Feeds

MoD in £270m splurge on extra HQ computer terminals

Heads into the 'Above Secret environment'

Application security programs and practises

The UK MoD has added a further 3,300 network terminals to its massive Defence Information Infrastructure (Future) - or DII(F) - project*. These new machines will be specifically intended for command of military operations from frontline headquarters nodes.

Under DII(F) the MoD has a £2.3bn contract with a consortium of companies - dubbed ATLAS - including EDS (as Prime Contractor), Fujitsu, EADS, General Dynamics, and LogicaCMG. ATLAS has now delivered over 10,000 UADs (user access devices) in total, and the MoD says "the programme has now moved into a phase of high volume roll-out... Ultimately, it will provide around 300,000 user accounts on approximately 150,000 terminals across about 2,000 MoD sites worldwide".

The initial Increment 1 of DII(F) was mainly intended to handle ordinary information classed not higher than Secret at fixed locations. Increment 2, now coming through the pipeline, is for deployed locations and "services to the Above Secret environment".

(For a quick digest of UK military secrecy classifications, see here.)

The MoD announced this week that the DII(F) contract has just been amended to incorporate a £270m "2b" increment for the delivery of a further 3,300 terminals, of which 1,900 will be deployable to headquarters on the ground and on board Royal Navy ships. This works out at almost £82,000 per machine, though of course this figure includes integration, networking, security etc etc.

Bob Quick, the MoD's project manager, said: "This is a first step in enhancing deployable capability to forces deployed to theatres such as Iraq and Afghanistan."

The extra machines will replace various older bits of kit which "are approaching obsolescence and have been identified as a risk to successful operations". ®

*Presumably at some point to become DII(Present) and then perhaps DII(Past).

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.