Ad
related to: does the dod use aws software or application programs
Search results
Results From The WOW.Com Content Network
The Joint Enterprise Defense Infrastructure (JEDI) contract was a large United States Department of Defense cloud computing contract which has been reported as being worth $10 billion [1] [2] over ten years. JEDI was meant to be a commercial off-the-shelf (COTS) implementation of existing technology, while providing economies of scale to DoD.
Host Based Security System (HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems.
The charter of CREATE is to reduce the cost, time, and risks of DoD acquisition programs by developing and deploying multidisciplinary, physics-based software applications for the design and analysis of military aircraft, naval ships, and radio frequency antenna systems (expanded to include ground vehicles in 2012) by DoD engineering organizations.
The FOSS report began in early 2002 as a request relayed to Terry Bollinger of The MITRE Corporation to collect data on how FOSS was being used in U.S. DoD systems. The driver for the request was an ongoing debate within the U.S. DoD about whether to ban the use of FOSS in its systems, and in particular whether to ban GNU General Public License (GPL) software.
The FACE effort sprang from US Navy open architecture programs, [2] promoted by the US Naval Air Systems Command (NAVAIR), to enhance interoperability and software portability for avionics software applications across DoD aviation platforms. Both the US Army and US Air Force have been participating in the consortium.
Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment.
eMASS is a service-oriented computer application that supports Information Assurance (IA) program management and automates the Risk Management Framework (RMF). [1] The purpose of eMASS is to help the DoD to maintain IA situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA 2002) and the Federal Information Security Modernization Act (FISMA ...
The Department of Defense Information Enterprise is defined as the DoD information resources, assets, and processes required to achieve an information advantage and share information across the Department of Defense and with mission partners. [citation needed] It includes: [4]