Defense

Building for VICTORY: The U.S. Army and the Vehicle Integration Network Initiative

It isn’t a high-profile battle, but those who know are aware that our armed forces are engaged in a perpetual war with an enemy that is, ultimately, unbeatable. That enemy is obsolescence. However, just because obsolescence is inevitable, it doesn’t mean there aren’t victories. Or one singular “VICTORY,” as the case may be.

US Navy: Sailing Full Steam Ahead… and Making Petro-Fuels Obsolete?

Earlier this spring, scientists at the US Naval Research Laboratory (NRL) announced a prototype process for producing liquid hydrocarbon fuel from seawater. NRL’s proprietary process uses a modular reaction system to remove CO2 from seawater (with 92% efficiency) while producing hydrogen gas. Once separated, the nickel-supported catalyst conversion system combines them again into liquid hydrocarbon…

DARPA’s Defense Against Counterfeiting: SHIELD

At DARPA’s Microsystems Technology Office (MTO), proposals are already being accepted for the new Supply Chain Hardware Integrity for Electronics program, aka SHIELD. The SHIELD program will be the DOD’s response to component counterfeiting in the supply chain and will include the use of a “a small (100 micron x 100 micron) component, or dielet, that authenticates…

A Tale of Two SHIELDS: Marvel Comics, DARPA, and Counterfeiting

Marvel Comic’s SHIELD (Strategic help Homeland Intervention, Enforcement, and Logistics Division) and, slick as it is, it is more likely to wind up counterfeited than prevent counterfeiting It is a program devised by a secretive government agency. Its purpose is to organize and motivate the top actors in their fields to come together to prevent…

Keys to Managing DMSMS: A Clear Assessment of Obsolescence Risk

“Proactively consider DMSMS through[out] a system’s life cycle by anticipating potential DMSMS occurrences and taking appropriate logistics, acquisition, and budgeting steps to prevent DMSMS from adversely affecting readiness or total ownership cost.” SD-22 DMSMS Guidebook Continued from a previous post: Being Proactive While obsolescence management traditionally starts after products become mature, that is really waiting…

Keys to Successfully Managing DMSMS: Being Proactive

“Proactively take timely and effective actions to identify and minimize the DMSMS impact on DoD acquisition and logistics support efforts.” SD-22 DMSMS Guidebook The DMSMS conference is just around the corner. As a conference all about obsolescence management, it tends to be one we look forward to every year. This year, we’re looking to take…

Software Obsolescence: Why Modernization Doesn’t Necessarily Mean “Modern”

For players in the embedded industry it is easy to forget how large the problem of obsolescence can be, especially beyond the component level. Recently, I was talking to a software engineer who had spent a year doing software modernization, as a result of upgrading a flight navigational system from the original code to Linux.…

Refurbished Boards: What works today may not be reliable tomorrow

Saying that something is “good enough for government work” is often meant as a joke and the reference implies “mediocre work.” The irony is that “government work” is often highly sophisticated; systems are designed and engineered to operate in the most extreme environmental conditions for a very long period of time. I recently had the…

Will sequestration increase the risk of counterfeit components in the supply chain?

Between Section 818 in the NDAA FY12 and the NDAA FY13 Amendment, the defense industry is highly aware of the risks of counterfeit components in the supply chain.  As a rule, logistics teams know not to purchase parts off EBay but from authorized sources, or purchase directly from the manufacturer.  They know about the SAE…

Looking at Legacy: Proactively managing the risk of counterfeit components

In general, defense sustainment and counterfeit avoidance has been left to DMSMS teams and logistics or engineering tactics.  However, so far the solution has primarily been to develop standards, authentication and anti-counterfeit technologies.  These responses have been critical, but have largely remained reactive and have not produced the dynamic collaboration crucial to maintaining a healthy,…