WHO WE ARE.
The Information Warfare Research Project (IWRP) Consortium uses an Other Transaction Agreement (OTA) collaboration to engage industry and academia to develop and mature technologies in the field of information warfare that enhance Navy and Marine Corps mission effectiveness. Join the IWRP Consortium to access business and research opportunities focused on advancing information warfare research projects.
WHAT WE DO.
IWRP Consortium engages industry and academia to develop and mature technologies in the field of Information Warfare that enhance Navy and Marine Corps mission effectiveness, focusing on underlying technologies that advance information warfare capabilities through a consortium that can support research, development and prototyping.
Specific technology focus areas include:
Defensive and offensive technologies used to operate, configure, control, secure, maintain and restore the infrastructures and resident data, including Internet Protocol (IP) networks, radio frequency (RF) networks, computer systems, embedded processors and controllers, process, and physical systems
Technologies and technical processes enabling and enhancing the reliability, assurance, integration, interoperability, delivery, value of data and information assets. Data may be derived from diverse verticals (Combat, Intelligence, Surveillance & Reconnaissance (ISR), Electromagnetic Maneuver Warfare (EMW), Cyber, etc.) includes specialized technology capabilities that capture, ingest, persist, analyze, and visualize data and help our customers perceive, visualize, and make decisions about their environment
Technologies providing robust, protected, resilient, and reliable information infrastructure undergirding the Navy’s overall information environment and allowing uninterrupted worldwide communication between deployed units and forces ashore. Technologies will include application in multiple transmission spectrums, including RF, millimeter wave, optical; networking technologies such as application awareness, resilient routing, and attack tolerance
On-demand self-service, broad network access, resource pooling, rapid elasticity, measured service, software as a service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS); Private Cloud, Community Cloud, Public Cloud, Hybrid Cloud
Collection of computer programs with common business applications, tools for modeling, and development tools for building organization unique applications focused on solving enterprise-wide problems to improve the enterprise’s productivity and efficiency
Capability to fully employ integrated information in warfare by expanding the use of advanced electronic warfare and offensive cyber effects to complement existing and planned air, surface and subsurface kinetic weapons.
Defensive and offensive technologies used to operate, configure, control, secure, maintain and restore the infrastructures and resident data, including Internet Protocol (IP) networks, radio frequency (RF) networks, computer systems, embedded processors and controllers, process, and physical systems.
DevSecOps is the union of people, process, and products to enable continuous delivery of value to end-users. The contraction of “Dev” “Sec” and “Ops” refers to replacing siloed Development, Security and Operations to create multidisciplinary teams that now collaborate with shared and efficient practices and tools. Essential DevOps practices include agile planning, continuous integration, continuous delivery, and monitoring of applications.
Techniques applicable to systems, incorporating assistants and decision support systems implemented through artificial intelligence and machine learning enabling them to adapt their actions to changes in their mission and operating environment without the intervention of a human operator
Includes the wireless technology and infrastructure to connect and authenticate to the enterprise while enforcing enterprise specific security policies on mobile devices to access to enterprise data
Technologies used to support the development, management, and application of virtual constructs of varying fidelity across the spectrum of systems engineering activities; including operational capability functions, system requirements, design, analysis, verification, validation, operations, and maintenance activities
Additive and/or Traditional manufacturing methods such as Stereo Lithography (SLA), Selective Laser Sintering (SLS), Direct Metal Printing (DMP), Color Jet Printing (CJP), Fused Deposition Modeling (FDM), and 3D Additive Manufacturing (AM)
Capability to exercise authority and direction when access to and use of critical information, systems and services are denied, degraded or exploited. AC2 is enabled by essential network and data link services across secured segments of the electromagnetic spectrum to transport, share, store, protect and disseminate critical mission/combat information
Technologies that aid in the creation of computational tools that can perform tasks traditionally accomplished through human cognition. These tasks include such disparate applications as interpreting visual data, transcribing or translating spoken language, predicting behavior (including human behavior), and recommending courses of action to achieve specific goals. Including technologies that support machine learning methods that can be used to automatically construct models from data.
Practices and techniques to understand user goals, tasks, task triggers, task workflows, and information requirements in order to design user interfaces to improve overall systems performance and reduce training. Processes begin with user context research, knowledge elicitation, workflow descriptions, crude sketches and prototypes (in Sketch, Axure, Figma) and more advanced prototypes with usability testing. Principles of perception and cognition are applied to avoid confusion, overload and stress, and achieve situation awareness and proactive activities.