Welcome!

@CloudExpo Authors: Elizabeth White, Pat Romanski, Yeshim Deniz, Ed Featherston, Stefan Bernbo

Blog Feed Post

USMC and DoD Rapid Reaction Technology Office Seeks Info On Six Categories of Technology: Please review and engage

By

Friends at the Potomac Institute for Policy Studies recently brought this to our attention and since a high number of our readers live their lives studying or working with advanced technologies we wanted to get this to you right away.

The threat of improvised explosive devices (IED) has proven very difficult to mitigate. This strategic threat poses challenges now and will for the foreseeable future. Great minds and organizations in and out of government have been working on ways to mitigate this threat, and there are many capabilities in place already, but adversaries who use IED are always seeking new ways to get around counter IED measures. We must always seek new and better ways of defending against these weapons.

One important component of the US strategy is to seek inputs on advance technologies from the commercial sector. The US Marines Corps is seeking inputs on this important topic now, and are doing so via the DoD Rapid Reaction Technology Office (RRTO).

A new “needs statement” has just been issued to the US Government’s system for requesting industry inputs (FedBizOpps). It is available here.  It is also summarized below.

U.S. Marine Corps Improvised Explosive Device (IED) Detection Needs Statement

The Department of Defense, Rapid Reaction Technology Office (RRTO) Innovation Outreach Program, will conduct a Solutions Meeting at the Marine Corps Base Quantico, VA in the July/August 2014 timeframe. The Solutions Meeting provides selected innovative companies with an opportunity to make short technical presentations to government representatives about their technologies and products. There is a potential that companies may be selected for pilot projects or experimentation if their technology appears to match the needs described below. 

The RRTO Innovation Outreach Program is supporting the USMC in looking for technologies to detect IEDs. The operational goal is to significantly reduce the risks and dangers faced by dismounted or mounted Marines. 

The USMC IED Detection effort is looking for innovative technologies and capabilities in the following areas: 
   1. IED Detection and Identification 
   2. Sensor Platforms and Robotics 
   3. Mapping Technologies 
   4. Signal Processing and Analysis 
   5. Tactical Communications 
   6. Biometrics 

More details on each are below:
IED Detection and Identification
- Standoff sensors to detect, identify, and locate potential surface and sub-surface IEDs or  anomalies
- Multiple sensing techniques such as forward-looking Ground Penetrating Radar, Passive and  Active SWIR/LWIR/UV, hyperspectral, or tomographic methods, etc.
- Trace or bulk explosives, and pre-cursors
- Active interrogation using EM, neutron, UV radiation, etc.
- Novel observables or phenomena and existing sensor optimization
Sensor Platforms and Robotics
- Small UAVs, UGVs, UUVs and other novel platforms
- Autonomous navigation and control including obstacle detection/avoidance
- Optics for depth perception and/or broad field of view
- Modular design, open architecture
Mapping Technologies
- Real-time mapping
- Precision object tagging
- Route planning, replay and real-time alerting
- Multi-modal modeling, visualization and analysis
- Integrated processing and management of current and historical enterprise data
Signal Processing and Analysis
- Point of collection detection, identification, processing, etc.
- Real-time anomaly detection, object identification, processing, etc.
- Visualization of a wide range of sensors/phenomenologies
- Predictive analysis
- Video filtering and stabilization
Tactical Communications
- High data rates for video, telemetry, voice and data
- Novel approaches for bandwidth-restricted environments
- Compression and codecs
- Mesh networking
Biometrics
- Stand-off sensors
- Detect individuals, behavioral characteristics, relationships and anomalies
- Predict behavior/intent
- Multiple modalities (e.g., iris, 2D and 3D facial information, etc.)

For more see FedBizOpps.

Although this type of response really needs motivated companies to submit their own information, we have found and report on many technologies that may well address some of these requirement areas and categorize some elsewhere on our site at:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  –  There are real needs for enhancements to security systems.
  • Visualization  – Connecting computers with humans.

 

 

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

@CloudExpo Stories
I think DevOps is now a rambunctious teenager - it's starting to get a mind of its own, wanting to get its own things but it still needs some adult supervision," explained Thomas Hooker, VP of marketing at CollabNet, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Enterprises are moving to the cloud faster than most of us in security expected. CIOs are going from 0 to 100 in cloud adoption and leaving security teams in the dust. Once cloud is part of an enterprise stack, it’s unclear who has responsibility for the protection of applications, services, and data. When cloud breaches occur, whether active compromise or a publicly accessible database, the blame must fall on both service providers and users. In his session at 21st Cloud Expo, Ben Johnson, C...
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
"We were founded in 2003 and the way we were founded was about good backup and good disaster recovery for our clients, and for the last 20 years we've been pretty consistent with that," noted Marc Malafronte, Territory Manager at StorageCraft, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Announcing Poland #DigitalTransformation Pavilion
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
In his Opening Keynote at 21st Cloud Expo, John Considine, General Manager of IBM Cloud Infrastructure, led attendees through the exciting evolution of the cloud. He looked at this major disruption from the perspective of technology, business models, and what this means for enterprises of all sizes. John Considine is General Manager of Cloud Infrastructure Services at IBM. In that role he is responsible for leading IBM’s public cloud infrastructure including strategy, development, and offering m...
CloudEXPO | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world.