Search Results for

    Show / Hide Table of Contents

    RPS Definitions

    Last updated on January 13, 2021.

    Last Reviewed and Approved on PENDING REVIEW

    RPS Specific Terms

    Term Acronym if Existent Definition Version
    Master Key MasterKey Master Key is a string value that's used to encrypt Protected Properties in the database. The scope of the Master Key is domain-wide, meaning that all nodes/targets on the domain will share the same Master Key. 1
    Package A Package is a zip archive that contains an RPS manifest file that describes its contents and how to deploy it, and deployable files needed to apply the Package. 1
    Package Stream A Package Stream is a grouping of Packages that can be approved or rejected as a group. 1
    Rapid Provisioning System RPS "Rapid Provisioning System (RPS) is a generic, flexible automation and cyber compliance framework, based on Azure technology, that enables: Provisioning of compute and non-compute platforms and devices; patching (IAVA and App Updates); Configuration and firmware deployment; Collection and reporting of logs and telemetry. RPS Components consist (or will consist) of the following: API Sync Service CMDB SMA DSC PowerSTIG CDN Provisioning Service User Interface Utilities" 5
    Rapid Provisioning System Application Programming Interface RPS API An application programming interface exposed directly by a series of PowerShell cmdlts or indirectly by the RPS Web GUI that facilitates interaction with the RPS solution for IT administrators. 5
    Rapid Provisioning System Sync Service RPS Sync Service The RPS Sync service is used to synchronize RPS automation and reporting data between a distributor (parent) RPS node and a subscriber (child) RPS node. Relationships between a distributor and a subscriber are defined during RPS node registration and are stored in RPS node records in the RPS database. 5
    Resource Assignments Resource Assignments are the link between a single Resource (i.e. Certificates, Credentials, Password Policies) and a single Target Item (i.e. Virtual Machine, Network Interface Card). Resource Assignments are made to provide supplemental data to our task execution engine. So, when a Task needs to be run on a target, it may require a certain Resource in order to complete the execution. 1
    Resource Group A Resource group is a logical collection of resource items 1
    Resource Item ResourceItem Resource Item's can be thought of as entities used to configure/provision Target Item's. The two go hand-in-hand. Resource Item's typically represent virtual storage, password policies, packages, base images, etc. 1
    Task Map TaskMap Identifies a set of steps, what order they should be performed in, and what target items those steps apply to. 1
    Target Item TargetItem TargetItem: Target Item's typically represent a device/machine, or a virtual representation of that hardware. Some examples of Target Item types include routers, switches, vehicles, virtual machines, etc. These are all items which RPS is intended to configure/provision. 1

    Developer Terms

    Term Acronym if Existent Definition Version
    Agile N/A Agile software development describes an approach to software development under which requirements and solutions evolve through the collaborative effort of self-organizing and cross-functional teams and their customer(s)/end user(s). It advocates adaptive planning, evolutionary development, early delivery, and continual improvement, and it encourages rapid and flexible response to change. 2
    Agile Release Train ART The Agile Release Train (ART) is a long-lived team of Agile teams, which, along with other stakeholders, develops and delivers solutions incrementally, using a series of fixed-length Iterations within a Program Increment (PI) timebox. The ART aligns teams to a common business and technology mission. 3
    Applicaton Lifecycle Management ALM ALM is a set of pre-defined processes that start somewhere in the business as an idea, a need, a challenge or a risk and then pass through different development phases such as requirements definition, design, development, testing, deployment, release and maintenance spanning across an entire lifecycle of a product. Throughout the ALM process, each of these steps is closely monitored and controlled, followed by proper tracking and documentation of any changes to the application. 2
    Applicaton Programming Interface API In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software. In general terms, it is a set of clearly defined methods of communication between various software components. 2
    Cmdlets N/A Used from within Azure PowerShell to control Azure resources. A cmdlet is a lightweight Windows PowerShell script that performs a single function. 5
    Continuous Deployment CD Every change that passes automated tests are deployed to production automatically. 3
    Continuous Exploration CE Continuous Exploration (CE) is the process of continually exploring the market and user needs, and defining a Vision, Roadmap, and set of Features that address those needs. It’s the first element in the four-part Continuous Delivery Pipeline, preceding Continuous Integration (CI) Continuous Deployment (CD), and Release on Demand. Copyright © Scaled Agile, Inc. 3
    Change Management ChgM (ITIL Service Transition) The process responsible for controlling the lifecycle of all changes, enabling beneficial changes to be made with minimum disruption to IT services. 2
    Configuration Item CI (ITIL Service Transition) Any component or other service asset that needs to be managed in order to deliver an IT service. Information about each configuration item is recorded in a configuration record within the configuration management system and is maintained throughout its lifecycle by service asset and configuration management. Configuration items are under the control of change management. They typically include IT services, hardware, software, buildings, people and formal documentation such as process documentation and service level agreements. 2
    Continuous Integrations CI In software engineering, continuous integration (CI) is the practice of merging all developer working copies to a shared mainline several times a day. 3
    Domain Certificate Authority DCA This is a component of the Tactical Network Initialization & Configuration (TNIC) provided name convention for each Certificate Authority within the Mission Nework PoR. 4
    Epic N/A An Epic is a container for a Solution development initiative large enough to require analysis, the definition of a Minimum Viable Product (MVP), and financial approval prior to implementation. Implementation occurs over multiple Program Increments (PIs) and follows the Lean startup ‘build-measure-learn’ cycle. 3
    GitHub N/A GitHub is a web-based hosting service for version control using git. It is mostly used for computer code. It offers all of the distributed version control and source code management (SCM) functionality of git as well as adding its own features. It provides access control and several collaboration features such as bug tracking, feature requests, task management, and wikis for every project 2
    Minimum Viable Product MVP A minimum viable product (MVP) is a product with just enough features to satisfy early customers, and to provide feedback for future product development. 3
    Program Increment PI A Program Increment (PI) is a timebox during which an Agile Release Train (ART) delivers incremental value in the form of working, tested software and systems. PIs are typically 8 – 12 weeks long. The most common pattern for a PI is four development Iterations, followed by one Innovation and Planning (IP) Iteration. Copyright © Scaled Agile, Inc. " 3
    Post Implementation Review PIR A Post-Implementation Review (PIR) is an assessment and review of the completed working solution. It will be performed after a period of live running, some time after the project is completed. There are three purposes for a Post-Implementation Review: 1. To ascertain the degree of success from the project, in particular, the extent to which it met its objectives, delivered planned levels of benefit, and addressed the specific requirements as originally defined. 2. To examine the efficacy of all elements of the working business solution to see if further improvements can be made to optimise the benefit delivered. 3. To learn lessons from this project, lessons which can be used by the team members and by the organisation to improve future project work and solutions." 2
    Risk Management Framework RMF "The Risk Management Framework is a United States federal government policy and standards to help secure information systems (computers and networks) developed by National Institute of Standards and Technology. The two main publications that cover the details of RMF are NIST Special Publication 800-37, ""Guide for Applying the Risk Management Framework to Federal Information Systems"", and NIST Special Publication 800-53, ""Security and Privacy Controls for Federal Information Systems and Organizations""." 2
    Release Train Engineer RTE "The Release Train Engineer (RTE) is a servant leader and coach for the Agile Release Train (ART). The RTE’s major responsibilities are to facilitate the ART events and processes and assist the teams in delivering value. RTEs communicate with stakeholders, escalate impediments, help manage risk, and drive relentless improvement. Copyright © Scaled Agile, Inc. " 3
    SAFe Agile Team N/A "The SAFe Agile Team is a cross-functional group of 5 to 11 people who have the responsibility to define, build, test, and where applicable deploy, some element of solution value—all in a short Iteration timebox. Specifically, the SAFe Agile Team incorporates the Dev Team, Scrum Master, and Product Owner roles. Copyright © Scaled Agile, Inc. " 3
    Scrum N/A Scrum is an agile framework for managing work with an emphasis on software development. It is designed for teams of three to nine developers who break their work into actions that can be completed within timeboxed iterations, called Sprints (30 days or less) and track progress and re-plan in 15-minute stand-up meetings, called Daily Scrums. 2
    System Demo N/A "The System Demo is a significant event that provides an integrated view of new Features for the most recent Iteration delivered by all the teams in the Agile Release Train (ART). Each demo gives ART stakeholders an objective measure of progress during a Program Increment (PI). Copyright © Scaled Agile, Inc. " 3
    System of Systems SOS System of systems is a collection of task-oriented or dedicated systems that pool their resources and capabilities together to create a new, more complex system which offers more functionality and performance than simply the sum of the constituent systems. 4
    Visual Studio VS "Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft. It is used to develop computer programs, as well as web sites, web apps, web services and mobile apps. Visual Studio uses Microsoft software development platforms such as Windows API, Windows Forms, Windows Presentation Foundation, Windows Store and Microsoft Silverlight. It can produce both native code and managed code. Visual Studio includes a code editor supporting IntelliSense (the code completion component) as well as code refactoring. The integrated debugger works both as a source-level debugger and a machine-level debugger. Other built-in tools include a code profiler, forms designer for building GUI applications, web designer, class designer, and database schema designer. It accepts plug-ins that enhance the functionality at almost every level—including adding support for source control systems (like Subversion) and adding new toolsets like editors and visual designers for domain-specific languages or toolsets for other aspects of the software development lifecycle (like the Team Foundation Server client: Team Explorer)." 2

    Administrator Terms

    Term Acronym if Existent Definition Version
    Address Resolution Protocol (For IPv4) ARP The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given network layer address, typically an IPv4 address 4
    Assured Compliance Assessment Solution ACAS The Assured Compliance Assessment Solution (ACAS) is an integrated software solution that provides automated network vulnerability scanning, configuration assessment, and network discovery. ACAS consists of a suite of products to include the Security Center, Nessus Scanner and the Nessus Network Monitor (formerly the Passive Vulnerability Scanner) 2
    Automated Comms Engineering Software ACES ACES is real-time, tactical network and planning software. ACES supports the Soldier Radio Waveform (SRW) and the Adaptive Wideband Networking Waveform (ANW2). ACES assists the operator with planning, engineering, delivering and managing radio waveform files via an XML format. 4
    Active Directory AD Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Initially, Active Directory was only in charge of centralized domain management. Starting with Windows Server 2008, however, Active Directory became an umbrella title for a broad range of directory-based identity-related services.A server running Active Directory Domain Services (AD DS) is called a domain controller. It authenticates and authorizes all users and computers in a Windows domain type network—assigning and enforcing security policies for all computers and installing or updating software. For example, when a user logs into a computer that is part of a Windows domain, Active Directory checks the submitted password and determines whether the user is a system administrator or normal user. Also, it allows management and storage of information, provides authentication and authorization mechanisms, and establishes a framework to deploy other related services: Certificate Services, Federated Services, Lightweight Directory Services and Rights Management Services." 2
    Azure N/A Microsoft Azure (formerly Windows Azure) /ˈæʒər/ is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers. It provides software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) and supports many different programming languages, tools and frameworks, including both Microsoft-specific and third-party software and systems. 2
    Battle Command Sustainment Support Sys. BCS3 The Battle Command Sustainment & Support System (BCS3) integrates multiple data sources into one program and provides commanders with a visual layout of battlefield logistics 4
    Blob Storage N/A Azure Blob storage is a service that stores unstructured data in the cloud as objects/blobs. Blob storage can store any type of text or binary data, such as a document, media file, or application installer. 2
    Blue Force Tracker BFT Blue force tracking is a United States military term for a GPS-enabled capability that provides military commanders and forces with location information about friendly military forces. In NATO military symbology, blue typically denotes friendly forces. The capability provides a common picture of the location of friendly forces and therefore is referred to as the blue force tracker 4
    BFT Gateway Node BGN Blue Force Tracker Gateway Node 4
    Background Intelligent Transfer Service BITS BITS (Background Intelligent Transfer Service), managed through Windows PowerShell cmdlets, is a Windows component which facilitates asynchronous, prioritized, and throttled transfer of files between machines using idle network bandwidth. 5
    Baseband Processing Unit (HNR) BPU A baseband processor (also known as baseband radio processor, BP, or BBP) is a device (a chip or part of a chip) in a network interface that manages all the radio functions (all functions that require an antenna) 4
    Cloud computing N/A Cloud computing, also on-demand computing, is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand. 2
    Configuration Management Database CMDB (ITIL Service Transition) A database used to store configuration records throughout their lifecycle. The configuration management system maintains one or more configuration management databases, and each database stores attributes of configuration items, and relationships with other configuration items. 2
    Distributed File System Replication DFSR Refers to Distributed File System Replication cmdlets and is executed from within Windows PowerShell 5
    Dynamic Host Configuration Protocol DHCP The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on TCP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks. A DHCP server enables computers to request IP addresses and networking parameters automatically from the Internet service provider (ISP), reducing the need for a network administrator or a user to manually assign IP addresses to all network devices. In the absence of a DHCP server, a computer or other device on the network needs to be manually assigned an IP address, or to assign itself an APIPA address, which will not enable it from communicating outside its local subnet. 2
    Defense Information Systems Network DISN The Defense Information System Network has been the United States Department of Defense's enterprise network for providing data, video and voice services for 40 years. The Defense Information System Network is a worldwide-protected telecommunications network that enables the exchange of information in an interoperable and global space, partitioned by security demands, transmission requirements, and geographic needs of targeted end-user communities. The DISN offers a selection of integrated standards-based services to fulfill these connectivity needs. The services provide Defense Information Systems Agency mission partners with capability options to support diverse telecommunication requirements for organizations focused on, but not limited to, the Department of Defense 2
    Definitive Media Library DML (ITIL Service Transition) One or more locations in which the definitive and authorized versions of all software configuration items are securely stored. The definitive media library may also contain associated configuration items such as licences and documentation. It is a single logical storage area even if there are multiple locations. The definitive media library is controlled by service asset and configuration management and is recorded in the configuration management system. 2
    Domain Name Server DNS "A name server is a computer application that implements a network service for providing responses to queries against a directory service. It translates an often humanly meaningful, text-based identifier to a system-internal, often numeric identification or addressing component. This service is performed by the server in response to a service protocol request. An example of a name server is the server component of the Domain Name System (DNS), one of the two principal namespaces of the Internet. The most important function of DNS servers is the translation (resolution) of human-memorable domain names and hostnames into the corresponding numeric Internet Protocol (IP) addresses, the second principal name space of the Internet which is used to identify and locate computer systems and resources on the Internet." 2
    Desired State Configuration DSC DSC gives us a declarative model for system configuration management. What that really means is that we can specify how we want a workstation or server (a ‘node’) to be configured and we leave it to PowerShell and the Windows Workflow engine to make it happen on those target ‘nodes’. We don’t have to specify how we want it to happen. The main advantages of DSC are:to simplify your sysadmin task by configuring one or more devices automatically, to be able to configure machines identically with the aim to standardise them, to ensure, at a given time, that the configuration of a machine always be identical to its initial configuration, so as to avoid drift, deployment on demand as a Cloud strategy, or ‘en masse’, is largely automated and simplified" 2
    Domain Services Controller DSC This is a component of the Tactical Network Initialization & Configuration (TNIC) provided name convention for each Active Directory Domain Controller within the Mission Nework PoR. 4
    Early Life Support ELS (ITIL Service Transition) A stage in the service lifecycle that occurs at the end of deployment and before the service is fully accepted into operation. During early life support, the service provider reviews key performance indicators, service levels and monitoring thresholds and may implement improvements to ensure that service targets can be met. The service provider may also provide additional resources for incident and problem management during this time. 2
    Emergency Change Advisory Board ECAB (ITIL Service Transition) A subgroup of the change advisory board that makes decisions about emergency changes. Membership may be decided at the time a meeting is called, and depends on the nature of the emergency change. 2
    Environment Control Unit ECU Air Conditioning Unit 4
    End User Device EUD Typically an NSA Android approved operating system loaded on a commercial device such as a cell phone or tablet, loaded with Army custom software for use by soldiers in the field 4
    Incident N/A (ITIL Service Operation) An unplanned interruption to an IT service or reduction in the quality of an IT service. Failure of a configuration item that has not yet affected service is also an incident – for example, failure of one disk from a mirror set. 2
    Information Assurance IA Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data. 2
    Infrastructure as a Service IaaS The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components 2
    Information Assurance Vulnerability Alert IAVA An information assurance vulnerability alert (IAVA) is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories identified by DoD-CERT, a division of the United States Cyber Command. 2
    Information Assurance Vulnerability Management IAVM Process responsible for the management of IAVAs, IAVBs (Information Assurance Vulnerability Bulletins) and their implementation to the baseline. 2
    Initial Operational Capability IOC Initial operating capability or Initial operational capability (IOC) is the state achieved when a capability is available in its minimum usefully deployable form. 2
    Internet of Things IoT The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. 2
    Internet Protocol IP "The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying packets across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information." 2
    Known Error Database KEDB (ITIL Service Operation) A database containing all known error records. This database is created by problem management and used by incident and problem management. The known error database may be part of the configuration management system, or may be stored elsewhere in the service knowledge management system. 2
    Netcentric Waveform NCW Given sufficient satellite bandwidth, the NCW connected TCNs and PoPs to the network and provided sufficient data flow while at-the-halt and on-the-move. 2
    Network Centric Waveform NCW Network Centric Waveform (NCW) capability, is a dynamic robust waveform that optimizes bandwidth and satellite utilization. One of the key attributes of NCW is that it facilitates communication between the at-the-halt WIN-T Increment 1 and the on-the-move Increment 2, increasing interoperability so the two generations of equipment can "talk" seamlessly on the battlefield. 4
    Network Operations NetOps "NetOps is defined as the operational framework consisting of three essential tasks, Situational Awareness (SA), and Command & Control (C2) that the Commander (CDR) of US Strategic Command (USSTRATCOM), in coordination with DoD and Global NetOps Community, employs to operate, manage and defend the Global Information Grid (GIG) to ensure information superiority for the United States. Tactical Network Operations (NetOps) Management System (TNMS) is a scalable, modular NetOps capability that operates on multiple client or server platforms. The TNMS will facilitate decision making necessary to quickly identify network problems, shift resources, change configurations and coordinate the management of the critical network infrastructure supporting mission command functions." 2
    Network Management System NMS Application written by Lockheed Martin and Generaly Dynamics (GD) to perform centralized operation, management, and troubleshooting of WIN-T Inc 2 platforms. 4
    Network Operations Center NOC A network operations center (NOC, pronounced like the word knock), also known as a "network management center", is one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network. 2
    Network Operations and Security Center NOSC Network Operations and Security Center (NOSC). The NOSC supported the unit’s network management mission at division and brigade, but needed additional Soldiers and tools at battalion and company. 2
    Network Recovery Monitoring NRM Linux VM which provides automated command and control of select components on WIN-T vehicles. 4
    Network Services Gateway NSG Encryption device for JBC-P which enables cross-platform functionality within the JCR / BFT family of systems. 4
    Network Time Protocol NTP Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. 2
    Operating Environment Management OEM Name for the VM which hosts the NMS application on PoR nodes. 4
    Operational Level Agreement OLA "(ITIL Continual Service Improvement) (ITIL Service Design) An agreement between an IT service provider and another part of the same organization. It supports the IT service provider’s delivery of IT services to customers and defines the goods or services to be provided and the responsibilities of both parties. For example, there could be an operational level agreement:  Between the IT service provider and a procurement department to obtain hardware in agreed times  Between the service desk and a support group to provide incident resolution in agreed times. " 2
    PowerShell PS "Windows PowerShell is a task-based command-line shell and scripting language designed especially for system administration. Built on the .NET Framework, Windows PowerShell helps IT professionals and power users control and automate the administration of the Windows operating system and applications that run on Windows. Built-in Windows PowerShell commands, called cmdlets, let you manage the computers in your enterprise from the command line. Windows PowerShell providers let you access data stores, such as the registry and certificate store, as easily as you access the file system. In addition, Windows PowerShell has an expression parser and a fully developed scripting language." 2
    Request for Change RFC (ITIL Service Transition) A formal proposal for a change to be made. It includes details of the proposed change, and may be recorded on paper or electronically. The term is often misused to mean a change record, or the change itself. 2
    Regional Hub Node RHN "Regional Hub Nodes (RHNs) are the largest transport nodes for the Army’s tactical network. The five globally-located RHNs enable the Army to deploy forces anywhere in the world in support of contingency operations, disaster relief or national emergency response. The five RHNs are at the upper-most level of the Army’s tactical network architecture, and their innovative baseband and satellite communications capabilities enable regionalized reach-back to the Army’s global network. They enable the transport of information across the tactical network in and out of theater and around the world. The RHNs operate out of the conflict area and give the Soldier in the field immediate access to secure and non-secure internet and voice communications anywhere on the globe. To provide tactical users with secure, reliable connectivity worldwide, the Army has positioned RHNs in five separate regions: Continental United States (CONUS) East and CONUS West, Central Command, European Command and Pacific Command." 2
    Security Technical Implementation Guide STIG A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers, computers, and logical designs to enhance overall security. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities. 2
    Tactical Communications Node TCN The Tactical Communications Node (TCN) provides the principal backbone element and supports command post operations for the WIN-T Increment 2 network. The TCN provides communication and networking equipment and allows the Soldier the ability to access the network at a variety of security levels. While at-the-halt, the TCN is equipped with a 10 meter, extendable mast to improve line-of-sight connectivity and larger satellite assemblage for high throughput. 2
    Tactical Server Infrastructure TSI Tactical Server Infrastructure (TSI) replaces the current disparate server hardware by merging all operational and intelligence functions onto one common set of servers. TSI enables more server capability and delivers a consistent approach for installation and configuration, creating efficiencies in fielding, training and sustainment. 2
    Virtual Machine VM "In computing, a virtual machine (VM) is an emulation of a computer system. Virtual machines are based on computer architectures and provide functionality of a physical computer. Their implementations may involve specialized hardware, software, or a combination. There are different kinds of virtual machines, each with different functions: System virtual machines (also termed full virtualization VMs) provide a substitute for a real machine. They provide functionality needed to execute entire operating systems. A hypervisor uses native execution to share and manage hardware, allowing for multiple environments which are isolated from one another, yet exist on the same physical machine. Modern hypervisors use hardware-assisted virtualization, virtualization-specific hardware, primarily from the host CPUs. Process virtual machines are designed to execute computer programs in a platform-independent environment." 2
    Virtual Machine (MDA) MDA VM Virtual Machine hosted within an MDA. These VMs are system virtual machines (also termed full virtualization VMs) provide a substitute for a real machine. They provide functionality needed to execute entire operating systems. A hypervisor uses native execution to share and manage hardware, allowing for multiple environments which are isolated from one another, yet exist on the same physical machine. Modern hypervisors use hardware-assisted virtualization, virtualization-specific hardware, primarily from the host CPUs. 4

    General Terms

    Term Acronym if Existent Definition Version
    Advanced Field Artillery Targeting Data System AFATDS The Advanced Field Artillery Tactical Data System (AFATDS) is the Fire Support Command and Control (C2) system employed by the U.S. Army and U.S. Marine Corps units to provide automated support for planning, coordinating, controlling and executing fires and effects. AFATDS prioritizes targets received from various sensors and performs attack analysis using situational data combined with commander's guidance. The result is timely, accurate and coordinated fire support options to engage targets using Army, Marine, Navy and Air Force weapon systems. The system provides complete flexibility to manage attacks on preplanned and time-sensitive targets. AFATDS supports weapon systems such as mortars, field artillery cannons, rockets, close air support, attack helicopters, and Naval Surface Fire Support (NSFS) systems. AFATDS also acts as a fire support ""server"" to LAN-based and Tactical Internet-based clients, including the AFATDS Effects Management Tool (EMT), and the USMC Command and Control Personal Computer (C2PC) EMT. AFATDS is used in all U.S. Army echelons from weapons platoon to corps and in the Marine Corps from firing battery to Marine Expeditionary Forces. AFATDS is installed aboard the U.S. Navy LHA/LHD Class big deck amphibious ships to support Expeditionary Strike Groups (ESGs) for amphibious operations 4
    Army Battle Command Systems ABCS The Army Battle Command System (ABCS) is a digital Command, Control, Communications, Computers and Intelligence (C4I) system for the US Army. It includes a mix of fixed/semi-fixed and mobile networks. It is also designed for interoperability with US and Coalition C4I systems. 4
    Anti Jam AJ Used or intended to inhibit or prevent electronic jamming 2
    Adaptive Networking Wideband Waveform ANW2 "The ANW2 provides a data link between the TOC and vehicles, with up to 30 radios in a subnet. It provides simultaneous IP data and voice with integral situational awareness. ANW2 is a self-healing, robust, IP-driven waveform that maximizes redundancy and limits single point failures and networks" 4
    Army National Guard ARNG The Army National Guard (ARNG), in conjunction with the Air National Guard, is a militia force and a federal military reserve force of the United States. They are simultaneously part of two different organizations, the Army National Guard of the several states, territories and the District of Columbia (also referred to as the Militia of the United States), and the Army National Guard of the United States. The Army National Guard is divided into subordinate units stationed in each of the 50 states, three territories, and the District of Columbia, and operates under their respective governors. 2
    At the Halt ATH Not in motion 2
    Brigade Combat Team BCT The brigade combat team (BCT) is the basic deployable unit of maneuver in the US Army. A brigade combat team consists of one combat arms branch maneuver brigade, and its assigned support and fire units. "The Brigade is normally commanded by a Colonel (O-6) although in some cases a Brigadier General (O-7) may assume command." A brigade combat team contains combat support and combat service support units necessary to sustain its operations away from its parent division. BCTs contain organic artillery support, formerly received from the division artillery (DIVARTY). 2
    Battlefield Surveillance Brigade BfSB "The battlefield surveillance brigade (BfSB) was a United States Army surveillance/reconnaissance formation introduced from 2006–2015. The United States Army planned for the creation and transformation of nine intelligence brigades to a 'battlefield surveillance' role in 2007. The first battlefield surveillance brigade was deployed the same year conducting Surveillance, Reconnaissance and Intelligence operations. However, gathering information is only a part of the challenge it faces. Along with the structural changes and intelligence capabilities, the sustainment capabilities of the brigade also changed. The United States Army is currently reorganizing these BfSB formations into expeditionary military intelligence brigades. These brigades were designed to be self-sufficient Army modular forces." 2
    Beyond Line of Sight BLOS Beyond Line-Of-Sight (BLOS) is a related term often used in the military to describe radio communications capabilities that link personnel or systems too distant or too fully obscured by terrain for LOS communications. 2
    Command and Control C2 Command and Control (C2) systems enable information superiority on the battlefield. They provide the commander with the information to make effective decisions and they provide the warfighter the capability to access the information necessary to complete their mission. 2
    Command and Control Registry C2R The Command and Control Registry (C2R) is the Address Book used by today's Army. It dynamically coordinates and collaborates command and control naming, addressing, network and operations data across many different types of military systems deployed globally. It is utilized by our Army's systems as the on-line repository for addressing information such as email addresses, military addresses and network information 4
    Command Control Communications Tactical C3T Program Executive Office Command, Control, Communications-Tactical (PEO C3T) develops, acquires, fields and supports the Army’s tactical network, a critical priority that brings information dominance to current and future Soldiers. The mobile tactical network delivered by PEO C3T provides capability giving commanders a resilient, redundant, easy-to-use and mobile interoperable tactical network. 2
    Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance C4ISR The Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance Evaluation Directorate (C4ISRED) focuses on systems in the areas of mission command and integration, network, information and enterprise, databases and software, Intelligence, Surveillance and Reconnaissance, and intelligence electronic warfare. 2
    Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance. C5ISR C4ISR has recently changed to C5ISR. C5ISR stands for Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance. 1
    Change Advisory Board CAB (ITIL Service Transition) A group of people that support the assessment, prioritization, authorization and scheduling of changes. A change advisory board is usually made up of representatives from: all areas within the IT service provider; the business; and third parties such as suppliers. 2
    Combat Aviation Brigades CABs A Combat aviation brigade (CAB) is a multi-functional brigade-sized unit in the United States Army that fields military helicopters, offering a combination of attack/reconnaissance helicopters (AH-64 Apache), medium-lift helicopters (UH-60 Black Hawk), heavy-lift helicopters (CH-47 Chinook), and MEDEVAC capability. 2
    Common Access Card CAC The Common Access Card, also commonly referred to as the CAC or CAC card, is a smart card about the size of a credit card. It is the standard identification for Active Duty United States Defense personnel, to include the Selected Reserve and National Guard, United States Department of Defense (DoD) civilian employees, United States Coast Guard (USCG) civilian employees and eligible DoD and USCG contractor personnel. It is also the principal card used to enable physical access to buildings and controlled spaces, and it provides access to defense computer networks and systems. It also serves as an identification card under the Geneva Conventions (esp. the Third Geneva Convention). In combination with a personal identification number, a CAC satisfies the requirement for two-factor authentication: something the user knows combined with something the user has. The CAC also satisfies the requirements for digital signature and data encryption technologies: authentication, integrity and non-repudiation. 2
    Capital Expense CapEx Capital expenditure or capital expense (capex) is the money a company spends to buy, maintain, or improve its fixed assets, such as buildings, vehicles, equipment, or land. It is considered a capital expenditure when the asset is newly purchased or when money is used towards extending the useful life of an existing asset, such as repairing the roof. 2
    Cryptographic Ignition Key CIK The CIK is a small device which can be loaded with a 128·bit sequence which is different for each user. When the device is removed from the machine, that sequence is automatically added (mod 2) to the unique key in the machine, thus leaving it stored in encrypted form. When it is reattached, the unique key in the machine is decrypted, and it is now ready to operate in the normal way. The analogy with an automobile ignition key is close, thus the name. If one loses lose that key, they are still ok. unless the finder (or thief) can match it with their machine. One gets a new CIK, etfectively changing the lock in the cipher machine, and gets back in business. 4
    Configuration Management System CMS (ITIL Service Transition) A set of tools, data and information that is used to support service asset and configuration management. The CMS is part of an overall service knowledge management system and includes tools for collecting, storing, managing, updating, analysing and presenting data about all configuration items and their relationships. The CMS may also include information about incidents, problems, known errors, changes and releases. The CMS is maintained by service asset and configuration management and is used by all IT service management processes. See also configuration management database. 2
    Commanding Officer CO The commanding officer or, if the incumbent is a general officer, commanding general, is the officer in command of a military unit. The commanding officer has ultimate authority over the unit, and is usually given wide latitude to run the unit as they see fit, within the bounds of military law. In this respect, commanding officers have significant responsibilities, duties, and powers. 2
    Company Co A company is a military unit, typically consisting of 80–150 soldiers and usually commanded by a major or a captain. Most companies are formed of three to six platoons, although the exact number may vary by country, unit type, and structure. 2
    Colorless (Enclave) CO The reason it is called "colorless" is that the Army often places color codes on certain security enclaves, with secret typically being designated as red and unclassified as black. Unlike previous enclaves, in the colorless core all of the data is encrypted, so no one can tell whether the information is secret or unclassified; the "color" cannot be identified. Unclassified information is just as hard to obtain as secret. 4
    Control Objectives for Information and Related Technology COBIT COBIT (Control Objectives for Information and Related Technologies) is a good-practice framework created by international professional association ISACA for information technology (IT) management and IT governance. COBIT provides an implementable "set of controls over information technology and organizes them around a logical framework of IT-related processes and enablers. 2
    Common Operating Environment COE COE provides standards to unite existing programs and new technologies on a common software foundation, simplifying development, integration, training and sustainment. 2
    Communications Security COMSEC Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients. In the North Atlantic Treaty Organization culture, including United States Department of Defense culture, it is often referred to by the abbreviation COMSEC. The field includes cryptographic security, transmission security, emissions security and physical security of COMSEC equipment and associated keying material. COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links." 2
    Concept of Operations CONOPS "A Concept of Operations (CONOPS) is a verbal or graphic statement of a commander’s assumptions or intent in regard to an operation or series of operations as defined by Joint Publication 1-02 DoD Dictionary of Military and Associated Terms. It’s designed to give an overall picture of an operation. In Acquisitions, a CONOPS is used to examine current and new and/or proposed capabilities required to solve a current or emerging problem. It describes how a system will be used from the viewpoints of its various stakeholders. This provides a bridge between the often vague capabilities that a project begins with and the specific technical requirements needed to make is successful. A CONOPS is a useful tool that helps the user community write/refine their Initial Capabilities Documents (ICD), System Requirements Document (SRD) and Capabilities Development Documents (CDD)." 2
    Continental United States CONUS The contiguous United States consists of the 48 adjoining U.S. states plus Washington, D.C. (federal district), on the continent of North America. The term excludes the non-contiguous states of Alaska and Hawaii, and all off-shore insular areas. 2
    Communities of Practice CoPs Communities of Practice (CoPs) are organized groups of people who have a common interest in a specific technical or business domain. They collaborate regularly to share information, improve their skills, and actively work on advancing the general knowledge of the domain. 3
    Contracting Officer's Representative COR A Contracting Officer’s Representative (COR) is an individual authorized in writing by the contracting officer to perform specific technical or administrative contract functions. The COR must receive a written designation of their authority to act on behalf of the contracting officer. The COR is not authorized to make any commitments or changes that will affect price, quality, quantity, delivery, or any other term or condition of the contract. 2
    Commercial Off the Shelf COTS In the context of the U.S. government, the Federal Acquisition Regulation (FAR) has defined "COTS" as a formal term for commercial items, including services, available in the commercial marketplace that can be bought and used under government contract. For example, Microsoft is a COTS software provider. Goods and construction materials may qualify as COTS but bulk cargo does not. Services associated with the commercial items may also qualify as COTS, including installation services, training services, and cloud services. 2
    Command Post of the Future CPOF The United States Army's Command Post of the Future (CPOF) is a C2 software system that allows commanders to maintain topsight over the battlefield; collaborate with superiors, peers and subordinates over live data; and communicate their intent. Originally a DARPA technology demonstration, in 2006 CPOF became an Army Program of Record. It is integrated with the Army's Maneuver Control System and other products. 4
    Capability Set 16 CS-16 U.S. Army tactical networks are gradually evolving through a series of upgrades called “capability sets” that seek to apply lessons learned on the battlefield. 4
    Critical Success Factor CSF Something that must happen if an IT service, process, plan, project or other activity is to succeed. Key performance indicators are used to measure the achievement of each critical success factor. For example, a critical success factor of ‘protect IT services when making changes’ could be measured by key performance indicators such as ‘percentage reduction of unsuccessful changes’, ‘percentage reduction in changes causing incidents’ etc. 2
    Continual Service Improvement CSI (ITIL Continual Service Improvement) A stage in the lifecycle of a service. Continual service improvement ensures that services are aligned with changing business needs by identifying and implementing improvements to IT services that support business processes. The performance of the IT service provider is continually measured and improvements are made to processes, IT services and IT infrastructure in order to increase efficiency, effectiveness and cost effectiveness. Continual service improvement includes the seven-step improvement process. Although this process is associated with continual service improvement, most processes have activities that take place across multiple stages of the service lifecycle. See also Plan-Do-Check-Act. 2
    Cipher Text CT In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. Ciphertext is not to be confused with codetext because the latter is a result of a code, not a cipher. 4
    Defense Advanced GPS Receiver DAGR The Defense Advanced GPS Receiver (DAGR; colloquially, "dagger") is a handheld GPS receiver used by the United States Department of Defense and select foreign military services. It is a military-grade, dual-frequency receiver, and has the security hardware necessary to decode the encrypted P(Y)-code GPS signals. 4
    Databridge (CPOF) DB "Single point of interface between CPOF and other ABCS systems such as FBCB2/JCR, JBC-P, BCS3, TAIS, DCGS-A, etc. -Supports two-way exchange of data between the various ABCS systems and CPOF. -Runs Microsoft IIS which is used to import images into CPOF system via Drag and Drop or the Snagit application. -Provides A means to import and export graphics in various formats." 4
    Distributed Computer Environment DCE *Vendor independent distributed computing environment *Not an OS or an application *An integrated set of services and tools that can be installed as a coherent environment on top of an existing OS *Serves as a platform for building and running distributed apps 4
    Division Div "A division is a large military unit or formation, usually consisting of between 10,000 and 20,000 soldiers. Infantry divisions during the World Wars ranged between 8,000 and 30,000 in nominal strength. In most armies, a division is composed of several regiments or brigades; in turn, several divisions typically make up a corps. Historically, the division has been the default combined arms unit capable of independent operations. Smaller combined arms units, such as the American Regimental combat team (RCT) during World War II, were used when conditions favored them. In recent times, Modern Western militaries have begun adopting the smaller Brigade combat team (similar to the RCT) as the default combined arms unit, with the Division they belong to being less important." 2
    Encrypted Data Group (JBC-P Tranceiver) EDG "The Joint Battle Command - Platform (JBC-P) program is the cornerstone of joint forces Command and Control (C2) Situational Awareness (SA) and communications. JBC-P provides secure Blue Force Tracking capability in Platforms and Command Posts, providing soldiers and commanders a map-based Common Operating Picture of the battlefield, as a result, reducing fratricide. The JBC-P program fields hardware (vehicle platform computer systems, satellite transceivers, encryption devices, and ancillary equipment), software capabilities, and will continue to leverage the Army's previous equipment investments by installing the new JBC-P software on new hardware as well as existing Force XXI Battle Command Brigade and Below (FBCB2) computer systems. JBC-P serves a primary role as the basis of the Mounted Computing Environment (MCE), one of six (6) environments within the Common Operating Environment (COE) framework. The COE is a standardized set of computing technologies that enable secure and interoperable applications to be rapidly developed and executed across a variety of computing environments. The MCE leverages JBC-P hardware and software to consolidate and integrate multiple warfighting systems in the Platform (Mounted) environment. This integrated MCE, with its open standards, enhanced interoperability, and simplified end-user interface, will speed delivery of the new Mission Command applications to the warfighter while improving the effectiveness and value of current systems." 4
    Frequency Division Multiple Access FDMA Frequency division multiple access (FDMA) is a channel access method used in multiple-access protocols as a channelization protocol. FDMA gives users an individual allocation of one or several frequency bands, or channels. It is particularly commonplace in satellite communication. FDMA, like other multiple access systems, coordinates access between multiple users. 4
    Fires Brigade FiB A Fires Brigade (FiB) was a military unit of the United States Army revolved around field artillery. With recent structural changes, Fires Brigades were either inactivated and reflagged as Division Artilleries (DIVARTY) or reorganized and redesignated as Field Artillery Brigades. 2
    Final Operational Capability or Full Operational Capability FOC For the United States Department of Defense military acquisition FOC is defined as "in general attained when all units and/or organizations in the force structure scheduled to receive a system have received it and have the ability to employ and maintain it. 2
    Field Service Representative FSR Contractor personnel tasked with software and hardware maintenance activities at the customers deployed location. 2
    Fiscal Year FY A fiscal year (or financial year, or sometimes budget year) is a period used for calculating annual ("yearly") financial statements in businesses and other organizations all over the world. 2
    Gigabits per second Gbps GigaBits or GigaBytes per Second) One billion bits or bytes per second. Gbps is a measurement of peripheral data transfer or network transmission speed. The correct abbreviation is b for bits and B for bytes; however, b and B are often interchanged. 2
    Gigahertz (1000 MHz) GHz The hertz (symbol: Hz) is the derived unit of frequency in the International System of Units (SI) and is defined as one cycle per second. It is named for Heinrich Rudolf Hertz, the first person to provide conclusive proof of the existence of electromagnetic waves. Hertz are commonly expressed in multiples: 1 GHz = 1*10^9 H. 4
    Global Information Grid GIG The Global Information Grid (GIG) is an all-encompassing communications project of the United States Department of Defense. It is defined as a "globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel." 2
    Global Positioning System GPS "The Global Positioning System (GPS), is a satellite-based radionavigation system owned by the United States government and operated by the United States Air Force. It is a global navigation satellite system that provides geolocation and time information to a GPS receiver anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. Navigation: Soldiers use GPS to find objectives, even in the dark or in unfamiliar territory, and to coordinate troop and supply movement. Target tracking: Various military weapons systems use GPS to track potential ground and air targets before flagging them as hostile.[citation needed] These weapon systems pass target coordinates to precision-guided munitions to allow them to engage targets accurately. Military aircraft, particularly in air-to-ground roles, use GPS to find targets. Missile and projectile guidance: GPS allows accurate targeting of various military weapons including ICBMs, cruise missiles, precision-guided munitions and artillery shells. Embedded GPS receivers able to withstand accelerations of 12,000 g or about 118 km/s2 have been developed for use in 155-millimeter (6.1 in) howitzer shells.[96] Search and rescue. Reconnaissance: Patrol movement can be managed more closely." 4
    Graphic Bearing Indicator GBI The Nett Warrior system will display a Soldier's GPS position and azimuth on a map using a graphic bearing indicator. It also shows buddy icons of other Nett Warrior users on the network, and any information regarding map locations that has been shared with other users. 4
    Highband Networking Radio HNR HNR utilizes directive beam technology to achieve a high-throughput mesh network over long distances with enhanced spectrum efficiency. The radio has a number of advanced, multi-layer security features that enable the passing of SCI-level (Sensitive Compartmented Information) data. These include Advanced Encryption Standard (AES) capability, tamper-proof labels, High Assurance Internet Protocol Encryption (HAIPE) compatibility, a directional-beam antenna for Low Probability of Intercept (LPI), and a secure transit case accessory with SIPRNET/NIPRNET network services. The HNR mesh network is a "colorless core" capable of transporting secure and unsecure data over the same network. 4
    Highband Networking Waveform HNW A terrestial time division multiple access (TDMA) line-of-sight rafio frequency waveform which provides lower latency and greater throughput for MN PoR vehicles. 4
    Highband Radio Frequency Unit HRFU A radio unit designed to utilize HNW to pass data over the WAN. Contains multiple feed horns to facilitate on the move connectivity; semi-omnidirectional capable. 4
    Integrated Bridge IB The central point of control for vehicle systems (electrical power, cameras, FBCB2) on the MAT-V platform. Controls power to all MN components. 4
    Intelligence Community IC The United States Intelligence Community (IC) is a federation of 16 separate United States government agencies that work separately and together to conduct intelligence activities to support the foreign policy and national security of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments. The IC is overseen by the Office of the Director of National Intelligence (ODNI), which itself is headed by the Director of National Intelligence (DNI), who reports to the President of the United States. 2
    Identity and Access Management IdAM Identity management, also known as identity and access management (IAM) is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons". 2
    Incident Management IM (ITIL Service Operation) The process responsible for managing the lifecycle of all incidents. Incident management ensures that normal service operation is restored as quickly as possible and the business impact is minimized 2
    Intelligence and Security Command INSCOM The United States Army Intelligence and Security Command (INSCOM) is a direct reporting unit that conducts intelligence, security, and information operations for U.S. Army commanders and national decision makers. INSCOM is headquartered at Fort Belvoir, Virginia. 2
    Information Technology Information Library ITIL A set of best-practice publications for IT service management. Owned by the Cabinet Office (part of HM Government), ITIL gives guidance on the provision of quality IT services and the processes, functions and other capabilities needed to support them. The ITIL framework is based on a service lifecycle and consists of five lifecycle stages (service strategy, service design, service transition, service operation and continual service improvement), each of which has its own supporting publication. There is also a set of complementary ITIL publications providing guidance specific to industry sectors, organization types, operating models and technology architectures. See www.itil-officialsite.com for more information 2
    Information Technology Service Management ITSM IT service management (ITSM) refers to the entirety of activities – directed by policies, organized and structured in processes and supporting procedures – that are performed by an organization to design, plan, deliver, operate and control information technology (IT) services offered to customers. It is thus concerned with the implementation of IT services that meet customers' needs, and it is performed by the IT service provider through an appropriate mix of people, process and information technology. 2
    Joint Automated CEOI System JACS Automated Communications Engineering Software/Joint Automated Communications Electronics Operating Instructions (CEOI) System (ACES-JACS) that helps with COMSEC keying, information key tags and signal operating instructions development. 4
    Joint Battle Command - Platform JBC-P JBC-P is the Army’s next-generation friendly force tracking system, equipping Soldiers with a faster satellite network, secure data encryption and advanced logistics. JBC-P is the Army’s next generation friendly force tracking system, equipping Soldiers with a faster satellite network, secure data encryption and advanced logistics. JBC-P includes an intuitive interface with features like touch-to-zoom maps and drag-and-drop icons. JBC-P will be interoperable with the Nett Warrior handheld device, delivering situational awareness capabilities to dismounted Soldiers. JBC-P incorporates the common hardware solution known as the Mounted Family of Computer Systems (MFoCS), standardized tactical computers that are scalable and tailorable to the mission and vehicle. Ranging in options from a detachable tablet to a fully-loaded, vehicle-mounted workstation, MFoCS runs not only JBC-P but can also run other software applications, reducing size, weight and power demands. JBC-P builds on the situational awareness capability known as Force XXI Battle Command Brigade and Below/Blue Force Tracking (FBCB2/BFT), which is integrated on more than 120,000 platforms and is fielded or authorized to every brigade combat team in the Army. " 4
    Joint Command, Control, Communications, Computers, Intelligence, Surveillance JC4ISR Joint command, control, communications, computers, intelligence, surveillance and reconnaissance 2
    Joint Capabilities Release JCR JCR is a software upgrade. JCR includes computers, global positioning equipment and communication systems that work in tandem to provide near-real-time information to combat leaders at the tactical level so units are better able to synchronize operations and avoid friendly fire incidents. Soldiers inside vehicles can plot the location of enemy, friendly and neutral objects and exchange command and control messages. They can also alert nearby friendly units of improvised explosive devices or enemy locations. 4
    Joint Enterprise Network Manager JENM "The Joint Enterprise Network Manager (JENM) is a consolidated software application that plans, loads, manages and secures/defends mid and lower-tier software defined radios and associated waveforms, including: the Soldier Radio Waveform (SRW), Wideband Networking Waveform (WNW), the Mobile User Objective System (MUOS), as well as the Single Channel Ground and Airborne Radio System (SINCGARS) and some Satellite Communications. JENM can plan and configure an entire network of disparate networking radios and waveforms, ensuring interoperability across and between echelons. Its new enterprise Over-the-Air Management (eOTAM) capability reduces manpower hours to reconfigure, manage, control a tactical radio network, by performing the tasks rapidly over-the-air. The JENM eOTAM capability reduces the need for Signal Soldiers to travel from location to location, allowing them to manage and configure their radio networks from remote locations, such as the battalion tactical operations cell. Additional improvements to JENM include a more intuitive graphical user interface, simplification in planning tactical networks, network monitoring and troubleshooting, and capability with more software defined radios and respective waveforms." 4
    Joint Gateway Node JGN The JGN allows WIN-T to connect to a variety of external networks. 2
    Joint Tactical Network operations Toolkit JTNT Joint Tactical Networking Environment Network Operations Toolkit provides a means to load and configure the Army's family of software-defined radios. Before J-TNT, there were nearly 50 tools for signal Soldiers to plan, manage, monitor and control the Lower Tactical Network Environment (LTNE). 4
    Joint Tactical Radio System JTRS Joint Tactical Radio System (JTRS) is the Department of Defense family of common software-defined programmable radios that will form the foundation of radio frequency information transmission for Joint Vision 2020. JTRS radios are intended to interoperate with existing radio systems and provide the warfighter with additional communications capability to access maps and other visual data, communicate via voice and video and obtain information directly from battlefield sensors. JTRS will provide internet protocol (IP)-based capability to the warfighter and will replace all existing tactical radios based on the Services' migration plans. The JTRS program is built around an open Software Communications Architecture (SCA), allowing common software waveform applications to be implemented across the family of radios to provide joint-service, allied, and coalition interoperability. JTRS is a key enabler that will provide dynamic connectivity throughout the battle space to operate within the network centric operational environment. Activities also include studies and analysis to support both current program planning and execution and future program planning 4
    Kilobits per second Kbps Kilobit per second is currently defined as 1,000 bits per second. 2
    Key Encryption Key KEK "DEK: Data Encryption Key KEK: Key Encryption Key Master Key: Generally will describe one of the two above keys. Depending on the scheme in which it is implemented. This type of encryption scheme is often used for secure storage. Microsoft Windows is known to use this type of encryption scheme to protect user credentials and other types of data that are secured for a user. Microsoft generates a Key Encryption Key using the user's password. This KEK is then used to encrypt what they call the Master Key. The Master Key is really a Data Encryption Key. It will be used to encrypt any data that is put in the user's protected storage. Key management for Full Disk Encryption will also work the same way. The FDE software will randomly generate a DEK, then use the user's password/keyfile/smart card to create a KEK in order to encrypt the DEK. This mechanism allows the user to change their password without having to decrypt and re-encrypt the entire volume. Instead, the DEK is just re-encrypted with the new KEK." 4
    Kilohertz (1000 Hz) kHz The hertz (symbol: Hz) is the derived unit of frequency in the International System of Units (SI) and is defined as one cycle per second. It is named for Heinrich Rudolf Hertz, the first person to provide conclusive proof of the existence of electromagnetic waves. Hertz are commonly expressed in multiples: 1 KHz = 1*10^3 Hz 4
    Key Material Identifier (TACLANE) KMID Communications Security (COMSEC) term for an identifying marker embedded within a electric key wrapper. Most commonly used with a firefly vector set (FFVS). This lets us identify the exact 'serial number' of an encryption set installed on a device. No two devices can use material with the same KMID. 4
    Contracting Officer KO A Contracting Officer (CO or KO) is a person who can bind the Federal Government of the United States to a contract that is greater than the Micro-Purchase threshold. This is limited to the scope of authority delegated to the Contracting Officer by the head of the agency. 2
    Key Performance Indicator KPI (ITIL Continual Service Improvement) (ITIL Service Design) A metric that is used to help manage an IT service, process, plan, project or other activity. Key performance indicators are used to measure the achievement of critical success factors. Many metrics may be measured, but only the most important of these are defined as key performance indicators and used to actively manage and report on the process, IT service or activity. They should be selected to ensure that efficiency, effectiveness and cost effectiveness are all managed. 2
    Key Tag Binary (Key Tag File) KTB Similar to a KMID but for simple key material (not FFVS). 4
    Keyboard Video Mouse KVM A KVM switch (with KVM being an abbreviation for "keyboard, video and mouse") is a hardware device that allows a user to control multiple computers from one or more sets of keyboards, video monitors, and mice. Although multiple computers are connected to the KVM, typically a smaller number of computers can be controlled at any given time. Modern devices have also added the ability to share other peripherals like USB devices and audio. 4
    Local Area Network LAN A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link to a server. Typically, a LAN encompasses computers and peripherals connected to a server within a distinct geographic area such as an office or a commercial establishment. 2
    Line of Service LOS (ITIL Service Strategy) A core service or service package that has multiple service options. A line of service is managed by a service owner and each service option is designed to support a particular market segment. 2
    Line of Sight LOS "The line between the target and the aiming reference. 2. The straight line between two points. This line is in the plane of the great circle, but does not follow the curvature of the earth." 2
    Low Probability of Detection LPD The result of measures used to hide or disguise intentional electromagnetic transmissions. 2
    Low Probability of Interception LPI Result of measures to prevent the intercept of intentional electromagnetic transmissions 2
    Lower Tactical Internet LTI Lower Tactical Internet is radio based internet with it's related hardware, software and tools 4
    Media Access Control (Ethernet Address) MAC A media access control address of a device is a unique identifier assigned to a network interface controller for communications at the data link layer of a network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and Wi-Fi. In this context, MAC addresses are used in the medium access control protocol sublayer 4
    Mobile Access Router (HNR) MAR Embedded Cisco router in the Harris Baseband Processing Unit (BPU) 4
    Megabits per second Mbps Megabits per second (Mbps) are a unit of measurement for bandwidth and throughput on a network. Each megabit is equal to 1 million bits. Mbps belongs to a family of metrics used to measure the capacity and speed of data transfer. 2
    Megabytes per second MBps Megabytes per second (MBps) is a measure used to describe data transfer rates between devices. One megabyte is technically equal to 1,048,576 bytes, but in networking it refers to 1 million bytes. MBps should not be confused with the abbrevation Mbps, which refers to megabits per second. 2
    Mission Command MC Command post and platform that enable mission execution by commanders and leaders at all levels to be more effective, agile and decisive 4
    Modular Communications Node - Basic MCN-B Modular Communications Node – Basic (MCN-B). The MCN-B allowed the unit to extend subscriber services from an adjacent TCN. 2
    Multi-Domain Atlas MDA "The Multi-Domain Atlas (MDA) is a rugged, dismountable vehicle computing platform consisting of an intelligent docking station computer and a dismountable tablet computer. MDA Features: Supports up to four classification domains simultaneously; runs virtual machines to host independent security enclaves. Dock capable of running multiple instances of Windows® and Linux® operating systems simultaneously. Tablet capable of running a single instance of the Windows® or Linux® operating system. Built-in KVM capability provides single display user interface to tablet and dock computers. A system with detachable handheld display (tablet) with up to 50’ range; wired or Type-1 encrypted wireless connection to the dock. " 4
    Microsoft Deployment Toolkit MDT The purpose of MDT is to help automate the deployment of Windows operating systems and applications to desktop, portable, and server computers in the environment. At a high level, MDT automates the deployment process by configuring the unattended Setup files for Windows and packaging the necessary files into a consolidated image file that you then deploy to reference and target computers. 2
    Maneuver Enhancement Brigade MEB A maneuver enhancement brigade (MEB) is a self-contained, modular, and multifunctional support brigade of the United States Army customized to meet whatever mission it receives. A MEB's primary purpose is to plug into operational formations commanded by corps or division commanders, to support brigade combat teams once deployed, and to conduct tactical level tasks and support. 2
    Megahertz (1000 kHz) MHz The hertz (symbol: Hz) is the derived unit of frequency in the International System of Units (SI) and is defined as one cycle per second. It is named for Heinrich Rudolf Hertz, the first person to provide conclusive proof of the existence of electromagnetic waves. Hertz are commonly expressed in multiples: MHz = 1*10^6 Hz 4
    Military Intelligence MI Military intelligence. Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. 2
    Military Standard MIL-STD A United States defense standard, often called a military standard, "MIL-STD", "MIL-SPEC", or (informally) "MilSpecs", is used to help achieve standardization objectives by the U.S. Department of Defense. 2
    Mean Time Between Failures MTBF (ITIL Service Design) A metric for measuring and reporting reliability. MTBF is the average time that an IT service or other configuration item can perform its agreed function without interruption. This is measured from when the configuration item starts working, until it next fails. 2
    Mean Time Between Service Incidents MTBSI (ITIL Service Design) A metric used for measuring and reporting reliability. It is the mean time from when a system or IT service fails, until it next fails. MTBSI is equal to MTBF plus MTRS. 2
    Microsoft Test Manager MTM Microsoft Test Manager (MTM) is used to help test the application that has been built. MTM stores test plans and results on Team Foundation Server (TFS). Part of Visual Studio Enterprise and Visual Studio Test Professional. 2
    Mean Time to Restore Service MTRS The average time taken to restore an IT service or other configuration item after a failure. MTRS is measured from when the configuration item fails until it is fully restored and delivering its normal functionality. See also maintainability; mean time to repair. 2
    Mean Time to Repair MTTR The average time taken to repair an IT service or other configuration item after a failure. MTTR is measured from when the configuration item fails until it is repaired. MTTR does not include the time required to recover or restore. It is sometimes incorrectly used instead of mean time to restore service. 2
    Metric N/A Something that is measured and reported to help manage a process, IT service or activity. 2
    Non-Secure Internet Protocol Router NIPR See NIPRNET 2
    Non-classified but Sensitive Internet Protocol Router Network NIPRNET The Non-classified Internet Protocol (IP) Router Network (NIPRNet) is a private IP network used to exchange unclassified information, including information subject to controls on distribution, among the private network's users. The NIPRNet also provides its users access to the Internet. 2
    Not Mission Capable NMC Condition indicating that systems and equipment are not capable of performing any of their assigned missions. 4
    NettWarrior NW The Nett Warrior is an integrated dismounted situational awareness (SA) and mission command (MC) system for use during combat operations. Designed as a tool for leaders, NW provides unparalleled SA and MC capabilities to the dismounted leader, permitting faster and more accurate decisions during the tactical fight. With advanced navigation and information sharing capabilities, leaders are able to avoid fratricide and are more effective and more lethal in the execution of their combat missions. The NW program delivers a SA and MC system, which has the ability to graphically display the location of an individual leader’s location on a digital geo-referenced map image. Additional Soldier, platform and unit locations are also displayed on the digital user interface. NW is connected through a radio that will send and receive information from one NW to another, thus connecting the dismounted leader to the network. These radios will also connect the equipped leader to higher echelon data and information products to assist in decision making and situational understanding. Soldier position location information will be added to the network via interoperability with the Army’s Rifleman Radio capability. All of this will allow the leader to easily see, understand, and interact in the method that best suits the user and the particular mission. NW will employ a system-of-systems approach, optimizing and integrating capabilities while reducing the Soldier’s combat load and logistical footprint. 4
    Outside Continental United States OCONUS Outside the continental limits of the United States 2
    Operational Expense OpEx The cost resulting from running the IT services, which often involves repeating payments – for example, staff costs, hardware maintenance and electricity (also known as current expenditure or revenue expenditure). See also capital expenditure. 2
    Open Shortest Path First OSPF Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS). 4
    On the Move OTM Military elements in physical motion 2
    Platform as a Service PaaS Platform as a Service (PaaS) or application platform as a Service (aPaaS) or platform base service is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app. 2
    Personal Communications Device PCD Personally owned device such as a laptop, cell phone, or tablet 2
    Plan, Do, Check, Act PDCA (ITIL Continual Service Improvement) A four-stage cycle for process management, attributed to Edward Deming. Plan-Do-Check-Act is also called the Deming Cycle. Plan – design or revise processes that support the IT services; Do – implement the plan and manage the processes; Check – measure the processes and IT services, compare with objectives and produce reports; Act – plan and implement changes to improve the processes. 2
    Platform Encryption Device (KGV-72) PED The KGV-72 Type-1 Programmable Encryption Device features a modular architecture with the programmability and scalability to accommodate a wide range of link and Internet Protocol (IP) in-line network encryption applications. Developed as part of the Force XXI Battle Command, Brigade-and-Below (FBCB2) Type-1 Encryption Device (T1ED) Program, the KGV-72 is a high-grade security solution that is compatible with existing and future Blue Force Tracking (BFT) terminals and transceivers. Its flexible, software-upgradeable design supports both legacy FBCB2 L-band/BLOS link communications and evolving IP standards. The KGV-72 is secured with the programmable National Security Agency (NSA)-certified Sierra II™ encryption module, which meets all requirements of the NSA’s Cryptographic Modernization initiative. Programming of Suite-A and Suite-B algorithms is also supported, allowing the KGV-72 to be used for a wide range of in-line network applications. The KGV-72 operates seamlessly with installed FBCB2 remote computers and provides high-grade traffic data encryption. 4
    Program Executive Office PEO A program executive office may be responsible for a specific program (e.g., the Joint Strike Fighter), or for an entire portfolio of similar programs (e.g., the Air Force PEO for space, who is responsible for all acquisition programs at the Air Force Space Command Space and Missile Systems Center, or the Navy PEO for aircraft carriers). 2
    Performance Enhancing Proxy (WIN-T) PEP Performance-enhancing proxies (PEPs) are network agents designed to improve the end-to-end performance of some communications protocol. PEP standards are defined in RFC 3135 (PEPs intended to mitigate link-related degradations) and RFC 3449 (TCP performance implications of network path asymmetry). 4
    Position Location Information PLI Data in a Joint Variable Message Format (JVMF) which provides the ability to determine an accurate location on the Earth. 4
    Project Management Office PMO A project management office, abbreviated to PMO, is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization. 2
    Point of Presence PoP The Point of Presence (PoP) is installed on select combat platforms at division, brigade and battalion echelons (to include select vehicles), enabling mobile mission command by providing on-the-move network connectivity, both line-of-sight and beyond-line-of-sight. A point of presence (PoP) is an artificial demarcation point or interface point between communicating entities. An Internet point of presence typically houses servers, routers, network switches, multiplexers, and other network interface equipment. 2
    Program of Record PoR The term is used to describe a program that is funded (approved) across the FYDP, (Future Year Defense Program) through the POM (Program Objective Memorandum). When this happens, the program becomes a "line item record" in the budget -- hence the term "program of record" 2
    Personal Radio Communications PRC The AN/PRC-155 Manpack radio is the first fielded two-channel, software defined radio capable of network-centric connectivity and legacy interoperability, supporting advanced (SRW, MUOS) and current-force waveforms (including SINGARS and SATCOM). In addition, the AIM II embedded programmable security allows the dismounted warfighter to seamlessly join any combat net with confidence. Added functionality, like internal voice and data bridging between networks, makes this the most powerful piece of tactical equipment in the soldier’s communications arsenal – joining local networks to beyond line of sight networks. 4
    Quality Assurance QA (ITIL Service Transition) The process responsible for ensuring that the quality of a service, process or other service asset will provide its intended value. Quality assurance is also used to refer to a function or team that performs quality assurance. This process is not described in detail within the core ITIL publications. See also service validation and testing. 2
    QOS Edge Device QED In general, edge devices are normally routers that provide authenticated access (most commonly PPPoA and PPPoE) to faster, more efficient backbone and core networks. The trend is to make the edge device smart and the core device(s) "dumb and fast", so edge routers often include Quality of Service (QoS) and multi-service functions to manage different types of traffic. Consequently, core networks are often designed with switches that use routing protocols such as Open Shortest Path First (OSPF) or Multiprotocol Label Switching (MPLS) for reliability and scalability, allowing edge routers to have redundant links to the core network. Links between core networks are different, for example Border Gateway Protocol (BGP) routers often used for peering exchanges. 4
    Quality Management System QMS (ITIL Continual Service Improvement) The framework of policy, processes, functions, standards, guidelines and tools that ensures an organization is of a suitable quality to reliably meet business objectives or service levels. See also ISO 9000. 2
    Quality Of Service QOS "Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as packet loss, bit rate, throughput, transmission delay, availability, jitter, etc. In the field of computer networking and other packet-switched telecommunication networks, quality of service refers to traffic prioritization and resource reservation control mechanisms rather than the achieved service quality. Quality of service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. Quality of service is particularly important for the transport of traffic with special requirements. In particular, developers have introduced Voice over IP technology to allow computer networks to become as useful as telephone networks for audio conversations, as well as supporting new applications with even stricter network performance requirements. 4
    Responsible, Accountable, Consulted, Informed RACI (ITIL Service Design) A model used to help define roles and responsibilities. RACI stands for responsible, accountable, consulted and informed. 2
    Root Cause Analysis RCA (ITIL Service Operation) An activity that identifies the root cause of an incident or problem. Root cause analysis typically concentrates on IT infrastructure failures. See also service failure analysis. 2
    Radio Frequency RF Radio frequency (RF) refers to alternating (AC) electric current or radio waves, oscillating in the frequency range used in radio, extending from around twenty thousand times per second (20 kHz) to around three hundred billion times per second (300 GHz), roughly between the upper limit of audio frequencies and the lower limit of infrared frequencies. 4
    Sustainment System Mission Command S2MC On 6/20/2014, Sustainment System Mission Command (S2MC), the organization that developed Battle Command Sustainment Support System (BCS3) and associated logistics command and control products, was retired. All current and future development efforts will be web-based, placing the software and hardware systems into sustainment. 4
    Situational Awareness SA On the ground during combat, situational awareness is the ability to see what’s in the vicinity and anticipate what’s not — knowledge that can mean the difference between surviving or being killed in action. Situational awareness is also the integrated web of networks, servers, storage devices, and analysis and management software that ingests data, makes it available for analysis, and then shares it anytime and anywhere, up and down the chain of command. 4
    Software as a Service SaaS SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider. You rent the use of an app for your organization, and your users connect to it over the Internet, usually with a web browser. All of the underlying infrastructure, middleware, app software, and app data are located in the service provider’s data center. The service provider manages the hardware and software, and with the appropriate service agreement, will ensure the availability and the security of the app and your data as well. SaaS allows your organization to get quickly up and running with an app at minimal upfront cost 2
    Service Acceptance Criteria SAC (ITIL Service Transition) A set of criteria used to ensure that an IT service meets its functionality and quality requirements and that the IT service provider is ready to operate the new IT service when it has been deployed. See also acceptance. 2
    Service Access and Configuration Management SACM (ITIL Service Transition) The process responsible for ensuring that the assets required to deliver services are properly controlled, and that accurate and reliable information about those assets is available when and where it is needed. This information includes details of how the assets have been configured and the relationships between assets. See also configuration management system. 2
    Scaled Agile Framework SAFe "SAFe synchronizes alignment, collaboration, and delivery for multiple Agile teams. Scalable and configurable, SAFe allows each organization to adapt it to its own business needs. It supports smaller-scale solutions employing 50 – 125 practitioners, as well as complex systems that require thousands of people. Copyright © Scaled Agile, Inc. " 3
    Satellite Communications SATCOM Product Manager Satellite Communications (PdM SATCOM) rapidly designs, acquires, fields and supports fully integrated, easy to operate and cost effective tactical SATCOM and services that meet Joint network communications requirements around the world. As part of the Army’s holistic One Tactical Network, most of these terminals transmit voice, video and data over the Warfighter Information Network-Tactical (WIN-T) backbone. With terminals ranging in size from a softside carry-on to a small house, the Army’s global network of SATCOM capability provides interoperable high-speed, high-capacity connectivity, so Soldiers can communicate across vast distances and in austere locations and terrains, virtually anytime, anywhere. 2
    Signal Battalion SB Provides Command, Control, Communications and Computer (C4) support to it's parent Signal Brigade. 2
    Software Communications Architecture SCA The Software Communications Architecture (SCA) is an open architecture framework that defines a standard way for radios to instantiate, configure, and manage waveform applications running on their platform. The SCA separates waveform software from the underlying hardware platform, facilitating waveform software portability and re-use to avoid costs of redeveloping waveforms. 2
    Service Design Package SDP (ITIL Service Design) Document(s) defining all aspects of an IT service and its requirements through each stage of its lifecycle. A service design package is produced for each new IT service, major change or IT service retirement. 2
    Smart Display Unit SDU A ruggedized video display unit mounted in a military vehicle. Programmable buttons along the bezel facilitate different functionality between running applications. 4
    Secure Internet Protocol Router SIPR See SIPRNET 2
    Secure Internet Protocol Network SIPRNET The Secret Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the 'completely secure' environment". 2
    Simple Key Loader (AN/PYQ-10) SKL The AN/PYQ-10 Simple Key Loader (SKL) is a ruggedized, portable, hand-held fill device, for securely receiving, storing, and transferring data between compatible cryptographic and communications equipment. 4
    Service Level Agreement SLA (ITIL Continual Service Improvement) (ITIL Service Design) An agreement between an IT service provider and a customer. A service level agreement describes the IT service, documents service level targets, and specifies the responsibilities of the IT service provider and the customer. A single agreement may cover multiple IT services or multiple customers. See also operational level agreement. 2
    Service Level Management SLM (ITIL Service Design) The process responsible for negotiating achievable service level agreements and ensuring that these are met. It is responsible for ensuring that all IT service management processes, operational level agreements and underpinning contracts are appropriate for the agreed service level targets. Service level management monitors and reports on service levels, holds regular service reviews with customers, and identifies required improvements. 2
    Service Level Requirement SLR (ITIL Continual Service Improvement) (ITIL Service Design) A customer requirement for an aspect of an IT service. Service level requirements are based on business objectives and used to negotiate agreed service level targets. 2
    Service Level Target SLT (ITIL Continual Service Improvement) (ITIL Service Design) A commitment that is documented in a service level agreement. Service level targets are based on service level requirements, and are needed to ensure that the IT service is able to meet business objectives. They should be SMART, and are usually based on key performance indicators. 2
    Specific, Measurable, Achievable, Relevant and Time-bound SMART (ITIL Continual Service Improvement) (ITIL Service Design) An acronym for helping to remember that targets in service level agreements and project plans should be specific, measurable, achievable, relevant and time-bound. 2
    Service Management Office SMO The Service Management Office (SMO) is a relatively new concept which is directly analogous to the Project Management Office (PMO). Like the PMO, the SMO provides a centre of excellence within the organization to drive efficiency and effectiveness. 2
    Soldier Network Extension SNE The Soldier Network Extension (SNE), delivers the Army’s mobile tactical network backbone to the company level, and is evolving from a vehicle used by the company commander to an information hotspot allowing other Soldiers to plug in, make phone calls and send and receive data from anywhere on the battlefield. The Soldier Network Extension (SNE) is installed on select vehicles to provide on-the-move network communications to extend the network. Using its on-the-move satellite communication systems, the SNE can also be used to heal and extend remote tactical radio networks. 2
    Special Operations Command SOCOM The United States Special Operations Command (USSOCOM or SOCOM) is the Unified Combatant Command charged with overseeing the various Special Operations Component Commands of the Army, Marine Corps, Navy, and Air Force of the United States Armed Forces. The command is part of the Department of Defense and is the only Unified Combatant Command legislated into being by the U.S. Congress. USSOCOM is headquartered at MacDill Air Force Base in Tampa, Florida. 2
    Signal Operating Instructions SOI Signal operating instructions or Communications-Electronics Operation Instructions are U.S. military terms for a type of combat order issued for the technical control and coordination of communications within a command. They include current and up-to-date information covering radio call signs and frequencies, a telephone directory, code-words, and visual and sound signals. A designated battalion signal officer prepares the battalion SOI in conformance with the SOI of higher headquarters. Units maintained 2 copies of the SOI: a training version and a "go-to-war" version. During operations, SOI are changed daily. Since the fielding of the SINCGARS system, however, the paper SOI has generally faded from Army use. Electronic SOI are now generated, distributed and loaded along with cryptographic keys. 4
    Standard Operating Procedure SOP A standard operating procedure is a set of instructions covering those features of operations which lend themselves to a definite or standardized procedure without loss of effectiveness 2
    Soldier Radio Waveform SRW The SRW provides networked wideband communications that enable simultaneous, integrated combat net radio voice, data and video capabilities. Designed as a mobile ad hoc waveform, the SRW functions as a "node" or "router" within a radio network and transmits vital information across large distances and over elevated terrain, such as mountains. The SRW is used by individual Soldiers, small units and very small sensors such as unattended ground or air vehicles, and it enables communication without a "fixed" infrastructure such a cell tower or satellite network. 4
    Satellite Transportable Terminal STT The Satellite Transportable Terminal (STT) is a highly transportable and mobile satellite system, which operates in conjunction with the JNN and BnCPN, designed to establish secure voice, video and data communications virtually anytime and anywhere. 2
    Sustainment Brigades Sust Bdes The sustainment brigade is designed to provide mission command for combat support and combat service support units. It can be adjusted in size to support anywhere from one to ten brigade combat teams (BCTs). A sustainment brigade has a joint capability that allows the Army to better manage the flow of logistics into the area of operations (AO) and provides support to other services for common logistics like fuel, common ammo, medical supplies, repair parts of wheeled vehicles, and so forth. A sustainment brigade is designed to operate independently in a theater of operations, in conjunction with other sustainment brigades under the command of a sustainment command (expeditionary), or directly under a theater sustainment command. When in theater, a sustainment command (expeditionary) will report to the theater sustainment command. 2
    TACLANE Configuration Tool TCT Manufacturer provided software application which automated the configuration of TACLANE devices. 4
    Time Division Multiple Access TDMA Time-division multiple access (TDMA) is a channel access method for shared-medium networks. It allows several users to share the same frequency channel by dividing the signal into different time slots. The users transmit in rapid succession, one after the other, each using its own time slot. This allows multiple stations to share the same transmission medium (e.g. radio frequency channel) while using only a part of its channel capacity. TDMA is used in the digital 2G cellular systems such as Global System for Mobile Communications (GSM), IS-136, Personal Digital Cellular (PDC) and iDEN, and in the Digital Enhanced Cordless Telecommunications (DECT) standard for portable phones. It is also used extensively in satellite systems, combat-net radio systems, and passive optical network (PON) networks for upstream traffic from premises to the operator. 4
    Transmission Encryption Key TEK Traffic encryption key (TEK)/data encryption key (DEK) - a symmetric key that is used to encrypt messages. TEKs are typically changed frequently, in some systems daily and in others for every message. See session key. DEK is used to specify any data form type (in communication payloads or anywhere else). 4
    Team Foundation Server TFS Team Foundation Server (commonly abbreviated to TFS) is a Microsoft product which provides source code management (either via Team Foundation Version Control or Git), reporting, requirements management, project management (for both agile software development and waterfall teams), automated builds, lab management, testing and release management capabilities. 2
    Trivial File Transfer Protocol TFTP Trivial File Transfer Protocol (TFTP) is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network. TFTP has been used for this application because it is very simple to implement. 4
    Time Of Day TOD A time-of-day (ToD) port on the front panel of the router allows you to connect external timing signal sources. The external timing input port is labeled TOD. (From RFC 868: This protocol provides a site-independent, machine readable date and time. The Time service sends back to the originating source the time in seconds since midnight on January first 1900.) 4
    Transmission Key Encryption Key TRKEK COMSEC key used to encrypt over-the-air-rekey (OTAR) messages. 4
    Tactical Relay Tower (HNR) TRT WIN-T Inc 2 (PoR MN) coonfiguration item designed for range extension of HNW radio networks. 4
    Transmission Security Key TSK Seed for a pseudorandom number generator that is used to control a radio in frequency hopping or direct-sequence spread spectrum modes 4
    Ultra High Frequency UHF Ultra high frequency (UHF) is the ITU designation for radio frequencies in the range between 300 megahertz (MHz) and 3 gigahertz (GHz), also known as the decimetre band as the wavelengths range from one meter to one decimeter. Radio waves with frequencies above the UHF band fall into the SHF (super-high frequency) or microwave frequency range. 4
    User Interface UI The user interface (UI), in the industrial design field of human–computer interaction, is the space where interactions between humans and machines occur. The goal of this interaction is to allow effective operation and control of the machine from the human end, whilst the machine simultaneously feeds back information that aids the operators' decision-making process. Examples of this broad concept of user interfaces include the interactive aspects of computer operating systems, hand tools, heavy machinery operator controls, and process controls. The design considerations applicable when creating user interfaces are related to or involve such disciplines as ergonomics and psychology. 2
    Unit Reference Number URN Specific numerical identifier for devices, unit, and persons on the battlefield. This URN is generated and used within Mission Command applications to distinguish certain resources. 4
    Upper Tactical Internet UTI WIN-T 4
    Vehicular Amplifier Adapter VAA It provides additional power amplification for clear communication over greater ranges. 4
    Very High Frequency VHF Very high frequency is the ITU designation for the range of radio frequency electromagnetic waves from 30 to 300 megahertz, with corresponding wavelengths of ten to one meter. 4
    Voice over IP VoIP Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet telephony, broadband telephony, and broadband phone service specifically refer to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). 2
    Vehicular Radio Communications VRC Army/Navy designation for terrestial RF communications equipment. 4
    Vehicle Wireless Package VWP The Vehicle Wireless Package (VWP) is a communications package for non-WIN-T Command and Control (C2) vehicles. The VWP B-Kit provides remote connectivity to a TCN via a Local Access Waveform for command and control vehicles during at-the-halt and on-the-move operations. It is a small form factor Local Area Network extension of the TCN’s satellite and terrestrial line-of-sight network systems. 2
    Vehicle Wireless Platform VWP Discontinued WIN-T configuration item. 4
    Wide Area Network WAN A wide area network (WAN) is a telecommunications network or computer network that extends over a large geographical distance. Wide area networks are often established with leased telecommunication circuits. 2
    Warfighter Information Network-Tactical WIN-T WIN-T is the Army’s tactical communications network backbone that enables mission command and secure reliable voice, video and data communications anytime, anywhere. Leveraging both satellite and line-of-sight capabilities for optimum efficiency, effectiveness and operational flexibility, the WIN-T network provides the data "pipe" that other communication and mission command systems need to connect into in order to operate. With WIN-T, Commanders and Soldiers can leverage mission command applications at any location, from traditional command posts, to network-equipped vehicles crossing the battlefield, even from the belly of C17 aircraft en route to an objective. 2
    Work in Process WIP A status that means activities have started but are not yet complete. It is commonly used as a status for incidents, problems, changes etc. 2
    Warfighter Initialization Tool WIT "Now, the Army is bringing increased flexibility to the way troops initialize their mission command systems by putting the power in the hands of the communications officer, or S6, to make real-time changes, on the fly. Once data products are delivered to the unit, the S6 can make the alterations to reflect exactly what systems are on the ground, instead of sending revisions back and ordering new data products. The S6 will now be able to integrate new equipment, modify or add roles, and have those changes take effect almost immediately compared to the old way of doing business. This capability has already been delivered to select units across the Army fielded with Capability Sets 13-15. The Army will take that effort one step further this summer with the planned fielding of the next generation of initialization tools, which will enable Soldiers at individual workstations to initialize their own system, much like turning on a commercial computer for the first time. " 4
    In This Article
    Back to top Generated by DocFX