In war as in war. Development of secure computers and programs

46
Protected military devices, such as laptops and tablets, must combine the best qualities of commercial products and certainly high durability and safety, in connection with which manufacturers strive to use the most modern and advanced technologies with a special emphasis on the suitability of their systems for carrying.






Panasonic manufactures a number of secure devices that can be used in the military, for example, the FZ-G1 tablet (pictured)


Secure computers are a vital tool for soldiers. System manufacturers emphasize a number of priorities that are an incentive for technological development, since military customers need devices that combine the convenience of using commercial products and the reliability and security required by combat units.

In the world there are many manufacturers of protected devices for the military, some of them are well known in the civilian sphere. For example, Panasonic is developing the Toughbook line, which includes laptops, tablets, 2 to 1 systems (a hardened laptop with a removable screen that works separately as a tablet) and handheld devices. According to Peter Thomas of Panasonic System Communications Europe, “our systems have many customers in the military.”

While different industries and business structures have many common needs, the armed forces put forward a number of special requirements. Thomas pointed out the need for low failure rates, which Panasonic intends to provide by maintaining the relevance of its own production process and ensuring complete traceability of the failure in the event of an occurrence. He also noted the need for longer battery life, as well as the advantage of hot-swappable batteries, which can be replaced without shutting down the system.

In addition, Thomas noted that there is a need for well-readable screens in the sun for the now popular LCD technology, so that soldiers in the field can work with information. The screens of devices manufactured by the company also have operating modes in the rain and gloves, that is, they distinguish a light blow of a finger from a raindrop or touch of a pen, for example.

According to Jackson White of Getac, a manufacturer of secure devices, including laptops, tablets, handheld devices, and laptops, civilian customers typically operate their devices in stable environments. In the defense sector, on the contrary, “users move in combat space and can find themselves in the most diverse, sometimes extreme conditions that our devices must withstand.” For example, a small tablet after being worn by a soldier can be mounted on a drone or handed over to an infantryman standing behind a combat vehicle equipped with electronic warfare systems, that is, "the radio frequency stability of the devices must be at the highest level."

The military operates protected devices in a wide range of fields, from organizing storage to servicing machines and other platforms. This means that they must be easily configurable in order to "fit the special tasks of the military user." However, there is also much in common with the commercial sphere, and therefore it is possible to use some technologies developed for other industries in the defense sphere. White said Getac is actively exploring the potential of defense systems for the automotive industry.


According to Panasonic, the military has a number of special requirements, for example, for them an important characteristic is a very low failure rate


Becoming mobile


One of the main goals of military users, as well as other operators, is to improve mobility, and this seriously stimulates the development of products. For example, in the new Toughbook line, special emphasis is placed on “2 to 1” plug-in devices, which can be used as ordinary laptops or tablets, while maintaining reliability that meets various military standards.

“Panasonic is constantly striving to increase the computing power of very small devices,” said Thomas, noting that the armed forces of European countries appreciated the merits of the company's FZ-M1 tablet, which is not inferior in performance to a good laptop. Military operators want these devices to work as efficiently as “wearable data terminals, essentially making it easier for soldiers to use them at the same level of computing power.”

Although the military still requires more traditional laptop-style devices, Thomas noted that there is a clear bias towards devices such as tablets, as users want to “access the same data, but in a smaller, thinner form factor.” Users are also interested in various operating systems, but the military is increasingly looking at devices with Android OS. Panasonic recently launched two new products with this OS. These are the FZ-T1 and FZ-L1 models plus a set of Complete Android Services and Security (COMPASS) services that help military and other operators operate Android devices. “We are launching more products with the Android OS and are currently seeing the huge interest of European armies in the opportunities that Android provides.”

Umang Patel, Dell Rugged’s sales director, said, “Many countries have shown great interest in smaller, lighter devices, and the military wants them to remain as powerful and durable as they are today.” It is expected that these systems will be able to operate in extreme conditions, for example, strong vibration or extremely high and low temperatures. However, "although these limitations have been and will be, the expectations of what devices can be are definitely changing rapidly ... we must ensure that the solutions we create meet the needs of the next generation of soldiers."

There are a number of complex issues associated with product development for the military. “Starting from the level of an individual soldier, you have problems in terms of how to wear these devices,” Patel noted. “What does a soldier wearing a duffel bag with all his gear want?” Just not another heavy laptop. ” As a result, there was an increased interest in belts and straps, which make it possible to carry devices as an integral part of military equipment.

“When most people think about wearable devices, they think about watches and smart glasses and other similar things, but in difficult combat conditions, many of our customers prefer to see wearable tablets with their soldiers.”

If we take it more broadly, rather than an individual user, then “it is communication technology that allows personnel to use computer devices in the field,” Patel said. Manufacturers such as Dell have focused on how to communicate with devices through a GPS network, cellular networks, or private networks. He added that Dell focuses on improving device performance and introduces a number of innovations in the field of batteries, which in particular can increase their battery life.

Patel pointed out the problems of security and control of such devices in the field. “In many cases, their work is not just information technology — it is, for example, guarding borders or maintaining peace.” This means that mobile devices that are easy to manage and operate from the point of view of IT technology are a priority for military customers.

“They want to use their resources as competently as possible, they don’t want to spend their days and nights setting up systems and downloading patches or installing programs, for them it’s just a waste of precious time.”

Dell has five secure products in its portfolio: Latitude 7212 Rugged Extreme; “2 to 1” Latitude 7214 Rugged Extreme; and three laptops: the fully protected Latitude 7424 Rugged Extreme and the semi-secure Latitude 5420 and 5424 Rugged systems.

Although there is a tendency to develop smaller devices - which is becoming stronger every day - the need for high-level capabilities in areas such as diagnostics (ensuring that the infrastructure and systems work as expected) remains prevailing. However, it is important that smaller devices retain the ability to perform such operations.

As a result, there is growing interest in such concepts as, for example, the Internet of things. By integrating sensors into the infrastructure and reading this data from tablets and laptops, it is possible to create very powerful systems in the aggregate network, the capabilities of which far exceed the capabilities of the individual devices that make up the network. “Ultimately, the Internet of things allows for a smarter infrastructure and intelligent decision-making systems that will help transform entire mountains of data into something meaningful and useful.”

The appetite for tablets and smaller devices has become “much stronger, because even though they may not have all the communication capabilities that we had in the past, many companies are actively working on the principles of functioning of these devices - connecting with other devices, collecting data, providing analytics and intelligence to its end users or IT systems management. ”

In the past, quite often it happened that the tablet used an application that was not intended for a mobile device. “In this case, a smaller form factor device might not work correctly with the application, that is, it could interfere with its use,” White said. Nevertheless, the need to reduce the load on the soldier in order to improve his mobility remains one of the highest priorities. This means that such applications will increasingly be configured to become more tablet-friendly.

According to White, computer technology in the defense sector often comes from the world of consumers. "The pace of change can be much faster in the civilian sphere, so when introducing the latest technologies, we must be very careful ... because they can actually be another technological quirk." So Getac was thinking a lot about migrating its devices to the standard USB 3.0 ports. They very closely evaluate the latest trends in this area "in order to make sure that these specific protocols will work correctly for a long period of time before we include them in our devices."

White said the company is introducing new technologies, such as wireless charging, not only in the defense, but also in other segments of the market. Such technologies may one day be "transferred to the defense sector, since military systems require more and more energy and computing power."


According to Dell, demand for smaller, lighter devices is growing in many market segments and countries.


Secure Hardware and Software


Thomas said Panasonic is committed to maintaining a high level of security for its products and at the same time creating them as close as possible to commercial systems. This approach, for example, was implemented in the development of the CF-54 Toughbook.

This is largely due to the wishes of the ministries of defense, as soldiers request systems similar to those systems with which they dealt in civilian life. Similarly, soldier reviews encourage the development of additional devices for basic products, such as removable solid state drives.

Of course, military users can work with sensitive data. If the device needs repair or maintenance, then it is not always advisable to give removable disks along with the device on which such data is recorded, even if in encrypted form. Therefore, companies must offer the functionality of removable solid state drives and Panasonic is currently exploring the feasibility of implementing this technology in 2-in-1 plug-in devices. “The purpose of this is to give users mobility, but at the same time give them the opportunity to work with sensitive data.”

According to Patel, there are different levels of device security depending on the requirements of the task. For example, in command-type operations, where you need to use all the features, including communications, you need fully protected laptops that have the highest performance and reliability.

However, Patel noted that semi-protected devices are a kind of “gray zone” between fully protected and commercial devices, which can be useful for soldiers who need mobile devices with a certain degree of protection. They are generally more functional than traditional commercial laptops, although they will cost more "to those customers who spend millions, if not billions of dollars, of technology, equipment, infrastructure, people, training, etc. “They need to be more careful about spending the funds and resources that they have, however, semi-secure solutions can be more useful for certain tasks.”

Data and hardware protection is very important for military operators. Although this, in general, is not a direct affair of equipment manufacturers, they nevertheless often collaborate with specialists in this field who can provide similar systems and applications. Thomas said that it can be either software encryption or hardware (built into the hard drive itself), adding that although Panasonic “is an expert in encryption, which the British Ministry of Defense uses, and is fully aware of what these encryption systems should be, the reality it’s such that we do not manufacture or create our own encrypted products. ” As for hardware, the company's products are compatible with systems such as, for example, Eclypt from Viasat; She also works with software development organizations, such as the Becrypt cyber security specialist.

White said that there is a great demand for mobile devices and there is a lot of work being done among military customers to study the role of tablets in the defense sector, but there are problems regarding data protection on tablets. “A small device can be easily lost, and so it’s important to be sure that it has the right level of encryption to store sensitive data. Getac is working with several cybersecurity experts in this area. ”

Patel said that Dell is committed to cybersecurity of its products in line with current trends, with the goal of “ensuring that its devices are compatible with defense technology and innovation.” Although business units are developing their own cybersecurity offerings, Dell is not directly involved in the creation of specifications or the overall development of certain systems provided by third-party companies.

“While we are not directly involved in the development of specifications for such devices, there is no doubt that we receive feedback and information from customers and integrators and other defense partners in order to ensure that our devices are as ready as technology allows security or next-generation encryption capabilities. ”

For example, according to Patel, Dell sees the interest of military and other customers of secure devices in iris recognition and other identification solutions other than using fingerprints or smart cards.

Patel noted that the concept of unlocking a phone using fingerprint authentication has until recently been relatively little known, but in the coming years it will become the standard in phones and computers. It is especially important to understand such changes in the field of security.

“This large-scale, characteristic of a certain generation, paradigm shift in the use of devices is absolutely important thing, the level of security that we put in our systems must meet modern challenges. And the name of this game is simple - to stay one step ahead of the enemy. ”

In war as in war. Development of secure computers and programs

Getac manufactures secure devices, including F110 (pictured)


Technological change


Dell has teamed up with the Rugged Mobility and Precision Workstation divisions into one group, partly to reinforce the combined focus on developing more intelligent systems, including areas such as augmented reality (adding imaginary objects to the images of real-world objects, usually of an auxiliary informative nature ) In addition, Patel said that military and other customers of protected products are paying more and more attention to the development of machine learning and advanced artificial intelligence systems, “as a result, we see systems on the horizon that can automatically detect malfunctions and self-repair and adjust in the field fly. " A lot of this technology is built into the hardware itself, for example, SSDs are already able to detect read / write failures and isolate errors in order to prevent data loss.

“These very smart, almost neural networks (the main element of machine learning) are evolving. We see applications that cover everything from basic system reliability to monitoring external conditions, collecting data and providing advanced analytics to a person behind a terminal looking for the best solutions. ”

Patel expects this to become a defining trend in secure systems over the next decade. As the systems become more powerful and more and more closely connected, more information will be processed and analyzed on the fly, and the decision will be made at the machine level "even before the operator has a chance to settle what is happening."

Thomas said that most likely more emphasis will be placed on mobility, the transition from tablet technology to wearable systems that a soldier can wear at the forefront in order to “gain access to critical data if necessary, without burdening himself with a laptop or tablet-style device ".

Panasonic spent last year exploring various options for investing in such solutions on an initiative basis and in collaboration with other companies; this process takes place both at its Japanese headquarters and in Europe and other units. "The goal is simple - to come up with some projects that, in our opinion, will offer military customers what they requested from us some time ago."

Panasonic's new wearable systems should be based on Android technology, but the company also wants to introduce some of its existing Windows-based technologies. She works with military customers to figure out which new wearable technology systems should be designed and how they will interact with other equipment that soldiers use, such as tactical programmable radio stations that automatically connect to various devices.

Much needs to be considered and decided, it is necessary to develop technologies together with various organizations, involving everyone from the parent enterprises to the armed forces and their own development teams. Thomas said that Panasonic will release a number of wearable solutions in the near future.

White predicts a significant development of wireless technology in the coming years. Getac is in the early stages of exploring several technologies, especially wireless charging, in which the company invests "big money." He also sees customer support as an obvious and growing trend, and so Getac is developing built-in mobile device management that enables customers to track and route predicted device malfunctions or problems to the monitoring system. “We have already tested these opportunities in the civilian sphere and are currently thinking about how we can integrate this into the defense sphere.”

Protected laptops and other computer devices are currently an important tool of the armed forces, which must combine commercial trends with the security and reliability necessary for the military. This applies to hardware and software, as well as operating systems. Given the speed of developing commercial devices and the growing demand for wearable systems, in the coming years, manufacturers will most likely be forced to reckon with new realities, directing a lot of efforts to meeting the needs of the military.
46 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. -6
    27 September 2019 18: 07
    Wearable laptops / tablets with displays - yesterday in the military. Now they rule the processor modules with augmented reality glasses.
    1. +2
      27 September 2019 18: 35
      Secure computers are a vital tool for soldiers.
      laughed .... aha, "Kalashmat" is what is vital for a soldier.
      1. -2
        27 September 2019 18: 54
        Quote: Dead Day
        Secure computers are a vital tool for soldiers.
        laughed ...... aha, "kalashmat" is what is vital for a soldier.

        "a soldier with a machine gun sitting in the bushes" VS "soldier with glasses-art target designators sitting in the bushes" well, and against them is a column of armored vehicles. Let you be the first soldier with a machine gun, and I'll see how long you laugh ...
        1. +2
          27 September 2019 20: 55
          Quote: ProkletyiPirat
          soldier with spectacle-designator glasses sitting in the bushes


          electromagnetic radiation and we have a completely defenseless civilian with a bunch of useless non-working gadgets in his pocket. And a soldier with a gun there will remain a soldier.
          1. -2
            27 September 2019 22: 12
            Quote: lopvlad
            electromagnetic radiation

            exactly, exactly, I’m directly seeing how American troops use electromagnetic bombs over their own convoys when attacking Iraq. but the main thing is different, and who told you that the glasses will work all the time and not only at the time of reconnaissance and target designation?
            1. 0
              28 September 2019 18: 36
              Quote: ProkletyiPirat
              electromagnetic attacks use Iraq bombs


              had Iraq at that time so many electronics against which electromagnetic bombs were effective, then the Americans would have covered Iraqi territory with them like snow covers the earth.
              It’s like with drones, while they were rare and piece goods, no one bothered to develop weapons to destroy them, and now even Indian gypsies rivet weapons against them.

              Quote: ProkletyiPirat
              and who told you that the glasses will work all the time and not just at the time of reconnaissance and target designation?


              and who told you stupidity that in order for an electronic device to fail from exposure to electromagnetic radiation, it must be turned on?
          2. +5
            28 September 2019 08: 38
            These are all big words.
            And since the days of the USSR, artillery officers began to buy programmable calculators. For my own money ... As soon as there was a PMK with a "cold" memory.
            1. 0
              28 September 2019 16: 48
              As the battalion commander used to say to young advanced officers, LENTYAI! Weak to remember the table? Nefig you calculator. And if a vigorous explosion and EMP? But what they bought is true!
              1. +4
                28 September 2019 17: 19
                Quote: dgonni
                As the battalion commander used to say to young advanced officers, LENTYAI! Weak to remember the table?

                Weakly. For example, for 2C19 this is a fist-thick volume.
                1. 0
                  28 September 2019 17: 54
                  And who argues that? But after afghan on clove he could read it in a state of grog. The only one was.
      2. 0
        27 September 2019 20: 21
        No tablet can replace a smart head, and a small group of scouts behind enemy lines is unlikely to rely on all these gadgets for a long time, due to, for example, the possibility of recharging them. Yes, and when a soldier exhausted will have a choice, what is better to keep, a laptop or the remnants of ammunition and nutrition for his own stomach, I think he will choose the latter.
        1. maw
          +1
          27 September 2019 21: 22
          I agree completely! As you remember the first Chechen and R-159 with "Historian" behind you, you shudder. After a couple of kilometers in the mountains, I just wanted to run it down the slope. Then "Viola" appeared, with which it went over the mountain and that's it, communication only with flags and messengers. what
          1. -1
            27 September 2019 22: 15
            I was thinking. First of all, the satellite constellation will be destroyed. Rockets are not going to be very smart. Where will the warheads go, say "Satan" wassat
            1. +4
              27 September 2019 23: 50
              And missiles do not really need satellite constellation for guidance. Cruise missiles - inertial + grater, and ballistic. - Inertia + astronavigation.

              Surrounded by a stockade of missiles and the army is not needed. Why tanks, planes and ships, when it is possible to launch ICBMs immediately in case of any conflict or shooting. Skirmish at the border? Terrorists seized a building in the city? To all one answer - we launch ICBMs.
              But, fortunately, nuclear weapons were used only 2 times at the very dawn of their appearance. And then why didn’t they come up with nuclear warheads, and they gather dust in the warehouse and let them never be used once. So all these Pribluda are quite useful things for the soldiers.
        2. 0
          28 September 2019 11: 23
          Yeah! and what is more important at night - batteries for heat or cartridges?
          1. +1
            28 September 2019 15: 16
            Contrasting batteries with ammunition is the same as contrasting the latter with a solder or, for example, diesel fuel for tanks and infantry fighting vehicles laughing
        3. +1
          28 September 2019 16: 51
          Smart will keep in touch! For the only option is to go to the evacuation point. And if you run with a full gallop, then BC is not enough a priori.
          P.S. Take a look at what the delta used in Iraq in terms of communications with the command. Very unpleasant discoveries await you!
          1. +2
            28 September 2019 17: 06
            Carbotitanate batteries are currently in control, plus the power consumption of electronic equipment is decreasing every year due to the miniaturization of the component base.

            On the other hand, Rosatom promises to resolve the issue of power supply for the special forces, and then for the infantry, forever - by deploying in Zhelezogorsk the production of radioisotope nickel-63 batteries with a capacity of 50-60 years.
            1. 0
              29 September 2019 10: 13
              Rosatom promises to resolve the issue of power supply for special forces

              With promises of different ..... characters, we're doing well. Since Soviet times ..... Not very well with implementation .... Even if you use open data. Therefore, with all due respect to Rosatom, the next twenty years will have to be erected with what we have. And there everything is ... not very fun. Especially when you consider that wars are won not by special forces, but by a vulgar mahra. With all due respect to the specialists, there are too few of them, and they are given tasks ...
      3. -2
        28 September 2019 11: 55
        With a bayonet or a demon? I think on the new "koloshmat" it is necessary to return the bayonet-knife (for the anniversary - 70 years in the ranks)! Is it possible to win with a tablet in hand-to-hand combat (or on a tablet, make the edges like a sapper shovel and a handle smile that would be attached to the side, digging digs). When was the last time you saw a respected soldier alive? I just can’t understand how can I use a Kalashnikov assault rifle without boots and footcloths? what (Dedicated to witnesses of the OUM-senrike sect "Koloshmat"!)
    2. +1
      27 September 2019 22: 59
      Quote: Operator
      Wearable laptops / tablets with displays - yesterday in the military. Now they rule the processor modules with augmented reality glasses.


      At the very beginning of the development of one of our products, we were forced to work with an eye monitor. I still remember with horror. I could not read anything for one hour.
      1. 0
        28 September 2019 15: 27
        In the performance of Microsoft augmented reality glasses look like ski

        https://youtu.be/IQQhPUKljLc

        Apple promises to release augmented reality glasses in the usual dimensions.
  2. +4
    27 September 2019 18: 11
    Only then can a country talk about security when it does everything from A to Z. It had to do with communications in the army. Moreover, something adapted for the war-did not see.
    1. +1
      27 September 2019 18: 36
      Quote: zenion
      Only then can a country talk about security when it does everything from A to Z. It had to do with communications in the army. Moreover, something adapted for the war-did not see.

      from the "gut"? drinks yes ... saw your brother with coils ...
    2. +2
      27 September 2019 18: 50
      Only then can a country talk about security when it itself does everything from A to Z.
      moreover, she herself does not somehow and anyhow, but high-quality and modern products, otherwise it is better to buy from those who can do more than just words.
    3. +2
      27 September 2019 20: 54
      The Ukrainian military is widely using tablets with artillery programs in the Donbass ...
      Plus, drones do not fly on their own.
  3. +4
    27 September 2019 18: 28
    The only computer that is not susceptible to viruses, electromagnetic impulse or even a beer / coffee mug on the keyboard. If necessary, you can fight off oncoming wolves. good
    1. +4
      27 September 2019 19: 22
      Quote: Amateur
      The only computer that is not susceptible to viruses, electromagnetic impulse or even a beer / coffee mug on the keyboard. If necessary, you can fight off oncoming wolves. good
      I was on this "calculator", I also rode with my brother ... my grandfather laughed, grandma swore ... feel
      1. 0
        27 September 2019 20: 58
        There is also a Felix adding machine with a curved starter on the side. It, if necessary, can be used as a weapon of shock-crushing action.
  4. -1
    27 September 2019 18: 49
    Quote: Dead Day
    "Kalashmat" is what is vital for a soldier

    native laughing
  5. +4
    27 September 2019 19: 08

    The first "portable" military computer MOBIDIC, USA, 1959.
    1. -2
      27 September 2019 19: 25
      Quote: Undecim

      The first "portable" military computer MOBIDIC, USA, 1959.

      business then ... while they were building the "white whale", half of the continent became ours ... however, they handed over for free, but that's another story.
      1. 0
        27 September 2019 23: 52
        Well, apparently it was not in vain built.
    2. +4
      27 September 2019 19: 56

      And this is the D17B on-board computer of the Minuteman I rocket, 1961. 1521 transistor, 6 diodes, 282 capacitors and 1116 resistors, weight 504 kg, MTBF - 32 years.
  6. 0
    27 September 2019 19: 20
    it is strange that the author did not mention anything about domestic secure systems and hardware
    1. 0
      28 September 2019 16: 03
      Unfortunately there is nothing to mention! In the sense that there are no domestic systems (I mean hardware, the situation with software is much better) 100% made in the Russian Federation and in the current state of affairs are unlikely to be. Sadness.
  7. +2
    27 September 2019 21: 25
    Good overview of Panasonik products. It's sad that we are far from leaders in this area, both in hardware and software
  8. -2
    27 September 2019 22: 42
    Quote: Rostislav
    Good review


    A good review, a little lower, about the current bespectacled homeworkers fell in love with the Khokhlyat program for art. howitzer D 30:

    "Russian hackers from the Fancy Bear group are involved in the hacking of the application that Ukrainian artillerymen use for their calculations," CrowdStrike analysts said in a report.
    Experts have found a tab for remote access X-Agent, which was previously used by Fancy Bear, in a package for smartphones and tablets on Android called "Popr-D30.apk" .... According to independent experts, over the past three years, the Ukrainian army has lost 80 percent of their D-30 howitzers. This is the largest share of casualties among all types of equipment and artillery. "


    https://meduza.io/news/2016/12/22/rossiyskih-hakerov-fancy-bear-zapodozrili-vo-vzlome-ukrainskogo-prilozheniya-dlya-artilleriyskih-raschetov


    This is informative:

    "Russian hackers" don't share code
    http://www.compromat.ru/page_40630.htm
  9. +1
    28 September 2019 09: 06
    Article solid water
  10. +1
    28 September 2019 16: 59
    Respect to the author! BUT causes strained one wild feeling that the fashion for such protected devices is advancing! 90% of the devices cited in the article are not essentially purely army models. Yes, they can be used with rear flights and require stability but not frontline. What is being produced for the line units conducting combat operations has completely its own software and completely different communication protocols. And it is based on military-grade circuitry. And yet, yes, it is really indestructible in wacky situations. But the attempt to adapt it to civilian exploitation has never brought success even to fans. For everything is different there starting from BIOS and most of the information exchange protocols. On the other hand, if you are a cool specialist, ento is not a problem, you can sit over the codes and still push Windows. Only the performance of this device will greatly surprise you. It is not intended for corel and other animation. And to other modern jokes also not much. But the mainstream wants a military and protected. The manufacturer will make you vulgar on the 10th Windows for a price 3-5 times more expensive, but then your choice.
  11. -3
    29 September 2019 16: 08
    Quote: frog
    war does not win special forces

    Yes, yes - it’s special forces who win local wars (see Syria).
    1. 0
      29 September 2019 16: 39
      Quote: Operator
      Quote: frog
      war does not win special forces

      Yes, yes - it’s special forces who win local wars (see Syria).

      without aviation zero.
      1. 0
        29 September 2019 17: 35
        This article and comments are only about equipping the ground forces.

        And so yes - there is a VKS with the Navy and Strategic Missile Forces in addition laughing
  12. 0
    29 September 2019 19: 37
    I had a chance to hold the Getak-ovsky laptop (X500) in my hands (in passing I went to the pawnshop, to look that there is something suitable from the electronics, sometimes you can catch useful things with a guarantee).
    The PRICE has killed £ 3600 !!!
    And it is used!
    But by civil standards, the average, iron.
  13. 0
    12 October 2019 16: 41
    It is very important for us to create a UNIFIED SOFTWARE PLATFORM for the military:
    - A family of specialized (highly reliable, secure) operating systems for servers, computers, wearable devices. Including real-time operating systems (RTOS / RTOS) for the management of mission-critical systems. Portable to desktop / server processors and for "embedded" solutions based on microcontrollers, FPGAs.
    - Training tools for the operator’s personnel on the same software platform as the systems themselves.
    - Development tools (expandable libraries, software verification tools, etc.)
    - Based on flexible architecture (using unified data buses, plug-ins with hot plugs).
    - A universal "canvas" language, on top of which programmers can easily create highly specialized problem-oriented programming languages ​​(domain specific language, DSL), which allow covering all the "bounded contexts" of a particular "subject area" (in the terminology of the Domain Driven software development methodology Design, DDD) and "transparently" (briefly, clearly, clearly) describe the behavior of the corresponding subject areas. In this case, the DSL code is automatically translated by the programming system into commands in the universal language.
    This approach was successfully implemented in the development of software for the MTKS "Energia-Buran" system. Then programmers, faced with such a wave of requests for changes (Change Request, CR) in the logic of the control software of various subsystems from engineers (engine engineers, cryogenic engineers, electricians, "managers", specialists in life support systems, etc.) that they realized that it was easier for them to create and maintain a very compact and reliable BASE PROGRAMMING SYSTEM. On top of which, development engineers / implementers / technologists, non-programmers ("programmers-technologists") will be able to write programs themselves in terms of THEIR subject area, to quickly debug and change the behavior of their systems. Than programmers themselves endlessly edit the code in a universal language, producing "patches and crutches". Experiencing Huge difficulties due to programmers' ignorance of the details of each specific subject area in need of automation. See "Buran" and the DRAGON programming language, https://old.computerra.ru/readitorial/418507/).
    In a number of cases, technological algorithms were introduced by "programmers-technologists" immediately in the form of tables, diagrams, so-called. "dragon-schema" (see https://drakon.su/; "The visual language DRAGON and its application in the rocket and space industry, medicine and other fields. Video report by V. Parondzhanov", https://habrahabr.ru/ post / 180709 /).
    The same approach is incorporated in the GOST family of control software for NPPs (for example: GOST IEC R 60880-2010, GOST R IEC 61508-3-2012). The nuclear power industry understands very well the cost of errors and the cost of long-term software development during the commissioning of such complex and heterogeneous systems as nuclear power plants. These GOSTs directly state that to describe a very complex, diverse and changeable logic of the application area, over universal languages ​​(such as Ada, C / C ++ / Qt, Java, Python, etc.), one should give preference to "languages ​​with limited variability" , "problem-oriented languages" (DSL). Which allow you to program in terms of a given application area, in the most "protected mode" (with automatic control of invalid structures and parameters).
    As much as possible reducing the distance of understanding between technological engineers and software programmers.
    Unification of system, application and service software, common principles for introducing technological algorithms will allow:
    - Reduce the number of failures and accidents caused by software
    - Reduce the time for configuration and commissioning of systems,
    - Facilitate long-term operation and modernization,
    - Standardize software development for all areas of application (Army, Navy, VKS) and application contexts (planning and management of operations; management and monitoring of systems: energy, life support, combat, information, logistics, etc.),
    - Standardize the training of specialist operators (using universal programmable training systems)
    - Radically reduce costs at all stages.
    This can be of great help, the already noted methodology for software development Domain Driven Design, DDD.
    Which, in fact, is a reflection of the general principles of Systems Engineering for the development of implementation and operation of software. Namely, System Engineering methodologically ensured a leap in the effectiveness of creating complex, large-scale technical systems in the world in the last 30-40 years.
    Also, the role of corresponding industry specifications (MIL-SPEC) for hardware and software is very important.
  14. 0
    17 November 2019 11: 06
    Continuing the theme, of course, is extremely important. computer unification, input and display means. Here is an example from an informative publication: "Andrey Terekhov:" You can say as much as you like that American is better, but our car never breaks down "", https://habr.com/ru/company/dataart/blog/468073/
    In 1984, Moscow hosted the exhibition "Computers in the Soviet Army". I naturally came. More than 200 types of computers were presented there, not counting small splashes. And what is 200 computers? These are 200 operating systems, 200 sets of spare parts and accessories - spare parts and devices. In other words, squandering. In America, then there was one standard defense vehicle - Interdata 8/32. One! And one base language is Ada. And the rich Soviet Union has 200 cars, and try to object to someone. I spoke several times in the defense department of the CPSU Central Committee in Moscow: “Let's make one car.” “Andrey, do not go in,” they answered me politely, but firmly.
    There was "Armor" - the base telephone exchange of the Soviet Army. It has three different cars. One for switching, another for managing the network, and a third for working with the operator. With different command systems, with different operating systems, three sets of officers need to be served. A thousand rooms are just a little station! Three computers - where does it fit? And when I tried to curse, they again told me: do not go in.

    About "rich USSR" sounds like bitter sarcasm. And Russia, in conditions of a budget deficit and the absence of those opportunities that were in the USSR (there was no independent civil IT industry, it was impossible to leave to work in another country - like it or not, people were harnessed to the military-industrial complex) should save.
    And another quote:
    Painful memories, and most disgusting, we worked on smelly war machines. UK1010, SUVK SS, SUVK SM. The Neva made in Kiev is the most disgusting. All of them withstood shaking, drying, surges. Good iron only for them it was impossible to program.
    Here is the Neva, for example. For her, it’s impossible to program with her hands, but you’ll die completely. We made 15-20 cross-translators - it was an element of our technology to get away from these military vehicles. We work on an EC computer, then overload with a cross-translator into the code of another machine, go to it. This, too, was the great advancement we made.

    It may be said too emotionally, Terekhov is very subjective, his words need to be taken critically, but nevertheless, this is what I wrote about unified programming system... I personally know people who in other research institutes of the USSR did the same work (!) - wrote their own cross-translators for this whole "zoo"! Now imagine the size of the disaster on the scale of the entire USSR (departments, research institutes and design bureaus, separated by secrecy - the duplication of work is monstrous). This is to the regular objections that the USSR was an effective owner - no, it was not.

    Continuation of the article: Andrey Terekhov (continuation): "When they say that we are behind the Americans forever, I answer:" You will not wait! "", Https://habr.com/ru/company/dataart/blog/470017/