Air Force speed of the mass migration to cloud technologies

File photo – One of the two U. S. Air Force B-1B Lancer aircraft is refueled during a mission to fly in the vicinity of Kyushu, Japan, the East china Sea and the Korean peninsula June 20, 2017. (U. S. Air Force Airman 1st Class Gerald R. Willis/handout via REUTERS)

The air force is working with the Ministry of Defence and industry to accelerate widespread migration to the cloud technology, enabling faster decision-making, AI implementation, rapid data organization and enhanced IT security, Pentagon leaders said.

The versatile cloud initiative includes data consolidation, reducing hardware footprint, cyber “hardening” of weapon systems and the efforts to connect to satellite ground terminals more seamlessly with each other; the main concept of the course is to increase the access to otherwise disparate pools of information, the sharing of data quickly and give the combat commanders more options for a faster time.

“The Under-Secretary of the air force and Vice chief of staff addressed key Air Force organizations and stakeholders to begin the transition of applications from the old IT infrastructure to cloud environments,” Air Force spokeswoman Capt. Hope Cronin told the Warrior Maven.

Pentagon cloud developers say that the automation and the increased applications of AI to make a difference when it comes to the improve of the cloud-security of the network. DOD’s efforts to emphasize the often-discussed, two-tiered cloud strategy that strives to maximize the distributed nodes and the centralized servers and the access to data.

The granting of a $1 Billion deal last year to Dell, EMC, Microsoft and General Dynamics for the huge cloud migration services, the air force is revving up cloud technology in a series of service networks and data systems. The name Cloud-Hosted Enterprise Services by the air force, the deal is now fast the progress in the integration phase.

The services enable data consolidation, collaboration, software, e-mail and document management, among other things. These initiatives also strongly emphasize the use of well-established commercial technologies, such as Microsoft Office 365 and cloud service offerings such as Amazon Web Services and Oracle, among others, a General Dynamics statement said.

There are a variety of points that cloud migration, reinforced by the AI, changes the paradigm for cybersecurity, and access to data. In one sentence, and cloud-based systems may increase vulnerability through the power of allowing invaders to more generally the access of large amounts of data on the systems by less points of entry, should an attack be met with success for the first time.

But at the same time, cloud-enabled virtualization can be a network, many security-oriented software applications, and other measures capable of much faster to detect deviations, to defend wide networks and against the invaders. By making use of cloud technology, this kind of software can simultaneously protect multiple nodes in a more pervasive, profound way.

Cloud technology can also accelerate useful types of computer automation by offering much greater range, among other things. For example, Air Force engineers are using advanced computer automation to replicate the human behaviour online – for the specific purpose of attracting and tracking potential intruders. Algorithms can create online activity that is similar to that of an individual user, leading invaders to think they have the tracking of a person when, in fact, they themselves are being tracked.

Also, the AI can be used to perform real-time analysis on incoming traffic as possible, with malware, viruses or any other form of attempted burglary. If the source, characteristics, or observable pattern of a cyber attack are identified quickly, cyber defenders are better positioned to play in. The cloud provides the ability to simultaneously perform these functions in a large number of interconnected “nodes.”

Also an often discussed phenomenon seems to inform the Pentagon’s push for a faster cloud migration, namely that multi-year government development programs are, in many cases, the generation of technical systems that may be outdated by the time they are finished.

“I am directing aggressive steps to establish a culture of experimentation, adaptation and risk taking,” Vice-Minister of Defence, Patrick Shanahan wrote in a memo last year at the launch of a new multi-service cloud initiative.

Commercial innovation, therefore, in combination with an open architecture framework, is designed to be faster, wide-sweeping upgrades more in line with the most current and impactful innovations.

“DOD is using a tailored acquisition process for the acquisition of a modern enterprise cloud services solution to support Unclassified, Secret and top Secret requirements. Known as the Joint Enterprise Defence Infrastructure (JEDI) Cloud, the proposed contracting action is a full and open competition,” a Pentagon statement said.

Pentagon leaders of the JEDI program explain that cloud security will be approached in a way measured so as to ensure maximum data protection. They want to be able to generate a secure, secret networks in 6 months – and Top-Secret cloud-based networks in 9 months.

Cloud Hardens Satellite Coms

By facilitating better satellite ground terminal of the interoperability and the network, data sharing, and cloud-based systems can also be the speed of SATCOM connectivity, and command and control technology for accelerating the guidelines to satellites, industry developers have explained.

CACI is one of a handful of industry developers, Hughes and Viasat, which is currently exploring emerging technologies as a way to further protect and harden SATCOM connections, and command and control. CACI uses a specific kind of new cloud-based battle management software designed to integrate rapidly emerging data from a wide range of “nodes” on a network.

“If there is a scenario in which there is a cyber attack that ground, or in space-based which is disadvantageous for the assets, ultimately what happens is a sequence of decisions. I am willing to take some risk?” Ryan Fairchild, Vice-President and Division Manager, Space Operations, CACI, told Warrior Maven in an interview earlier this year.

For example, Fairchild said emerging cloud-based systems can a combatant commander to quickly make an informed decision on whether or not to use a laser weapon or EW system.

Viasat has an Ethernet encryptor designed to improve security for cloud computing.

“Viasat KG-142 is a 100 Type 1 Gbps Ethernet encryptor providing speeds ten times faster than the existing solutions. With the new encryptor, the government can better meet the bandwidth required for cloud-computing and real-time data transport over the battlespace,” a Viasat statement said.

Viasat developers describe the KG-142 such as a high-speed, low-latency encryptor with integrated security standards and software to upgrade designs aimed at minimizing the need of hardware changes.

More Weapons and Technology – WARRIOR MAVEN (CLICK HERE)–

Follow us

Don't be shy, get in touch. We love meeting interesting people and making new friends.

Most popular