Advanced Field Artillery Targeting Data System |
AFATDS |
The Advanced Field Artillery Tactical Data System (AFATDS) is the Fire Support Command and Control (C2) system employed by the U.S. Army and U.S. Marine Corps units to provide automated support for planning, coordinating, controlling and executing fires and effects. AFATDS prioritizes targets received from various sensors and performs attack analysis using situational data combined with commander's guidance. The result is timely, accurate and coordinated fire support options to engage targets using Army, Marine, Navy and Air Force weapon systems. The system provides complete flexibility to manage attacks on preplanned and time-sensitive targets. AFATDS supports weapon systems such as mortars, field artillery cannons, rockets, close air support, attack helicopters, and Naval Surface Fire Support (NSFS) systems. AFATDS also acts as a fire support ""server"" to LAN-based and Tactical Internet-based clients, including the AFATDS Effects Management Tool (EMT), and the USMC Command and Control Personal Computer (C2PC) EMT. AFATDS is used in all U.S. Army echelons from weapons platoon to corps and in the Marine Corps from firing battery to Marine Expeditionary Forces. AFATDS is installed aboard the U.S. Navy LHA/LHD Class big deck amphibious ships to support Expeditionary Strike Groups (ESGs) for amphibious operations |
4 |
Army Battle Command Systems |
ABCS |
The Army Battle Command System (ABCS) is a digital Command, Control, Communications, Computers and Intelligence (C4I) system for the US Army. It includes a mix of fixed/semi-fixed and mobile networks. It is also designed for interoperability with US and Coalition C4I systems. |
4 |
Anti Jam |
AJ |
Used or intended to inhibit or prevent electronic jamming |
2 |
Adaptive Networking Wideband Waveform |
ANW2 |
"The ANW2 provides a data link between the TOC and vehicles, with up to 30 radios in a subnet. It provides simultaneous IP data and voice with integral situational awareness. ANW2 is a self-healing, robust, IP-driven waveform that maximizes redundancy and limits single point failures and networks" |
4 |
Army National Guard |
ARNG |
The Army National Guard (ARNG), in conjunction with the Air National Guard, is a militia force and a federal military reserve force of the United States. They are simultaneously part of two different organizations, the Army National Guard of the several states, territories and the District of Columbia (also referred to as the Militia of the United States), and the Army National Guard of the United States. The Army National Guard is divided into subordinate units stationed in each of the 50 states, three territories, and the District of Columbia, and operates under their respective governors. |
2 |
At the Halt |
ATH |
Not in motion |
2 |
Brigade Combat Team |
BCT |
The brigade combat team (BCT) is the basic deployable unit of maneuver in the US Army. A brigade combat team consists of one combat arms branch maneuver brigade, and its assigned support and fire units. "The Brigade is normally commanded by a Colonel (O-6) although in some cases a Brigadier General (O-7) may assume command." A brigade combat team contains combat support and combat service support units necessary to sustain its operations away from its parent division. BCTs contain organic artillery support, formerly received from the division artillery (DIVARTY). |
2 |
Battlefield Surveillance Brigade |
BfSB |
"The battlefield surveillance brigade (BfSB) was a United States Army surveillance/reconnaissance formation introduced from 2006–2015. The United States Army planned for the creation and transformation of nine intelligence brigades to a 'battlefield surveillance' role in 2007. The first battlefield surveillance brigade was deployed the same year conducting Surveillance, Reconnaissance and Intelligence operations. However, gathering information is only a part of the challenge it faces. Along with the structural changes and intelligence capabilities, the sustainment capabilities of the brigade also changed. The United States Army is currently reorganizing these BfSB formations into expeditionary military intelligence brigades. These brigades were designed to be self-sufficient Army modular forces." |
2 |
Beyond Line of Sight |
BLOS |
Beyond Line-Of-Sight (BLOS) is a related term often used in the military to describe radio communications capabilities that link personnel or systems too distant or too fully obscured by terrain for LOS communications. |
2 |
Command and Control |
C2 |
Command and Control (C2) systems enable information superiority on the battlefield. They provide the commander with the information to make effective decisions and they provide the warfighter the capability to access the information necessary to complete their mission. |
2 |
Command and Control Registry |
C2R |
The Command and Control Registry (C2R) is the Address Book used by today's Army. It dynamically coordinates and collaborates command and control naming, addressing, network and operations data across many different types of military systems deployed globally. It is utilized by our Army's systems as the on-line repository for addressing information such as email addresses, military addresses and network information |
4 |
Command Control Communications Tactical |
C3T |
Program Executive Office Command, Control, Communications-Tactical (PEO C3T) develops, acquires, fields and supports the Army’s tactical network, a critical priority that brings information dominance to current and future Soldiers. The mobile tactical network delivered by PEO C3T provides capability giving commanders a resilient, redundant, easy-to-use and mobile interoperable tactical network. |
2 |
Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance |
C4ISR |
The Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance Evaluation Directorate (C4ISRED) focuses on systems in the areas of mission command and integration, network, information and enterprise, databases and software, Intelligence, Surveillance and Reconnaissance, and intelligence electronic warfare. |
2 |
Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance. |
C5ISR |
C4ISR has recently changed to C5ISR. C5ISR stands for Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance. |
1 |
Change Advisory Board |
CAB |
(ITIL Service Transition) A group of people that support the assessment, prioritization, authorization and scheduling of changes. A change advisory board is usually made up of representatives from: all areas within the IT service provider; the business; and third parties such as suppliers. |
2 |
Combat Aviation Brigades |
CABs |
A Combat aviation brigade (CAB) is a multi-functional brigade-sized unit in the United States Army that fields military helicopters, offering a combination of attack/reconnaissance helicopters (AH-64 Apache), medium-lift helicopters (UH-60 Black Hawk), heavy-lift helicopters (CH-47 Chinook), and MEDEVAC capability. |
2 |
Common Access Card |
CAC |
The Common Access Card, also commonly referred to as the CAC or CAC card, is a smart card about the size of a credit card. It is the standard identification for Active Duty United States Defense personnel, to include the Selected Reserve and National Guard, United States Department of Defense (DoD) civilian employees, United States Coast Guard (USCG) civilian employees and eligible DoD and USCG contractor personnel. It is also the principal card used to enable physical access to buildings and controlled spaces, and it provides access to defense computer networks and systems. It also serves as an identification card under the Geneva Conventions (esp. the Third Geneva Convention). In combination with a personal identification number, a CAC satisfies the requirement for two-factor authentication: something the user knows combined with something the user has. The CAC also satisfies the requirements for digital signature and data encryption technologies: authentication, integrity and non-repudiation. |
2 |
Capital Expense |
CapEx |
Capital expenditure or capital expense (capex) is the money a company spends to buy, maintain, or improve its fixed assets, such as buildings, vehicles, equipment, or land. It is considered a capital expenditure when the asset is newly purchased or when money is used towards extending the useful life of an existing asset, such as repairing the roof. |
2 |
Cryptographic Ignition Key |
CIK |
The CIK is a small device which can be loaded with a 128·bit sequence which is different for each user. When the device is removed from the machine, that sequence is automatically added (mod 2) to the unique key in the machine, thus leaving it stored in encrypted form. When it is reattached, the unique key in the machine is decrypted, and it is now ready to operate in the normal way. The analogy with an automobile ignition key is close, thus the name. If one loses lose that key, they are still ok. unless the finder (or thief) can match it with their machine. One gets a new CIK, etfectively changing the lock in the cipher machine, and gets back in business. |
4 |
Configuration Management System |
CMS |
(ITIL Service Transition) A set of tools, data and information that is used to support service asset and configuration management. The CMS is part of an overall service knowledge management system and includes tools for collecting, storing, managing, updating, analysing and presenting data about all configuration items and their relationships. The CMS may also include information about incidents, problems, known errors, changes and releases. The CMS is maintained by service asset and configuration management and is used by all IT service management processes. See also configuration management database. |
2 |
Commanding Officer |
CO |
The commanding officer or, if the incumbent is a general officer, commanding general, is the officer in command of a military unit. The commanding officer has ultimate authority over the unit, and is usually given wide latitude to run the unit as they see fit, within the bounds of military law. In this respect, commanding officers have significant responsibilities, duties, and powers. |
2 |
Company |
Co |
A company is a military unit, typically consisting of 80–150 soldiers and usually commanded by a major or a captain. Most companies are formed of three to six platoons, although the exact number may vary by country, unit type, and structure. |
2 |
Colorless (Enclave) |
CO |
The reason it is called "colorless" is that the Army often places color codes on certain security enclaves, with secret typically being designated as red and unclassified as black. Unlike previous enclaves, in the colorless core all of the data is encrypted, so no one can tell whether the information is secret or unclassified; the "color" cannot be identified. Unclassified information is just as hard to obtain as secret. |
4 |
Control Objectives for Information and Related Technology |
COBIT |
COBIT (Control Objectives for Information and Related Technologies) is a good-practice framework created by international professional association ISACA for information technology (IT) management and IT governance. COBIT provides an implementable "set of controls over information technology and organizes them around a logical framework of IT-related processes and enablers. |
2 |
Common Operating Environment |
COE |
COE provides standards to unite existing programs and new technologies on a common software foundation, simplifying development, integration, training and sustainment. |
2 |
Communications Security |
COMSEC |
Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients. In the North Atlantic Treaty Organization culture, including United States Department of Defense culture, it is often referred to by the abbreviation COMSEC. The field includes cryptographic security, transmission security, emissions security and physical security of COMSEC equipment and associated keying material. COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links." |
2 |
Concept of Operations |
CONOPS |
"A Concept of Operations (CONOPS) is a verbal or graphic statement of a commander’s assumptions or intent in regard to an operation or series of operations as defined by Joint Publication 1-02 DoD Dictionary of Military and Associated Terms. It’s designed to give an overall picture of an operation. In Acquisitions, a CONOPS is used to examine current and new and/or proposed capabilities required to solve a current or emerging problem. It describes how a system will be used from the viewpoints of its various stakeholders. This provides a bridge between the often vague capabilities that a project begins with and the specific technical requirements needed to make is successful. A CONOPS is a useful tool that helps the user community write/refine their Initial Capabilities Documents (ICD), System Requirements Document (SRD) and Capabilities Development Documents (CDD)." |
2 |
Continental United States |
CONUS |
The contiguous United States consists of the 48 adjoining U.S. states plus Washington, D.C. (federal district), on the continent of North America. The term excludes the non-contiguous states of Alaska and Hawaii, and all off-shore insular areas. |
2 |
Communities of Practice |
CoPs |
Communities of Practice (CoPs) are organized groups of people who have a common interest in a specific technical or business domain. They collaborate regularly to share information, improve their skills, and actively work on advancing the general knowledge of the domain. |
3 |
Contracting Officer's Representative |
COR |
A Contracting Officer’s Representative (COR) is an individual authorized in writing by the contracting officer to perform specific technical or administrative contract functions. The COR must receive a written designation of their authority to act on behalf of the contracting officer. The COR is not authorized to make any commitments or changes that will affect price, quality, quantity, delivery, or any other term or condition of the contract. |
2 |
Commercial Off the Shelf |
COTS |
In the context of the U.S. government, the Federal Acquisition Regulation (FAR) has defined "COTS" as a formal term for commercial items, including services, available in the commercial marketplace that can be bought and used under government contract. For example, Microsoft is a COTS software provider. Goods and construction materials may qualify as COTS but bulk cargo does not. Services associated with the commercial items may also qualify as COTS, including installation services, training services, and cloud services. |
2 |
Command Post of the Future |
CPOF |
The United States Army's Command Post of the Future (CPOF) is a C2 software system that allows commanders to maintain topsight over the battlefield; collaborate with superiors, peers and subordinates over live data; and communicate their intent. Originally a DARPA technology demonstration, in 2006 CPOF became an Army Program of Record. It is integrated with the Army's Maneuver Control System and other products. |
4 |
Capability Set 16 |
CS-16 |
U.S. Army tactical networks are gradually evolving through a series of upgrades called “capability sets” that seek to apply lessons learned on the battlefield. |
4 |
Critical Success Factor |
CSF |
Something that must happen if an IT service, process, plan, project or other activity is to succeed. Key performance indicators are used to measure the achievement of each critical success factor. For example, a critical success factor of ‘protect IT services when making changes’ could be measured by key performance indicators such as ‘percentage reduction of unsuccessful changes’, ‘percentage reduction in changes causing incidents’ etc. |
2 |
Continual Service Improvement |
CSI |
(ITIL Continual Service Improvement) A stage in the lifecycle of a service. Continual service improvement ensures that services are aligned with changing business needs by identifying and implementing improvements to IT services that support business processes. The performance of the IT service provider is continually measured and improvements are made to processes, IT services and IT infrastructure in order to increase efficiency, effectiveness and cost effectiveness. Continual service improvement includes the seven-step improvement process. Although this process is associated with continual service improvement, most processes have activities that take place across multiple stages of the service lifecycle. See also Plan-Do-Check-Act. |
2 |
Cipher Text |
CT |
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. Ciphertext is not to be confused with codetext because the latter is a result of a code, not a cipher. |
4 |
Defense Advanced GPS Receiver |
DAGR |
The Defense Advanced GPS Receiver (DAGR; colloquially, "dagger") is a handheld GPS receiver used by the United States Department of Defense and select foreign military services. It is a military-grade, dual-frequency receiver, and has the security hardware necessary to decode the encrypted P(Y)-code GPS signals. |
4 |
Databridge (CPOF) |
DB |
"Single point of interface between CPOF and other ABCS systems such as FBCB2/JCR, JBC-P, BCS3, TAIS, DCGS-A, etc. -Supports two-way exchange of data between the various ABCS systems and CPOF. -Runs Microsoft IIS which is used to import images into CPOF system via Drag and Drop or the Snagit application. -Provides A means to import and export graphics in various formats." |
4 |
Distributed Computer Environment |
DCE |
*Vendor independent distributed computing environment *Not an OS or an application *An integrated set of services and tools that can be installed as a coherent environment on top of an existing OS *Serves as a platform for building and running distributed apps |
4 |
Division |
Div |
"A division is a large military unit or formation, usually consisting of between 10,000 and 20,000 soldiers. Infantry divisions during the World Wars ranged between 8,000 and 30,000 in nominal strength. In most armies, a division is composed of several regiments or brigades; in turn, several divisions typically make up a corps. Historically, the division has been the default combined arms unit capable of independent operations. Smaller combined arms units, such as the American Regimental combat team (RCT) during World War II, were used when conditions favored them. In recent times, Modern Western militaries have begun adopting the smaller Brigade combat team (similar to the RCT) as the default combined arms unit, with the Division they belong to being less important." |
2 |
Encrypted Data Group (JBC-P Tranceiver) |
EDG |
"The Joint Battle Command - Platform (JBC-P) program is the cornerstone of joint forces Command and Control (C2) Situational Awareness (SA) and communications. JBC-P provides secure Blue Force Tracking capability in Platforms and Command Posts, providing soldiers and commanders a map-based Common Operating Picture of the battlefield, as a result, reducing fratricide. The JBC-P program fields hardware (vehicle platform computer systems, satellite transceivers, encryption devices, and ancillary equipment), software capabilities, and will continue to leverage the Army's previous equipment investments by installing the new JBC-P software on new hardware as well as existing Force XXI Battle Command Brigade and Below (FBCB2) computer systems. JBC-P serves a primary role as the basis of the Mounted Computing Environment (MCE), one of six (6) environments within the Common Operating Environment (COE) framework. The COE is a standardized set of computing technologies that enable secure and interoperable applications to be rapidly developed and executed across a variety of computing environments. The MCE leverages JBC-P hardware and software to consolidate and integrate multiple warfighting systems in the Platform (Mounted) environment. This integrated MCE, with its open standards, enhanced interoperability, and simplified end-user interface, will speed delivery of the new Mission Command applications to the warfighter while improving the effectiveness and value of current systems." |
4 |
Frequency Division Multiple Access |
FDMA |
Frequency division multiple access (FDMA) is a channel access method used in multiple-access protocols as a channelization protocol. FDMA gives users an individual allocation of one or several frequency bands, or channels. It is particularly commonplace in satellite communication. FDMA, like other multiple access systems, coordinates access between multiple users. |
4 |
Fires Brigade |
FiB |
A Fires Brigade (FiB) was a military unit of the United States Army revolved around field artillery. With recent structural changes, Fires Brigades were either inactivated and reflagged as Division Artilleries (DIVARTY) or reorganized and redesignated as Field Artillery Brigades. |
2 |
Final Operational Capability or Full Operational Capability |
FOC |
For the United States Department of Defense military acquisition FOC is defined as "in general attained when all units and/or organizations in the force structure scheduled to receive a system have received it and have the ability to employ and maintain it. |
2 |
Field Service Representative |
FSR |
Contractor personnel tasked with software and hardware maintenance activities at the customers deployed location. |
2 |
Fiscal Year |
FY |
A fiscal year (or financial year, or sometimes budget year) is a period used for calculating annual ("yearly") financial statements in businesses and other organizations all over the world. |
2 |
Gigabits per second |
Gbps |
GigaBits or GigaBytes per Second) One billion bits or bytes per second. Gbps is a measurement of peripheral data transfer or network transmission speed. The correct abbreviation is b for bits and B for bytes; however, b and B are often interchanged. |
2 |
Gigahertz (1000 MHz) |
GHz |
The hertz (symbol: Hz) is the derived unit of frequency in the International System of Units (SI) and is defined as one cycle per second. It is named for Heinrich Rudolf Hertz, the first person to provide conclusive proof of the existence of electromagnetic waves. Hertz are commonly expressed in multiples: 1 GHz = 1*10^9 H. |
4 |
Global Information Grid |
GIG |
The Global Information Grid (GIG) is an all-encompassing communications project of the United States Department of Defense. It is defined as a "globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel." |
2 |
Global Positioning System |
GPS |
"The Global Positioning System (GPS), is a satellite-based radionavigation system owned by the United States government and operated by the United States Air Force. It is a global navigation satellite system that provides geolocation and time information to a GPS receiver anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. Navigation: Soldiers use GPS to find objectives, even in the dark or in unfamiliar territory, and to coordinate troop and supply movement. Target tracking: Various military weapons systems use GPS to track potential ground and air targets before flagging them as hostile.[citation needed] These weapon systems pass target coordinates to precision-guided munitions to allow them to engage targets accurately. Military aircraft, particularly in air-to-ground roles, use GPS to find targets. Missile and projectile guidance: GPS allows accurate targeting of various military weapons including ICBMs, cruise missiles, precision-guided munitions and artillery shells. Embedded GPS receivers able to withstand accelerations of 12,000 g or about 118 km/s2 have been developed for use in 155-millimeter (6.1 in) howitzer shells.[96] Search and rescue. Reconnaissance: Patrol movement can be managed more closely." |
4 |
Graphic Bearing Indicator |
GBI |
The Nett Warrior system will display a Soldier's GPS position and azimuth on a map using a graphic bearing indicator. It also shows buddy icons of other Nett Warrior users on the network, and any information regarding map locations that has been shared with other users. |
4 |
Highband Networking Radio |
HNR |
HNR utilizes directive beam technology to achieve a high-throughput mesh network over long distances with enhanced spectrum efficiency. The radio has a number of advanced, multi-layer security features that enable the passing of SCI-level (Sensitive Compartmented Information) data. These include Advanced Encryption Standard (AES) capability, tamper-proof labels, High Assurance Internet Protocol Encryption (HAIPE) compatibility, a directional-beam antenna for Low Probability of Intercept (LPI), and a secure transit case accessory with SIPRNET/NIPRNET network services. The HNR mesh network is a "colorless core" capable of transporting secure and unsecure data over the same network. |
4 |
Highband Networking Waveform |
HNW |
A terrestial time division multiple access (TDMA) line-of-sight rafio frequency waveform which provides lower latency and greater throughput for MN PoR vehicles. |
4 |
Highband Radio Frequency Unit |
HRFU |
A radio unit designed to utilize HNW to pass data over the WAN. Contains multiple feed horns to facilitate on the move connectivity; semi-omnidirectional capable. |
4 |
Integrated Bridge |
IB |
The central point of control for vehicle systems (electrical power, cameras, FBCB2) on the MAT-V platform. Controls power to all MN components. |
4 |
Intelligence Community |
IC |
The United States Intelligence Community (IC) is a federation of 16 separate United States government agencies that work separately and together to conduct intelligence activities to support the foreign policy and national security of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments. The IC is overseen by the Office of the Director of National Intelligence (ODNI), which itself is headed by the Director of National Intelligence (DNI), who reports to the President of the United States. |
2 |
Identity and Access Management |
IdAM |
Identity management, also known as identity and access management (IAM) is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons". |
2 |
Incident Management |
IM |
(ITIL Service Operation) The process responsible for managing the lifecycle of all incidents. Incident management ensures that normal service operation is restored as quickly as possible and the business impact is minimized |
2 |
Intelligence and Security Command |
INSCOM |
The United States Army Intelligence and Security Command (INSCOM) is a direct reporting unit that conducts intelligence, security, and information operations for U.S. Army commanders and national decision makers. INSCOM is headquartered at Fort Belvoir, Virginia. |
2 |
Information Technology Information Library |
ITIL |
A set of best-practice publications for IT service management. Owned by the Cabinet Office (part of HM Government), ITIL gives guidance on the provision of quality IT services and the processes, functions and other capabilities needed to support them. The ITIL framework is based on a service lifecycle and consists of five lifecycle stages (service strategy, service design, service transition, service operation and continual service improvement), each of which has its own supporting publication. There is also a set of complementary ITIL publications providing guidance specific to industry sectors, organization types, operating models and technology architectures. See www.itil-officialsite.com for more information |
2 |
Information Technology Service Management |
ITSM |
IT service management (ITSM) refers to the entirety of activities – directed by policies, organized and structured in processes and supporting procedures – that are performed by an organization to design, plan, deliver, operate and control information technology (IT) services offered to customers. It is thus concerned with the implementation of IT services that meet customers' needs, and it is performed by the IT service provider through an appropriate mix of people, process and information technology. |
2 |
Joint Automated CEOI System |
JACS |
Automated Communications Engineering Software/Joint Automated Communications Electronics Operating Instructions (CEOI) System (ACES-JACS) that helps with COMSEC keying, information key tags and signal operating instructions development. |
4 |
Joint Battle Command - Platform |
JBC-P |
JBC-P is the Army’s next-generation friendly force tracking system, equipping Soldiers with a faster satellite network, secure data encryption and advanced logistics. JBC-P is the Army’s next generation friendly force tracking system, equipping Soldiers with a faster satellite network, secure data encryption and advanced logistics. JBC-P includes an intuitive interface with features like touch-to-zoom maps and drag-and-drop icons. JBC-P will be interoperable with the Nett Warrior handheld device, delivering situational awareness capabilities to dismounted Soldiers. JBC-P incorporates the common hardware solution known as the Mounted Family of Computer Systems (MFoCS), standardized tactical computers that are scalable and tailorable to the mission and vehicle. Ranging in options from a detachable tablet to a fully-loaded, vehicle-mounted workstation, MFoCS runs not only JBC-P but can also run other software applications, reducing size, weight and power demands. JBC-P builds on the situational awareness capability known as Force XXI Battle Command Brigade and Below/Blue Force Tracking (FBCB2/BFT), which is integrated on more than 120,000 platforms and is fielded or authorized to every brigade combat team in the Army. " |
4 |
Joint Command, Control, Communications, Computers, Intelligence, Surveillance |
JC4ISR |
Joint command, control, communications, computers, intelligence, surveillance and reconnaissance |
2 |
Joint Capabilities Release |
JCR |
JCR is a software upgrade. JCR includes computers, global positioning equipment and communication systems that work in tandem to provide near-real-time information to combat leaders at the tactical level so units are better able to synchronize operations and avoid friendly fire incidents. Soldiers inside vehicles can plot the location of enemy, friendly and neutral objects and exchange command and control messages. They can also alert nearby friendly units of improvised explosive devices or enemy locations. |
4 |
Joint Enterprise Network Manager |
JENM |
"The Joint Enterprise Network Manager (JENM) is a consolidated software application that plans, loads, manages and secures/defends mid and lower-tier software defined radios and associated waveforms, including: the Soldier Radio Waveform (SRW), Wideband Networking Waveform (WNW), the Mobile User Objective System (MUOS), as well as the Single Channel Ground and Airborne Radio System (SINCGARS) and some Satellite Communications. JENM can plan and configure an entire network of disparate networking radios and waveforms, ensuring interoperability across and between echelons. Its new enterprise Over-the-Air Management (eOTAM) capability reduces manpower hours to reconfigure, manage, control a tactical radio network, by performing the tasks rapidly over-the-air. The JENM eOTAM capability reduces the need for Signal Soldiers to travel from location to location, allowing them to manage and configure their radio networks from remote locations, such as the battalion tactical operations cell. Additional improvements to JENM include a more intuitive graphical user interface, simplification in planning tactical networks, network monitoring and troubleshooting, and capability with more software defined radios and respective waveforms." |
4 |
Joint Gateway Node |
JGN |
The JGN allows WIN-T to connect to a variety of external networks. |
2 |
Joint Tactical Network operations Toolkit |
JTNT |
Joint Tactical Networking Environment Network Operations Toolkit provides a means to load and configure the Army's family of software-defined radios. Before J-TNT, there were nearly 50 tools for signal Soldiers to plan, manage, monitor and control the Lower Tactical Network Environment (LTNE). |
4 |
Joint Tactical Radio System |
JTRS |
Joint Tactical Radio System (JTRS) is the Department of Defense family of common software-defined programmable radios that will form the foundation of radio frequency information transmission for Joint Vision 2020. JTRS radios are intended to interoperate with existing radio systems and provide the warfighter with additional communications capability to access maps and other visual data, communicate via voice and video and obtain information directly from battlefield sensors. JTRS will provide internet protocol (IP)-based capability to the warfighter and will replace all existing tactical radios based on the Services' migration plans. The JTRS program is built around an open Software Communications Architecture (SCA), allowing common software waveform applications to be implemented across the family of radios to provide joint-service, allied, and coalition interoperability. JTRS is a key enabler that will provide dynamic connectivity throughout the battle space to operate within the network centric operational environment. Activities also include studies and analysis to support both current program planning and execution and future program planning |
4 |
Kilobits per second |
Kbps |
Kilobit per second is currently defined as 1,000 bits per second. |
2 |
Key Encryption Key |
KEK |
"DEK: Data Encryption Key KEK: Key Encryption Key Master Key: Generally will describe one of the two above keys. Depending on the scheme in which it is implemented. This type of encryption scheme is often used for secure storage. Microsoft Windows is known to use this type of encryption scheme to protect user credentials and other types of data that are secured for a user. Microsoft generates a Key Encryption Key using the user's password. This KEK is then used to encrypt what they call the Master Key. The Master Key is really a Data Encryption Key. It will be used to encrypt any data that is put in the user's protected storage. Key management for Full Disk Encryption will also work the same way. The FDE software will randomly generate a DEK, then use the user's password/keyfile/smart card to create a KEK in order to encrypt the DEK. This mechanism allows the user to change their password without having to decrypt and re-encrypt the entire volume. Instead, the DEK is just re-encrypted with the new KEK." |
4 |
Kilohertz (1000 Hz) |
kHz |
The hertz (symbol: Hz) is the derived unit of frequency in the International System of Units (SI) and is defined as one cycle per second. It is named for Heinrich Rudolf Hertz, the first person to provide conclusive proof of the existence of electromagnetic waves. Hertz are commonly expressed in multiples: 1 KHz = 1*10^3 Hz |
4 |
Key Material Identifier (TACLANE) |
KMID |
Communications Security (COMSEC) term for an identifying marker embedded within a electric key wrapper. Most commonly used with a firefly vector set (FFVS). This lets us identify the exact 'serial number' of an encryption set installed on a device. No two devices can use material with the same KMID. |
4 |
Contracting Officer |
KO |
A Contracting Officer (CO or KO) is a person who can bind the Federal Government of the United States to a contract that is greater than the Micro-Purchase threshold. This is limited to the scope of authority delegated to the Contracting Officer by the head of the agency. |
2 |
Key Performance Indicator |
KPI |
(ITIL Continual Service Improvement) (ITIL Service Design) A metric that is used to help manage an IT service, process, plan, project or other activity. Key performance indicators are used to measure the achievement of critical success factors. Many metrics may be measured, but only the most important of these are defined as key performance indicators and used to actively manage and report on the process, IT service or activity. They should be selected to ensure that efficiency, effectiveness and cost effectiveness are all managed. |
2 |
Key Tag Binary (Key Tag File) |
KTB |
Similar to a KMID but for simple key material (not FFVS). |
4 |
Keyboard Video Mouse |
KVM |
A KVM switch (with KVM being an abbreviation for "keyboard, video and mouse") is a hardware device that allows a user to control multiple computers from one or more sets of keyboards, video monitors, and mice. Although multiple computers are connected to the KVM, typically a smaller number of computers can be controlled at any given time. Modern devices have also added the ability to share other peripherals like USB devices and audio. |
4 |
Local Area Network |
LAN |
A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link to a server. Typically, a LAN encompasses computers and peripherals connected to a server within a distinct geographic area such as an office or a commercial establishment. |
2 |
Line of Service |
LOS |
(ITIL Service Strategy) A core service or service package that has multiple service options. A line of service is managed by a service owner and each service option is designed to support a particular market segment. |
2 |
Line of Sight |
LOS |
"The line between the target and the aiming reference. 2. The straight line between two points. This line is in the plane of the great circle, but does not follow the curvature of the earth." |
2 |
Low Probability of Detection |
LPD |
The result of measures used to hide or disguise intentional electromagnetic transmissions. |
2 |
Low Probability of Interception |
LPI |
Result of measures to prevent the intercept of intentional electromagnetic transmissions |
2 |
Lower Tactical Internet |
LTI |
Lower Tactical Internet is radio based internet with it's related hardware, software and tools |
4 |
Media Access Control (Ethernet Address) |
MAC |
A media access control address of a device is a unique identifier assigned to a network interface controller for communications at the data link layer of a network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and Wi-Fi. In this context, MAC addresses are used in the medium access control protocol sublayer |
4 |
Mobile Access Router (HNR) |
MAR |
Embedded Cisco router in the Harris Baseband Processing Unit (BPU) |
4 |
Megabits per second |
Mbps |
Megabits per second (Mbps) are a unit of measurement for bandwidth and throughput on a network. Each megabit is equal to 1 million bits. Mbps belongs to a family of metrics used to measure the capacity and speed of data transfer. |
2 |
Megabytes per second |
MBps |
Megabytes per second (MBps) is a measure used to describe data transfer rates between devices. One megabyte is technically equal to 1,048,576 bytes, but in networking it refers to 1 million bytes. MBps should not be confused with the abbrevation Mbps, which refers to megabits per second. |
2 |
Mission Command |
MC |
Command post and platform that enable mission execution by commanders and leaders at all levels to be more effective, agile and decisive |
4 |
Modular Communications Node - Basic |
MCN-B |
Modular Communications Node – Basic (MCN-B). The MCN-B allowed the unit to extend subscriber services from an adjacent TCN. |
2 |
Multi-Domain Atlas |
MDA |
"The Multi-Domain Atlas (MDA) is a rugged, dismountable vehicle computing platform consisting of an intelligent docking station computer and a dismountable tablet computer. MDA Features: Supports up to four classification domains simultaneously; runs virtual machines to host independent security enclaves. Dock capable of running multiple instances of Windows® and Linux® operating systems simultaneously. Tablet capable of running a single instance of the Windows® or Linux® operating system. Built-in KVM capability provides single display user interface to tablet and dock computers. A system with detachable handheld display (tablet) with up to 50’ range; wired or Type-1 encrypted wireless connection to the dock. " |
4 |
Microsoft Deployment Toolkit |
MDT |
The purpose of MDT is to help automate the deployment of Windows operating systems and applications to desktop, portable, and server computers in the environment. At a high level, MDT automates the deployment process by configuring the unattended Setup files for Windows and packaging the necessary files into a consolidated image file that you then deploy to reference and target computers. |
2 |
Maneuver Enhancement Brigade |
MEB |
A maneuver enhancement brigade (MEB) is a self-contained, modular, and multifunctional support brigade of the United States Army customized to meet whatever mission it receives. A MEB's primary purpose is to plug into operational formations commanded by corps or division commanders, to support brigade combat teams once deployed, and to conduct tactical level tasks and support. |
2 |
Megahertz (1000 kHz) |
MHz |
The hertz (symbol: Hz) is the derived unit of frequency in the International System of Units (SI) and is defined as one cycle per second. It is named for Heinrich Rudolf Hertz, the first person to provide conclusive proof of the existence of electromagnetic waves. Hertz are commonly expressed in multiples: MHz = 1*10^6 Hz |
4 |
Military Intelligence |
MI |
Military intelligence. Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. |
2 |
Military Standard |
MIL-STD |
A United States defense standard, often called a military standard, "MIL-STD", "MIL-SPEC", or (informally) "MilSpecs", is used to help achieve standardization objectives by the U.S. Department of Defense. |
2 |
Mean Time Between Failures |
MTBF |
(ITIL Service Design) A metric for measuring and reporting reliability. MTBF is the average time that an IT service or other configuration item can perform its agreed function without interruption. This is measured from when the configuration item starts working, until it next fails. |
2 |
Mean Time Between Service Incidents |
MTBSI |
(ITIL Service Design) A metric used for measuring and reporting reliability. It is the mean time from when a system or IT service fails, until it next fails. MTBSI is equal to MTBF plus MTRS. |
2 |
Microsoft Test Manager |
MTM |
Microsoft Test Manager (MTM) is used to help test the application that has been built. MTM stores test plans and results on Team Foundation Server (TFS). Part of Visual Studio Enterprise and Visual Studio Test Professional. |
2 |
Mean Time to Restore Service |
MTRS |
The average time taken to restore an IT service or other configuration item after a failure. MTRS is measured from when the configuration item fails until it is fully restored and delivering its normal functionality. See also maintainability; mean time to repair. |
2 |
Mean Time to Repair |
MTTR |
The average time taken to repair an IT service or other configuration item after a failure. MTTR is measured from when the configuration item fails until it is repaired. MTTR does not include the time required to recover or restore. It is sometimes incorrectly used instead of mean time to restore service. |
2 |
Metric |
N/A |
Something that is measured and reported to help manage a process, IT service or activity. |
2 |
Non-Secure Internet Protocol Router |
NIPR |
See NIPRNET |
2 |
Non-classified but Sensitive Internet Protocol Router Network |
NIPRNET |
The Non-classified Internet Protocol (IP) Router Network (NIPRNet) is a private IP network used to exchange unclassified information, including information subject to controls on distribution, among the private network's users. The NIPRNet also provides its users access to the Internet. |
2 |
Not Mission Capable |
NMC |
Condition indicating that systems and equipment are not capable of performing any of their assigned missions. |
4 |
NettWarrior |
NW |
The Nett Warrior is an integrated dismounted situational awareness (SA) and mission command (MC) system for use during combat operations. Designed as a tool for leaders, NW provides unparalleled SA and MC capabilities to the dismounted leader, permitting faster and more accurate decisions during the tactical fight. With advanced navigation and information sharing capabilities, leaders are able to avoid fratricide and are more effective and more lethal in the execution of their combat missions. The NW program delivers a SA and MC system, which has the ability to graphically display the location of an individual leader’s location on a digital geo-referenced map image. Additional Soldier, platform and unit locations are also displayed on the digital user interface. NW is connected through a radio that will send and receive information from one NW to another, thus connecting the dismounted leader to the network. These radios will also connect the equipped leader to higher echelon data and information products to assist in decision making and situational understanding. Soldier position location information will be added to the network via interoperability with the Army’s Rifleman Radio capability. All of this will allow the leader to easily see, understand, and interact in the method that best suits the user and the particular mission. NW will employ a system-of-systems approach, optimizing and integrating capabilities while reducing the Soldier’s combat load and logistical footprint. |
4 |
Outside Continental United States |
OCONUS |
Outside the continental limits of the United States |
2 |
Operational Expense |
OpEx |
The cost resulting from running the IT services, which often involves repeating payments – for example, staff costs, hardware maintenance and electricity (also known as current expenditure or revenue expenditure). See also capital expenditure. |
2 |
Open Shortest Path First |
OSPF |
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS). |
4 |
On the Move |
OTM |
Military elements in physical motion |
2 |
Platform as a Service |
PaaS |
Platform as a Service (PaaS) or application platform as a Service (aPaaS) or platform base service is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app. |
2 |
Personal Communications Device |
PCD |
Personally owned device such as a laptop, cell phone, or tablet |
2 |
Plan, Do, Check, Act |
PDCA |
(ITIL Continual Service Improvement) A four-stage cycle for process management, attributed to Edward Deming. Plan-Do-Check-Act is also called the Deming Cycle. Plan – design or revise processes that support the IT services; Do – implement the plan and manage the processes; Check – measure the processes and IT services, compare with objectives and produce reports; Act – plan and implement changes to improve the processes. |
2 |
Platform Encryption Device (KGV-72) |
PED |
The KGV-72 Type-1 Programmable Encryption Device features a modular architecture with the programmability and scalability to accommodate a wide range of link and Internet Protocol (IP) in-line network encryption applications. Developed as part of the Force XXI Battle Command, Brigade-and-Below (FBCB2) Type-1 Encryption Device (T1ED) Program, the KGV-72 is a high-grade security solution that is compatible with existing and future Blue Force Tracking (BFT) terminals and transceivers. Its flexible, software-upgradeable design supports both legacy FBCB2 L-band/BLOS link communications and evolving IP standards. The KGV-72 is secured with the programmable National Security Agency (NSA)-certified Sierra II™ encryption module, which meets all requirements of the NSA’s Cryptographic Modernization initiative. Programming of Suite-A and Suite-B algorithms is also supported, allowing the KGV-72 to be used for a wide range of in-line network applications. The KGV-72 operates seamlessly with installed FBCB2 remote computers and provides high-grade traffic data encryption. |
4 |
Program Executive Office |
PEO |
A program executive office may be responsible for a specific program (e.g., the Joint Strike Fighter), or for an entire portfolio of similar programs (e.g., the Air Force PEO for space, who is responsible for all acquisition programs at the Air Force Space Command Space and Missile Systems Center, or the Navy PEO for aircraft carriers). |
2 |
Performance Enhancing Proxy (WIN-T) |
PEP |
Performance-enhancing proxies (PEPs) are network agents designed to improve the end-to-end performance of some communications protocol. PEP standards are defined in RFC 3135 (PEPs intended to mitigate link-related degradations) and RFC 3449 (TCP performance implications of network path asymmetry). |
4 |
Position Location Information |
PLI |
Data in a Joint Variable Message Format (JVMF) which provides the ability to determine an accurate location on the Earth. |
4 |
Project Management Office |
PMO |
A project management office, abbreviated to PMO, is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization. |
2 |
Point of Presence |
PoP |
The Point of Presence (PoP) is installed on select combat platforms at division, brigade and battalion echelons (to include select vehicles), enabling mobile mission command by providing on-the-move network connectivity, both line-of-sight and beyond-line-of-sight. A point of presence (PoP) is an artificial demarcation point or interface point between communicating entities. An Internet point of presence typically houses servers, routers, network switches, multiplexers, and other network interface equipment. |
2 |
Program of Record |
PoR |
The term is used to describe a program that is funded (approved) across the FYDP, (Future Year Defense Program) through the POM (Program Objective Memorandum). When this happens, the program becomes a "line item record" in the budget -- hence the term "program of record" |
2 |
Personal Radio Communications |
PRC |
The AN/PRC-155 Manpack radio is the first fielded two-channel, software defined radio capable of network-centric connectivity and legacy interoperability, supporting advanced (SRW, MUOS) and current-force waveforms (including SINGARS and SATCOM). In addition, the AIM II embedded programmable security allows the dismounted warfighter to seamlessly join any combat net with confidence. Added functionality, like internal voice and data bridging between networks, makes this the most powerful piece of tactical equipment in the soldier’s communications arsenal – joining local networks to beyond line of sight networks. |
4 |
Quality Assurance |
QA |
(ITIL Service Transition) The process responsible for ensuring that the quality of a service, process or other service asset will provide its intended value. Quality assurance is also used to refer to a function or team that performs quality assurance. This process is not described in detail within the core ITIL publications. See also service validation and testing. |
2 |
QOS Edge Device |
QED |
In general, edge devices are normally routers that provide authenticated access (most commonly PPPoA and PPPoE) to faster, more efficient backbone and core networks. The trend is to make the edge device smart and the core device(s) "dumb and fast", so edge routers often include Quality of Service (QoS) and multi-service functions to manage different types of traffic. Consequently, core networks are often designed with switches that use routing protocols such as Open Shortest Path First (OSPF) or Multiprotocol Label Switching (MPLS) for reliability and scalability, allowing edge routers to have redundant links to the core network. Links between core networks are different, for example Border Gateway Protocol (BGP) routers often used for peering exchanges. |
4 |
Quality Management System |
QMS |
(ITIL Continual Service Improvement) The framework of policy, processes, functions, standards, guidelines and tools that ensures an organization is of a suitable quality to reliably meet business objectives or service levels. See also ISO 9000. |
2 |
Quality Of Service |
QOS |
"Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as packet loss, bit rate, throughput, transmission delay, availability, jitter, etc. In the field of computer networking and other packet-switched telecommunication networks, quality of service refers to traffic prioritization and resource reservation control mechanisms rather than the achieved service quality. Quality of service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. Quality of service is particularly important for the transport of traffic with special requirements. In particular, developers have introduced Voice over IP technology to allow computer networks to become as useful as telephone networks for audio conversations, as well as supporting new applications with even stricter network performance requirements. |
4 |
Responsible, Accountable, Consulted, Informed |
RACI |
(ITIL Service Design) A model used to help define roles and responsibilities. RACI stands for responsible, accountable, consulted and informed. |
2 |
Root Cause Analysis |
RCA |
(ITIL Service Operation) An activity that identifies the root cause of an incident or problem. Root cause analysis typically concentrates on IT infrastructure failures. See also service failure analysis. |
2 |
Radio Frequency |
RF |
Radio frequency (RF) refers to alternating (AC) electric current or radio waves, oscillating in the frequency range used in radio, extending from around twenty thousand times per second (20 kHz) to around three hundred billion times per second (300 GHz), roughly between the upper limit of audio frequencies and the lower limit of infrared frequencies. |
4 |
Sustainment System Mission Command |
S2MC |
On 6/20/2014, Sustainment System Mission Command (S2MC), the organization that developed Battle Command Sustainment Support System (BCS3) and associated logistics command and control products, was retired. All current and future development efforts will be web-based, placing the software and hardware systems into sustainment. |
4 |
Situational Awareness |
SA |
On the ground during combat, situational awareness is the ability to see what’s in the vicinity and anticipate what’s not — knowledge that can mean the difference between surviving or being killed in action. Situational awareness is also the integrated web of networks, servers, storage devices, and analysis and management software that ingests data, makes it available for analysis, and then shares it anytime and anywhere, up and down the chain of command. |
4 |
Software as a Service |
SaaS |
SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider. You rent the use of an app for your organization, and your users connect to it over the Internet, usually with a web browser. All of the underlying infrastructure, middleware, app software, and app data are located in the service provider’s data center. The service provider manages the hardware and software, and with the appropriate service agreement, will ensure the availability and the security of the app and your data as well. SaaS allows your organization to get quickly up and running with an app at minimal upfront cost |
2 |
Service Acceptance Criteria |
SAC |
(ITIL Service Transition) A set of criteria used to ensure that an IT service meets its functionality and quality requirements and that the IT service provider is ready to operate the new IT service when it has been deployed. See also acceptance. |
2 |
Service Access and Configuration Management |
SACM |
(ITIL Service Transition) The process responsible for ensuring that the assets required to deliver services are properly controlled, and that accurate and reliable information about those assets is available when and where it is needed. This information includes details of how the assets have been configured and the relationships between assets. See also configuration management system. |
2 |
Scaled Agile Framework |
SAFe |
"SAFe synchronizes alignment, collaboration, and delivery for multiple Agile teams. Scalable and configurable, SAFe allows each organization to adapt it to its own business needs. It supports smaller-scale solutions employing 50 – 125 practitioners, as well as complex systems that require thousands of people. Copyright © Scaled Agile, Inc. " |
3 |
Satellite Communications |
SATCOM |
Product Manager Satellite Communications (PdM SATCOM) rapidly designs, acquires, fields and supports fully integrated, easy to operate and cost effective tactical SATCOM and services that meet Joint network communications requirements around the world. As part of the Army’s holistic One Tactical Network, most of these terminals transmit voice, video and data over the Warfighter Information Network-Tactical (WIN-T) backbone. With terminals ranging in size from a softside carry-on to a small house, the Army’s global network of SATCOM capability provides interoperable high-speed, high-capacity connectivity, so Soldiers can communicate across vast distances and in austere locations and terrains, virtually anytime, anywhere. |
2 |
Signal Battalion |
SB |
Provides Command, Control, Communications and Computer (C4) support to it's parent Signal Brigade. |
2 |
Software Communications Architecture |
SCA |
The Software Communications Architecture (SCA) is an open architecture framework that defines a standard way for radios to instantiate, configure, and manage waveform applications running on their platform. The SCA separates waveform software from the underlying hardware platform, facilitating waveform software portability and re-use to avoid costs of redeveloping waveforms. |
2 |
Service Design Package |
SDP |
(ITIL Service Design) Document(s) defining all aspects of an IT service and its requirements through each stage of its lifecycle. A service design package is produced for each new IT service, major change or IT service retirement. |
2 |
Smart Display Unit |
SDU |
A ruggedized video display unit mounted in a military vehicle. Programmable buttons along the bezel facilitate different functionality between running applications. |
4 |
Secure Internet Protocol Router |
SIPR |
See SIPRNET |
2 |
Secure Internet Protocol Network |
SIPRNET |
The Secret Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the 'completely secure' environment". |
2 |
Simple Key Loader (AN/PYQ-10) |
SKL |
The AN/PYQ-10 Simple Key Loader (SKL) is a ruggedized, portable, hand-held fill device, for securely receiving, storing, and transferring data between compatible cryptographic and communications equipment. |
4 |
Service Level Agreement |
SLA |
(ITIL Continual Service Improvement) (ITIL Service Design) An agreement between an IT service provider and a customer. A service level agreement describes the IT service, documents service level targets, and specifies the responsibilities of the IT service provider and the customer. A single agreement may cover multiple IT services or multiple customers. See also operational level agreement. |
2 |
Service Level Management |
SLM |
(ITIL Service Design) The process responsible for negotiating achievable service level agreements and ensuring that these are met. It is responsible for ensuring that all IT service management processes, operational level agreements and underpinning contracts are appropriate for the agreed service level targets. Service level management monitors and reports on service levels, holds regular service reviews with customers, and identifies required improvements. |
2 |
Service Level Requirement |
SLR |
(ITIL Continual Service Improvement) (ITIL Service Design) A customer requirement for an aspect of an IT service. Service level requirements are based on business objectives and used to negotiate agreed service level targets. |
2 |
Service Level Target |
SLT |
(ITIL Continual Service Improvement) (ITIL Service Design) A commitment that is documented in a service level agreement. Service level targets are based on service level requirements, and are needed to ensure that the IT service is able to meet business objectives. They should be SMART, and are usually based on key performance indicators. |
2 |
Specific, Measurable, Achievable, Relevant and Time-bound |
SMART |
(ITIL Continual Service Improvement) (ITIL Service Design) An acronym for helping to remember that targets in service level agreements and project plans should be specific, measurable, achievable, relevant and time-bound. |
2 |
Service Management Office |
SMO |
The Service Management Office (SMO) is a relatively new concept which is directly analogous to the Project Management Office (PMO). Like the PMO, the SMO provides a centre of excellence within the organization to drive efficiency and effectiveness. |
2 |
Soldier Network Extension |
SNE |
The Soldier Network Extension (SNE), delivers the Army’s mobile tactical network backbone to the company level, and is evolving from a vehicle used by the company commander to an information hotspot allowing other Soldiers to plug in, make phone calls and send and receive data from anywhere on the battlefield. The Soldier Network Extension (SNE) is installed on select vehicles to provide on-the-move network communications to extend the network. Using its on-the-move satellite communication systems, the SNE can also be used to heal and extend remote tactical radio networks. |
2 |
Special Operations Command |
SOCOM |
The United States Special Operations Command (USSOCOM or SOCOM) is the Unified Combatant Command charged with overseeing the various Special Operations Component Commands of the Army, Marine Corps, Navy, and Air Force of the United States Armed Forces. The command is part of the Department of Defense and is the only Unified Combatant Command legislated into being by the U.S. Congress. USSOCOM is headquartered at MacDill Air Force Base in Tampa, Florida. |
2 |
Signal Operating Instructions |
SOI |
Signal operating instructions or Communications-Electronics Operation Instructions are U.S. military terms for a type of combat order issued for the technical control and coordination of communications within a command. They include current and up-to-date information covering radio call signs and frequencies, a telephone directory, code-words, and visual and sound signals. A designated battalion signal officer prepares the battalion SOI in conformance with the SOI of higher headquarters. Units maintained 2 copies of the SOI: a training version and a "go-to-war" version. During operations, SOI are changed daily. Since the fielding of the SINCGARS system, however, the paper SOI has generally faded from Army use. Electronic SOI are now generated, distributed and loaded along with cryptographic keys. |
4 |
Standard Operating Procedure |
SOP |
A standard operating procedure is a set of instructions covering those features of operations which lend themselves to a definite or standardized procedure without loss of effectiveness |
2 |
Soldier Radio Waveform |
SRW |
The SRW provides networked wideband communications that enable simultaneous, integrated combat net radio voice, data and video capabilities. Designed as a mobile ad hoc waveform, the SRW functions as a "node" or "router" within a radio network and transmits vital information across large distances and over elevated terrain, such as mountains. The SRW is used by individual Soldiers, small units and very small sensors such as unattended ground or air vehicles, and it enables communication without a "fixed" infrastructure such a cell tower or satellite network. |
4 |
Satellite Transportable Terminal |
STT |
The Satellite Transportable Terminal (STT) is a highly transportable and mobile satellite system, which operates in conjunction with the JNN and BnCPN, designed to establish secure voice, video and data communications virtually anytime and anywhere. |
2 |
Sustainment Brigades |
Sust Bdes |
The sustainment brigade is designed to provide mission command for combat support and combat service support units. It can be adjusted in size to support anywhere from one to ten brigade combat teams (BCTs). A sustainment brigade has a joint capability that allows the Army to better manage the flow of logistics into the area of operations (AO) and provides support to other services for common logistics like fuel, common ammo, medical supplies, repair parts of wheeled vehicles, and so forth. A sustainment brigade is designed to operate independently in a theater of operations, in conjunction with other sustainment brigades under the command of a sustainment command (expeditionary), or directly under a theater sustainment command. When in theater, a sustainment command (expeditionary) will report to the theater sustainment command. |
2 |
TACLANE Configuration Tool |
TCT |
Manufacturer provided software application which automated the configuration of TACLANE devices. |
4 |
Time Division Multiple Access |
TDMA |
Time-division multiple access (TDMA) is a channel access method for shared-medium networks. It allows several users to share the same frequency channel by dividing the signal into different time slots. The users transmit in rapid succession, one after the other, each using its own time slot. This allows multiple stations to share the same transmission medium (e.g. radio frequency channel) while using only a part of its channel capacity. TDMA is used in the digital 2G cellular systems such as Global System for Mobile Communications (GSM), IS-136, Personal Digital Cellular (PDC) and iDEN, and in the Digital Enhanced Cordless Telecommunications (DECT) standard for portable phones. It is also used extensively in satellite systems, combat-net radio systems, and passive optical network (PON) networks for upstream traffic from premises to the operator. |
4 |
Transmission Encryption Key |
TEK |
Traffic encryption key (TEK)/data encryption key (DEK) - a symmetric key that is used to encrypt messages. TEKs are typically changed frequently, in some systems daily and in others for every message. See session key. DEK is used to specify any data form type (in communication payloads or anywhere else). |
4 |
Team Foundation Server |
TFS |
Team Foundation Server (commonly abbreviated to TFS) is a Microsoft product which provides source code management (either via Team Foundation Version Control or Git), reporting, requirements management, project management (for both agile software development and waterfall teams), automated builds, lab management, testing and release management capabilities. |
2 |
Trivial File Transfer Protocol |
TFTP |
Trivial File Transfer Protocol (TFTP) is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network. TFTP has been used for this application because it is very simple to implement. |
4 |
Time Of Day |
TOD |
A time-of-day (ToD) port on the front panel of the router allows you to connect external timing signal sources. The external timing input port is labeled TOD. (From RFC 868: This protocol provides a site-independent, machine readable date and time. The Time service sends back to the originating source the time in seconds since midnight on January first 1900.) |
4 |
Transmission Key Encryption Key |
TRKEK |
COMSEC key used to encrypt over-the-air-rekey (OTAR) messages. |
4 |
Tactical Relay Tower (HNR) |
TRT |
WIN-T Inc 2 (PoR MN) coonfiguration item designed for range extension of HNW radio networks. |
4 |
Transmission Security Key |
TSK |
Seed for a pseudorandom number generator that is used to control a radio in frequency hopping or direct-sequence spread spectrum modes |
4 |
Ultra High Frequency |
UHF |
Ultra high frequency (UHF) is the ITU designation for radio frequencies in the range between 300 megahertz (MHz) and 3 gigahertz (GHz), also known as the decimetre band as the wavelengths range from one meter to one decimeter. Radio waves with frequencies above the UHF band fall into the SHF (super-high frequency) or microwave frequency range. |
4 |
User Interface |
UI |
The user interface (UI), in the industrial design field of human–computer interaction, is the space where interactions between humans and machines occur. The goal of this interaction is to allow effective operation and control of the machine from the human end, whilst the machine simultaneously feeds back information that aids the operators' decision-making process. Examples of this broad concept of user interfaces include the interactive aspects of computer operating systems, hand tools, heavy machinery operator controls, and process controls. The design considerations applicable when creating user interfaces are related to or involve such disciplines as ergonomics and psychology. |
2 |
Unit Reference Number |
URN |
Specific numerical identifier for devices, unit, and persons on the battlefield. This URN is generated and used within Mission Command applications to distinguish certain resources. |
4 |
Upper Tactical Internet |
UTI |
WIN-T |
4 |
Vehicular Amplifier Adapter |
VAA |
It provides additional power amplification for clear communication over greater ranges. |
4 |
Very High Frequency |
VHF |
Very high frequency is the ITU designation for the range of radio frequency electromagnetic waves from 30 to 300 megahertz, with corresponding wavelengths of ten to one meter. |
4 |
Voice over IP |
VoIP |
Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet telephony, broadband telephony, and broadband phone service specifically refer to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). |
2 |
Vehicular Radio Communications |
VRC |
Army/Navy designation for terrestial RF communications equipment. |
4 |
Vehicle Wireless Package |
VWP |
The Vehicle Wireless Package (VWP) is a communications package for non-WIN-T Command and Control (C2) vehicles. The VWP B-Kit provides remote connectivity to a TCN via a Local Access Waveform for command and control vehicles during at-the-halt and on-the-move operations. It is a small form factor Local Area Network extension of the TCN’s satellite and terrestrial line-of-sight network systems. |
2 |
Vehicle Wireless Platform |
VWP |
Discontinued WIN-T configuration item. |
4 |
Wide Area Network |
WAN |
A wide area network (WAN) is a telecommunications network or computer network that extends over a large geographical distance. Wide area networks are often established with leased telecommunication circuits. |
2 |
Warfighter Information Network-Tactical |
WIN-T |
WIN-T is the Army’s tactical communications network backbone that enables mission command and secure reliable voice, video and data communications anytime, anywhere. Leveraging both satellite and line-of-sight capabilities for optimum efficiency, effectiveness and operational flexibility, the WIN-T network provides the data "pipe" that other communication and mission command systems need to connect into in order to operate. With WIN-T, Commanders and Soldiers can leverage mission command applications at any location, from traditional command posts, to network-equipped vehicles crossing the battlefield, even from the belly of C17 aircraft en route to an objective. |
2 |
Work in Process |
WIP |
A status that means activities have started but are not yet complete. It is commonly used as a status for incidents, problems, changes etc. |
2 |
Warfighter Initialization Tool |
WIT |
"Now, the Army is bringing increased flexibility to the way troops initialize their mission command systems by putting the power in the hands of the communications officer, or S6, to make real-time changes, on the fly. Once data products are delivered to the unit, the S6 can make the alterations to reflect exactly what systems are on the ground, instead of sending revisions back and ordering new data products. The S6 will now be able to integrate new equipment, modify or add roles, and have those changes take effect almost immediately compared to the old way of doing business. This capability has already been delivered to select units across the Army fielded with Capability Sets 13-15. The Army will take that effort one step further this summer with the planned fielding of the next generation of initialization tools, which will enable Soldiers at individual workstations to initialize their own system, much like turning on a commercial computer for the first time. " |
4 |