International tech tests assess interoperability

The annual Joint Warrior Interoperability Demonstration began this week, focusing on command, control, communications and computer systems in more than 45 tests of emerging technologies worldwide.

The demonstrations, which began Monday and will last through June 26, include the testing of secure data exchange across several domains, such as Defense Department agencies and foreign parties such as Australia, Canada, the United Kingdom and NATO.

Participants will trade simulated military information over the Combined Federated Battle Laboratories Network in interoperability trials around the world. The U.S. locations include the headquarters of the Pacific Command, Camp Smith, Hawaii; Naval Surface Warfare Center in Dahlgren, Va.; Space and Naval Warfare Center in San Diego and Hanscom Air Force Base, Mass.

Among the technologies military testers are gauging is a Web videoconferencing system called Click to Meet Conference Server from First Virtual Communications of Redwood City, Calif.

The demonstration, organized by the Joint Chiefs of Staff and Defense Information Systems Agency, this year focuses on six major areas: security, logistics, language translation tools, situational awareness, coalition network vulnerability assessment and core network services.

'We must continue to field systems that are conceived and born interoperable,' said Rear Admiral Nancy E. Brown, the Joint Staff's vice director of C4 systems. 'The military services are providing funding to allow warfighters to assess the technologies.'


  • automated processes (Nikolay Klimenko/

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected