, speed, course, win d, depth  Highly visible digital and analog instruments 5/22/2013 GVPCE(A) 26
  • 27. Contd.. Polar view MX : • It is a marine app for Apple iOS. • It acts as a Vector and Raster chart viewer for iPhone and iPad. 5/22/2013 GVPCE(A) 27
  • 28. Software Solutions in Air Force • Net-T(Network Tactical)  A software upgrade called Net-T effectively turns U.S. War planes into wireless routers in the sky, Allowing ground forces to share information with each other. 5/22/2013 GVPCE(A) 28
  • 29. Contd..  Using Net-T, commanders on the ground can share video data, map coordinates and other information types without the use of traditional satellite or radio communication.  Requirement:  The groups on the ground need 'line of sight' to the aircraft in the air, this opens up communication possibilities to support ground operations across all services. 5/22/2013 GVPCE(A) 29
  • 30. Contd.. How to operate: • Elliott tested Net-T on the A-10 Thunderbolt II ground attack aircraft and said that the system doesn't require a lot of input from the pilot once it's properly configured. • It's a single button push, After that, the pilot must maintain within the range and stay up with the users. • Net-T will be in operational use by 2014. 5/22/2013 GVPCE(A) 30
  • 31. Conclusion The transition of defence from Platform centric warfare to the Network centric warfare the usage of emerging technologies in software is ever increased so that the Software is becoming a crucial piece of Weaponry in the modern defence system. 5/22/2013 GVPCE(A) 31
  • 32. References • http://www.wikipedia.com • http://www.howstuffworks.com • http://download.microsoft.com/download/5/8/1/581FEBAF-116D- 41B3-8CDE-1829F93C5ABE/OSSvCS_Defence_WhitePaper_W.pdf • www.microsoft.com/industry/government/guides/dod/default.asp x • http://www.networkworld.com/news/2013/-airforce-wireless- routers • http://indianarmy.nic.in/ • www.army.mil/ • www.nausena-bharti.nic.in/ • www.ndianairforce.nic.in/ 5/22/2013 GVPCE(A) 32