Feeds

DARPA to build military App Store, battlefield 3G

Android wins war for battle phones, iPhone and MS lose

Website security in corporate America

We at the Reg suggested this years ago. Keep up, DARPA, for goodness' sake.

DARPA would also like to hear from people with ideas on middleware for the apps and from those who can help it set up the "marketplace". However if you want to run the marketplace you can't also be an app developer:

An organization that is proposing to implement an apps store will be expected to maintain full fairness and impartiality, and hence are strongly discouraged from developing apps.

On the matter of security, the Pentagon tech chiefs don't seem to want to get bogged down in trying to comply with military protection standards - they're no doubt aware how this tends to cripple and/or slow down a project. They say:

Attention must be given to the software modifications required to address key security vulnerabilities in commercial devices and wireless networks. If hardware modifications are recommended, a justification must be clearly articulated and the approach must be consistent with the program goal of affordable per-unit cost and rapid execution. The Transformative Apps program will primarily focus on the use of apps in unclassified environments and networks.

They aren't kidding about "rapid execution", either, at any rate in a government/military sense. They want to see "very aggressive" proposal schedules, with proof-of-concept demonstrations up and running in 6 months and improvements, final polish etc delivered thereafter.

Full details on the project for those interested in participating - whether as app developer, marketplace manager or pack-up-and-go network provider - are available here in pdf.

Comment

We would just like to mention that we suggested a scheme along these lines three years ago, as an alternative to the ludicrously expensive and slow-to-appear UK Ministry of Defence FIST (Future Integrated Soldier Technology) digi-trooper plans. Nice to see DARPA keeping up.

One does also note that even the MoD has lately been forced to plug in some ordinary commercial networking gear in Afghanistan, replacing expensive and not-very-good military kit which is now back in the UK. ®

Internet Security Threat Report 2014

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
ISPs' post-net-neutrality world is built on 'bribes' says Tim Berners-Lee
Father of the worldwide web is extremely peeved over pay-per-packet-type plans
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Turnbull: NBN won't turn your town into Silicon Valley
'People have been brainwashed to believe that their world will be changed forever if they get FTTP'
Google+ GOING, GOING ... ? Newbie Gmailers no longer forced into mandatory ID slurp
Mountain View distances itself from lame 'network thingy'
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.