Feeds

US Army to issue Droid dev kit in July

Battle-smartphones go to war in 2013

Beginner's guide to SSL certificates

The US Army has announced that it will soon throw open an Android dev kit allowing apps to be written for use by soldiers on a variety of combat handsets and devices.

The military Droid framework is known as Mobile/Handheld Computing Environment (CE).

"Using the Mobile /Handheld CE Product Developers Kit, we're going to allow the third-party developers to actually develop capabilities that aren't stovepiped," says Lt-Col Mark Daniels. Daniels is in charge of the Joint Battle Command-Platform (JBC-P) handheld device, which is essentially a military Droid phone: it is expected to be issued to US Army and Marine ground units from 2013.

The colonel says that the mobile/handheld CE dev kit will be released in July. Before that point the Army will develop certain core apps that will come with every handset, to include mapping, so-called Blue Force Tracking (displaying where friendly units are in order to avoid "friendly fire" incidents), TIGR map-marking and messaging. According to Daniels there will also be an address book and OpenOffice for document viewing.

"It's like when you get an iPhone and you have the Apple-made apps: the contacts, the email," says J Tyler Barton, Army app engineer. "Then other applications are free to use those apps, or to go above and beyond that."

The base software is being designed to run on a variety of different Android variants. As to hardware, the JBC-P may be either an existing government off-the-shelf unit or possibly a commercial off-the-shelf buy. It will have a "ruggedised tactical sleeve or case".

Networking will be provided by any of a variety of existing military radios: specifically named are the Joint Tactical Radio System, JTRS Soldier Radio Waveform, Netted Iridium, and the PRC 117G and PRC 152A used by the Marines. The system and its baseline apps are expected to tie in with existing vehicle-mounted and headquarters kit provided under previous command-and-control/blue-force-tracking projects,

"That's going to allow us to be interoperable across the entire family of systems, which would include the platforms, the aviation, the logistics community, the tanks, the Bradleys, the handhelds," Daniels says. ®

Remote control for virtualized desktops

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.