Defense standards evolved from the need to ensure proper performance, maintainability and reparability (ease of MRO), and logistical usefulness of military equipment. The latter two goals (MRO and logistics) favor certain general concepts, such as interchangeability, standardization (of equipment and processes, in general), cataloging, communications, and training (to teach people …
Read More »With China engaging in massive military buildup near the Borders, India preparing to safeguard its interests.
China’s construction of military infrastructure along its border with India suggests Beijing is considering military options amidst a territorial dispute between the two countries. China’s aggressive strategy will likely prompt India to respond in kind, leading to a greater concentration of military assets along their disputed border and increasing the …
Read More »MIL-STD-810 standards ensure electronic systems designed, manufactured, and tested to battle harsh defense and aerospace conditions
MIL-STD 810 is a Department of Defense Test Method Standard for environmental engineering considerations and laboratory tests. It is the most popular Military specification used to conduct environmental testing of military products. Given the fact that these products may be exposed to harsh or even extreme conditions, their reliability under …
Read More »Undersea Warfare Training Range (USWTR) is enhancing US Navy’s ASW training effectiveness
Anti-submarine Warfare is Critical for US Navy. Submarines still pose a threat to seaborne forces. More than 90% of joint military equipment (Army, Air Force, Marines) still flows by sea. A great deal of humanitarian aid (tsunami relief, hurricane relief, humanitarian evacuation) comes by sea. Therefore to defend our nation, …
Read More »UK Cyber Security Strategy emphasizes Defence , Deterrence and Cyber technology development
The rapid development of digitalized services and online shopping in the UK has been paralleled with significant growth in cybercrime, leading to greater spending on security in public and private sectors. Organizations’ IT footprints have also become increasingly complex, driving demand for more sophisticated and bespoke cyber solutions. There …
Read More »Aircraft Airworthiness, Certification Requirements, processes and tests
Every Aircraft that moves from the designed and manufactured state into an accepted and authorized safe flying state requires certification. Any new aircraft designed by a manufacturer will need to be submitted to appropriate regulatory authorities for testing for a type certificate. In the US this is the FAA (Federal …
Read More »Enabling technologies of In-Space Assembly (OOS / ISA), automated satellite on-orbit servicing (OOS) and Robotic Manufacturing and Assembly (IRMA)
In the history of spaceflight, almost all spacecraft have been manufactured and assembled on the ground, then integrated into a launch vehicle for delivery into orbit. This approach imposes significant limitations on the size, volume, and design of payloads that can be accommodated within the fairing of a single launch …
Read More »Enhancing software reliability of military and mission critical systems through technologies and reliability standards
In 2019, Boeing 737 Max jets en route to Nairobi, crashed shortly after take-off from Addis Ababa. It has been confirmed that 157 passengers on board all lost their lives. This tragedy was as a result of an error in the Boeing aircraft’s flight-control software. Numerous softwares all over the …
Read More »DARPA P3 developing rapid medical countermeasures to pandemics including COVID-19 or corona virus to support military readiness and global stability
Pandemics may threaten both internal and external national security – the physical threat to U.S. citizens in terms of morbidity and mortality, and the decreased effectiveness of U.S. armed forces in protecting those citizens from external threats. The economic, political or social turmoil in adversary country is also potential threat. …
Read More »US DOD establishing Cyber Ranges and testbeds with Live-Virtual-Constructive (LVC) simulation under CyberWarfare Threat
As World is becoming more digitized, its National Critical Information Infrastructure assets in critical sectors like energy, banking, defence, telecom, transportation etc. have becoming more vulnerable to cyber attacks like the use of ransomware to hold assets at risk, disabling of CII threatening domestic public safety. In the Future, IOT will …
Read More »