#Software Testing & Hardware Technology
Explore tagged Tumblr posts
muskantam · 7 months ago
Text
POS Implementation
POS Implementation: A Comprehensive Guide
In today’s fast-paced retail and service environments, implementing a Point of Sale (POS) system can significantly streamline operations, enhance customer experience, and improve overall efficiency. Whether you’re upgrading from a traditional cash register or installing your first POS system, proper implementation is crucial to maximizing its benefits. This guide will walk you through the essential steps of POS implementation.
Step 1: Identify Business Needs
Before selecting a POS system, assessing your business requirements is important. Consider the following:
The size and type of your business.
Specific features you need (e.g., inventory tracking, customer loyalty programs).
Budget constraints.
Integration requirements with existing software and hardware.
Step 2: Choose the Right POS System
Not all POS systems are created equal. Here’s how to select one that fits your needs:
Research and compare various providers.
Look for scalability to accommodate future growth.
Ensure it supports multiple payment methods.
Check reviews and testimonials from similar businesses.
Step 3: Hardware and Software Setup
A POS system consists of hardware (like barcode scanners, receipt printers, and card readers) and software. Ensure you:
Acquire hardware compatible with your chosen POS software.
Install and configure the software according to your operational needs.
Test all components to ensure they work seamlessly together.
Step 4: Data Migration
If you’re transitioning from an older system, data migration is a critical step:
Back up your existing data.
Transfer inventory, sales history, and customer information to the new system.
Verify the accuracy of migrated data.
Step 5: Employee Training
Proper training ensures your team can effectively use the POS system:
Organize hands-on training sessions.
Provide user manuals and support materials.
Address common troubleshooting scenarios.
Step 6: Pilot Testing
Before full-scale implementation, conduct a pilot test:
Use the system in a controlled environment.
Monitor for any issues or inefficiencies.
Gather feedback from staff and customers.
Step 7: Go Live
Once testing is complete, it’s time to roll out the system:
Schedule the launch during a low-traffic period to minimize disruptions.
Ensure on-site support is available for the initial days.
Communicate the change to your team and customers.
Step 8: Monitor and Optimize
Implementation doesn’t end with the launch. Regular monitoring is essential:
Analyze performance metrics (e.g., transaction times, error rates).
Update the system as needed to fix bugs and improve features.
Seek ongoing feedback from employees and customers.
Conclusion
Implementing a POS system is an investment in your business's future. With proper planning and execution, it can simplify daily operations, enhance customer satisfaction, and drive growth. By following the steps outlined above, you can ensure a smooth and successful implementation.
0 notes
ms-demeanor · 2 months ago
Note
Okay, if anyone knows the answer to this, it's you. I DESPERATELY want to set my mouse to recognize both LMB and RMB as the primary mouse button instead of assigning the non-primary mouse button to bring up context menus, but I cannot find literally any mention of any software or programs that make that possible. Is it something that's technologically impossible or am I just not looking hard enough
This is possible but figuring it out was a pain in the ass and didn't seem like it would work with the hardware that I had but long story short either you need to get a programmable mouse and use the software that comes with it to do this or you need to find software that will work with your current mouse to do this. You can get a wired programmable gaming mouse for under twenty dollars and a wireless one for under thirty.
A few weeks ago I bought a mouse because I wanted to program a shift ctrl v button onto it and I just tested setting both the main buttons to have left button behaviors with the mouse software and it worked great.
64 notes · View notes
cyberstudious · 11 months ago
Text
Tumblr media
An Introduction to Cybersecurity
I created this post for the Studyblr Masterpost Jam, check out the tag for more cool masterposts from folks in the studyblr community!
What is cybersecurity?
Cybersecurity is all about securing technology and processes - making sure that the software, hardware, and networks that run the world do exactly what they need to do and can't be abused by bad actors.
The CIA triad is a concept used to explain the three goals of cybersecurity. The pieces are:
Confidentiality: ensuring that information is kept secret, so it can only be viewed by the people who are allowed to do so. This involves encrypting data, requiring authentication before viewing data, and more.
Integrity: ensuring that information is trustworthy and cannot be tampered with. For example, this involves making sure that no one changes the contents of the file you're trying to download or intercepts your text messages.
Availability: ensuring that the services you need are there when you need them. Blocking every single person from accessing a piece of valuable information would be secure, but completely unusable, so we have to think about availability. This can also mean blocking DDoS attacks or fixing flaws in software that cause crashes or service issues.
What are some specializations within cybersecurity? What do cybersecurity professionals do?
incident response
digital forensics (often combined with incident response in the acronym DFIR)
reverse engineering
cryptography
governance/compliance/risk management
penetration testing/ethical hacking
vulnerability research/bug bounty
threat intelligence
cloud security
industrial/IoT security, often called Operational Technology (OT)
security engineering/writing code for cybersecurity tools (this is what I do!)
and more!
Where do cybersecurity professionals work?
I view the industry in three big chunks: vendors, everyday companies (for lack of a better term), and government. It's more complicated than that, but it helps.
Vendors make and sell security tools or services to other companies. Some examples are Crowdstrike, Cisco, Microsoft, Palo Alto, EY, etc. Vendors can be giant multinational corporations or small startups. Security tools can include software and hardware, while services can include consulting, technical support, or incident response or digital forensics services. Some companies are Managed Security Service Providers (MSSPs), which means that they serve as the security team for many other (often small) businesses.
Everyday companies include everyone from giant companies like Coca-Cola to the mom and pop shop down the street. Every company is a tech company now, and someone has to be in charge of securing things. Some businesses will have their own internal security teams that respond to incidents. Many companies buy tools provided by vendors like the ones above, and someone has to manage them. Small companies with small tech departments might dump all cybersecurity responsibilities on the IT team (or outsource things to a MSSP), or larger ones may have a dedicated security staff.
Government cybersecurity work can involve a lot of things, from securing the local water supply to working for the big three letter agencies. In the U.S. at least, there are also a lot of government contractors, who are their own individual companies but the vast majority of what they do is for the government. MITRE is one example, and the federal research labs and some university-affiliated labs are an extension of this. Government work and military contractor work are where geopolitics and ethics come into play most clearly, so just… be mindful.
What do academics in cybersecurity research?
A wide variety of things! You can get a good idea by browsing the papers from the ACM's Computer and Communications Security Conference. Some of the big research areas that I'm aware of are:
cryptography & post-quantum cryptography
machine learning model security & alignment
formal proofs of a program & programming language security
security & privacy
security of network protocols
vulnerability research & developing new attack vectors
Cybersecurity seems niche at first, but it actually covers a huge range of topics all across technology and policy. It's vital to running the world today, and I'm obviously biased but I think it's a fascinating topic to learn about. I'll be posting a new cybersecurity masterpost each day this week as a part of the #StudyblrMasterpostJam, so keep an eye out for tomorrow's post! In the meantime, check out the tag and see what other folks are posting about :D
47 notes · View notes
beardedmrbean · 26 days ago
Text
NEW DELHI (Reuters) -Global makers of surveillance gear have clashed with Indian regulators in recent weeks over contentious new security rules that require manufacturers of CCTV cameras to submit hardware, software and source code for assessment in government labs, official documents and company emails show.
The security-testing policy has sparked industry warnings of supply disruptions and added to a string of disputes between Prime Minister Narendra Modi's administration and foreign companies over regulatory issues and what some perceive as protectionism.
New Delhi's approach is driven in part by its alarm about China's sophisticated surveillance capabilities, according to a top Indian official involved in the policymaking. In 2021, Modi's then-junior IT minister told parliament that 1 million cameras in government institutions were from Chinese companies and there were vulnerabilities with video data transferred to servers abroad.
Under the new requirements applicable from April, manufacturers such as China's Hikvision, Xiaomi and Dahua, South Korea's Hanwha, and Motorola Solutions of the U.S. must submit cameras for testing by Indian government labs before they can sell them in the world's most populous nation. The policy applies to all internet-connected CCTV models made or imported since April 9.
"There's always an espionage risk," Gulshan Rai, India's cybersecurity chief from 2015 to 2019, told Reuters. "Anyone can operate and control internet-connected CCTV cameras sitting in an adverse location. They need to be robust and secure."
Indian officials met on April 3 with executives of 17 foreign and domestic makers of surveillance gear, including Hanwha, Motorola, Bosch, Honeywell and Xiaomi, where many of the manufacturers said they weren't ready to meet the certification rules and lobbied unsuccessfully for a delay, according to the official minutes.
In rejecting the request, the government said India's policy "addresses a genuine security issue" and must be enforced, the minutes show.
India said in December the CCTV rules, which do not single out any country by name, aimed to "enhance the quality and cybersecurity of surveillance systems in the country."
This report is based on a Reuters review of dozens of documents, including records of meetings and emails between manufacturers and Indian IT ministry officials, and interviews with six people familiar with India's drive to scrutinize the technology. The interactions haven't been previously reported.
Insufficient testing capacity, drawn-out factory inspections and government scrutiny of sensitive source code were among key issues camera makers said had delayed approvals and risked disrupting unspecified infrastructure and commercial projects.
"Millions of dollars will be lost from the industry, sending tremors through the market," Ajay Dubey, Hanwha's director for South Asia, told India's IT ministry in an email on April 9.
The IT ministry and most of the companies identified by Reuters didn't respond to requests for comment about the discussions and the impact of the testing policy. The ministry told the executives on April 3 that it may consider accrediting more testing labs.
Millions of CCTV cameras have been installed across Indian cities, offices and residential complexes in recent years to enhance security monitoring. New Delhi has more than 250,000 cameras, according to official data, mostly mounted on poles in key locations.
The rapid take-up is set to bolster India's surveillance camera market to $7 billion by 2030, from $3.5 billion last year, Counterpoint Research analyst Varun Gupta told Reuters.
China's Hikvision and Dahua account for 30% of the market, while India's CP Plus has a 48% share, Gupta said, adding that some 80% of all CCTV components are from China.
Hanwha, Motorola Solutions and Britain's Norden Communication told officials by email in April that just a fraction of the industry's 6,000 camera models had approvals under the new rules.
CHINA CONCERN
The U.S. in 2022 banned sales of Hikvision and Dahua equipment, citing national security risks. Britain and Australia have also restricted China-made devices.
Likewise, with CCTV cameras, India "has to ensure there are checks on what is used in these devices, what chips are going in," the senior Indian official told Reuters. "China is part of the concern."
China's state security laws require organizations to cooperate with intelligence work.
Reuters reported this month that unexplained communications equipment had been found in some Chinese solar power inverters by U.S. experts who examined the products.
Since 2020, when Indian and Chinese forces clashed at their border, India has banned dozens of Chinese-owned apps, including TikTok, on national security grounds. India also tightened foreign investment rules for countries with which it shares a land border.
The remote detonation of pagers in Lebanon last year, which Reuters reported was executed by Israeli operatives targeting Hezbollah, further galvanized Indian concerns about the potential abuse of tech devices and the need to quickly enforce testing of CCTV equipment, the senior Indian official said.
The camera-testing rules don't contain a clause about land borders.
But last month, China's Xiaomi said that when it applied for testing of CCTV devices, Indian officials told the company the assessment couldn't proceed because "internal guidelines" required Xiaomi to supply more registration details of two of its China-based contract manufacturers.
"The testing lab indicated that this requirement applies to applications originating from countries that share a land border with India," the company wrote in an April 24 email to the Indian agency that oversees lab testing.
Xiaomi didn't respond to Reuters queries, and the IT ministry didn't address questions about the company's account.
China's foreign ministry told Reuters it opposes the "generalization of the concept of national security to smear and suppress Chinese companies," and hoped India would provide a non-discriminatory environment for Chinese firms.
LAB TESTING, FACTORY VISITS
While CCTV equipment supplied to India's government has had to undergo testing since June 2024, the widening of the rules to all devices has raised the stakes.
The public sector accounts for 27% of CCTV demand in India, and enterprise clients, industry, hospitality firms and homes the remaining 73%, according to Counterpoint.
The rules require CCTV cameras to have tamper-proof enclosures, strong malware detection and encryption.
Companies need to run software tools to test source code and provide reports to government labs, two camera industry executives said.
The rules allow labs to ask for source code if companies are using proprietary communication protocols in devices, rather than standard ones like Wi-Fi. They also enable Indian officials to visit device makers abroad and inspect facilities for cyber vulnerabilities.
The Indian unit of China's Infinova told IT ministry officials last month the requirements were creating challenges.
"Expectations such as source code sharing, retesting post firmware upgrades, and multiple factory audits significantly impact internal timelines," Infinova sales executive Sumeet Chanana said in an email on April 10. Infinova didn't respond to Reuters questions.
The same day, Sanjeev Gulati, India director for Taiwan-based Vivotek, warned Indian officials that "All ongoing projects will go on halt." He told Reuters this month that Vivotek had submitted product applications and hoped "to get clearance soon."
The body that examines surveillance gear is India's Standardization Testing and Quality Certification Directorate, which comes under the IT ministry. The agency has 15 labs that can review 28 applications concurrently, according to data on its website that was removed after Reuters sent questions. Each application can include up to 10 models.
As of May 28, 342 applications for hundreds of models from various manufacturers were pending, official data showed. Of those, 237 were classified as new, with 142 lodged since the April 9 deadline.
Testing had been completed on 35 of those applications, including just one from a foreign company.
India's CP Plus told Reuters it had received clearance for its flagship cameras but several more models were awaiting certification.
Bosch said it too had submitted devices for testing, but asked that Indian authorities "allow business continuity" for those products until the process is completed.
When Reuters visited New Delhi's bustling Nehru Place electronics market last week, shelves were stacked with popular CCTV cameras from Hikvision, Dahua and CP Plus.
But Sagar Sharma said revenue at his CCTV retail shop had plunged about 50% this month from April because of the slow pace of government approvals for security cameras.
"It is not possible right now to cater to big orders," he said. "We have to survive with the stock we have."
7 notes · View notes
usafphantom2 · 11 months ago
Text
Tumblr media
B-2 Gets Big Upgrade with New Open Mission Systems Capability
July 18, 2024 | By John A. Tirpak
The B-2 Spirit stealth bomber has been upgraded with a new open missions systems (OMS) software capability and other improvements to keep it relevant and credible until it’s succeeded by the B-21 Raider, Northrop Grumman announced. The changes accelerate the rate at which new weapons can be added to the B-2; allow it to accept constant software updates, and adapt it to changing conditions.
“The B-2 program recently achieved a major milestone by providing the bomber with its first fieldable, agile integrated functional capability called Spirit Realm 1 (SR 1),” the company said in a release. It announced the upgrade going operational on July 17, the 35th anniversary of the B-2’s first flight.
SR 1 was developed inside the Spirit Realm software factory codeveloped by the Air Force and Northrop to facilitate software improvements for the B-2. “Open mission systems” means that the aircraft has a non-proprietary software architecture that simplifies software refresh and enhances interoperability with other systems.
“SR 1 provides mission-critical capability upgrades to the communications and weapons systems via an open mission systems architecture, directly enhancing combat capability and allowing the fleet to initiate a new phase of agile software releases,” Northrop said in its release.
The system is intended to deliver problem-free software on the first go—but should they arise, correct software issues much earlier in the process.
The SR 1 was “fully developed inside the B-2 Spirit Realm software factory that was established through a partnership with Air Force Global Strike Command and the B-2 Systems Program Office,” Northrop said.
The Spirit Realm software factory came into being less than two years ago, with four goals: to reduce flight test risk and testing time through high-fidelity ground testing; to capture more data test points through targeted upgrades; to improve the B-2’s functional capabilities through more frequent, automated testing; and to facilitate more capability upgrades to the jet.
The Air Force said B-2 software updates which used to take two years can now be implemented in less than three months.
In addition to B61 or B83 nuclear weapons, the B-2 can carry a large number of precision-guided conventional munitions. However, the Air Force is preparing to introduce a slate of new weapons that will require near-constant target updates and the ability to integrate with USAF’s evolving long-range kill chain. A quicker process for integrating these new weapons with the B-2’s onboard communications, navigation, and sensor systems was needed.
The upgrade also includes improved displays, flight hardware and other enhancements to the B-2’s survivability, Northrop said.
“We are rapidly fielding capabilities with zero software defects through the software factory development ecosystem and further enhancing the B-2 fleet’s mission effectiveness,” said Jerry McBrearty, Northrop’s acting B-2 program manager.
The upgrade makes the B-2 the first legacy nuclear weapons platform “to utilize the Department of Defense’s DevSecOps [development, security, and operations] processes and digital toolsets,” it added.
The software factory approach accelerates adding new and future weapons to the stealth bomber, and thus improve deterrence, said Air Force Col. Frank Marino, senior materiel leader for the B-2.
The B-2 was not designed using digital methods—the way its younger stablemate, the B-21 Raider was—but the SR 1 leverages digital technology “to design, manage, build and test B-2 software more efficiently than ever before,” the company said.
The digital tools can also link with those developed for other legacy systems to accomplish “more rapid testing and fielding and help identify and fix potential risks earlier in the software development process.”
Following two crashes in recent years, the stealthy B-2 fleet comprises 19 aircraft, which are the only penetrating aircraft in the Air Force’s bomber fleet until the first B-21s are declared to have achieved initial operational capability at Ellsworth Air Force Base, S.D. A timeline for IOC has not been disclosed.
The B-2 is a stealthy, long-range, penetrating nuclear and conventional strike bomber. It is based on a flying wing design combining LO with high aerodynamic efficiency. The aircraft’s blended fuselage/wing holds two weapons bays capable of carrying nearly 60,000 lb in various combinations.
Spirit entered combat during Allied Force on March 24, 1999, striking Serbian targets. Production was completed in three blocks, and all aircraft were upgraded to Block 30 standard with AESA radar. Production was limited to 21 aircraft due to cost, and a single B-2 was subsequently lost in a crash at Andersen, Feb. 23, 2008.
Modernization is focused on safeguarding the B-2A’s penetrating strike capability in high-end threat environments and integrating advanced weapons.
The B-2 achieved a major milestone in 2022 with the integration of a Radar Aided Targeting System (RATS), enabling delivery of the modernized B61-12 precision-guided thermonuclear freefall weapon. RATS uses the aircraft’s radar to guide the weapon in GPS-denied conditions, while additional Flex Strike upgrades feed GPS data to weapons prerelease to thwart jamming. A B-2A successfully dropped an inert B61-12 using RATS on June 14, 2022, and successfully employed the longer-range JASSM-ER cruise missile in a test launch last December.
Ongoing upgrades include replacing the primary cockpit displays, the Adaptable Communications Suite (ACS) to provide Link 16-based jam-resistant in-flight retasking, advanced IFF, crash-survivable data recorders, and weapons integration. USAF is also working to enhance the fleet’s maintainability with LO signature improvements to coatings, materials, and radar-absorptive structures such as the radome and engine inlets/exhausts.
Two B-2s were damaged in separate landing accidents at Whiteman on Sept. 14, 2021, and Dec. 10, 2022, the latter prompting an indefinite fleetwide stand-down until May 18, 2023. USAF plans to retire the fleet once the B-21 Raider enters service in sufficient numbers around 2032.
Contractors: Northrop Grumman; Boeing; Vought.
First Flight: July 17, 1989.
Delivered: December 1993-December 1997.
IOC: April 1997, Whiteman AFB, Mo.
Production: 21.
Inventory: 20.
Operator: AFGSC, AFMC, ANG (associate).
Aircraft Location: Edwards AFB, Calif.; Whiteman AFB, Mo.
Active Variant: •B-2A. Production aircraft upgraded to Block 30 standards.
Dimensions: Span 172 ft, length 69 ft, height 17 ft.
Weight: Max T-O 336,500 lb.
Power Plant: Four GE Aviation F118-GE-100 turbofans, each 17,300 lb thrust.
Performance: Speed high subsonic, range 6,900 miles (further with air refueling).
Ceiling: 50,000 ft.
Armament: Nuclear: 16 B61-7, B61-12, B83, or eight B61-11 bombs (on rotary launchers). Conventional: 80 Mk 62 (500-lb) sea mines, 80 Mk 82 (500-lb) bombs, 80 GBU-38 JDAMs, or 34 CBU-87/89 munitions (on rack assemblies); or 16 GBU-31 JDAMs, 16 Mk 84 (2,000-lb) bombs, 16 AGM-154 JSOWs, 16 AGM-158 JASSMs, or eight GBU-28 LGBs.
Accommodation: Two pilots on ACES II zero/zero ejection seats.
21 notes · View notes
spacetimewithstuartgary · 5 months ago
Text
Tumblr media
NASA and Italian Space Agency test future lunar navigation technology
As the Artemis campaign leads humanity to the moon and eventually Mars, NASA is refining its state-of-the-art navigation and positioning technologies to guide a new era of lunar exploration.
A technology demonstration helping pave the way for these developments is the Lunar GNSS Receiver Experiment (LuGRE) payload, a joint effort between NASA and the Italian Space Agency to demonstrate the viability of using existing GNSS (Global Navigation Satellite System) signals for positioning, navigation, and timing on the moon.
During its voyage on an upcoming delivery to the moon as part of NASA's CLPS (Commercial Lunar Payload Services) initiative, LuGRE would demonstrate acquiring and tracking signals from both the U.S. GPS and European Union Galileo GNSS constellations during transit to the moon, during lunar orbit, and finally for up to two weeks on the lunar surface itself.
The LuGRE payload is one of the first demonstrations of GNSS signal reception and navigation on and around the lunar surface, an important milestone for how lunar missions will access navigation and positioning technology.
If successful, LuGRE would demonstrate that spacecraft can use signals from existing GNSS satellites at lunar distances, reducing their reliance on ground-based stations on the Earth for lunar navigation.
Today, GNSS constellations support essential services like navigation, banking, power grid synchronization, cellular networks, and telecommunications. Near-Earth space missions use these signals in flight to determine critical operational information like location, velocity, and time.
NASA and the Italian Space Agency want to expand the boundaries of GNSS use cases. In 2019, the Magnetospheric Multiscale (MMS) mission broke the world record for farthest GPS signal acquisition 116,300 miles from the Earth's surface—nearly half of the 238,900 miles between Earth and the moon. Now, LuGRE could double that distance.
"GPS makes our lives safer and more viable here on Earth," said Kevin Coggins, NASA deputy associate administrator and SCaN (Space Communications and Navigation) Program manager at NASA Headquarters in Washington. "As we seek to extend humanity beyond our home planet, LuGRE should confirm that this extraordinary technology can do the same for us on the moon."
Reliable space communication and navigation systems play a vital role in all NASA missions, providing crucial connections from space to Earth for crewed and uncrewed missions alike. Using a blend of government and commercial assets, NASA's Near Space and Deep Space Networks support science, technology demonstrations, and human spaceflight missions across the solar system.
"This mission is more than a technological milestone," said Joel Parker, policy lead for positioning, navigation, and timing at NASA's Goddard Space Flight Center in Greenbelt, Maryland.
"We want to enable more and better missions to the moon for the benefit of everyone, and we want to do it together with our international partners."
The data-gathering LuGRE payload combines NASA-led systems engineering and mission management with receiver software and hardware developed by the Italian Space Agency and their industry partner Qascom—the first Italian-built hardware to operate on the lunar surface.
Any data LuGRE collects is intended to open the door for use of GNSS to all lunar missions, not just those by NASA or the Italian Space Agency. Approximately six months after LuGRE completes its operations, the agencies will release its mission data to broaden public and commercial access to lunar GNSS research.
"A project like LuGRE isn't about NASA alone," said NASA Goddard navigation and mission design engineer Lauren Konitzer. "It's something we're doing for the benefit of humanity. We're working to prove that lunar GNSS can work, and we're sharing our discoveries with the world."
The LuGRE payload is one of 10 science experiments launching to the lunar surface on this delivery through NASA's CLPS initiative.
Through CLPS, NASA works with American companies to provide delivery and quantity contracts for commercial deliveries to further lunar exploration and the development of a sustainable lunar economy. As of 2024, the agency has 14 private partners on contract for current and future CLPS missions.
Demonstrations like LuGRE could lay the groundwork for GNSS-based navigation systems on the lunar surface. Bridging these existing systems with emerging lunar-specific navigation solutions has the potential to define how all spacecraft navigate lunar terrain in the Artemis era.
The payload is a collaborative effort between NASA's Goddard Space Flight Center and the Italian Space Agency.
8 notes · View notes
enaistyping · 9 months ago
Text
Sep 17, 2024
Update from the last week or so:
School is going somewhat well; I was falling behind in some of my classes for whatever reason but I've managed to catch up and stay on top of things, which I found is very difficult for me sometimes. I struggle to stay motivated to work on homework and put the necessary time in for studying, but it is important to remember discipline >>> motivation. I've found that once I start working on a project for a few minutes without distraction, it pushes me into the working mindset and it is easier to stay focused on that task.
Tumblr media
(snippet from my first comp sci lab this year ^^)
In computer science news:
I have joined two (2) computer and technology related clubs this year!
Linux Users Group : a club dedicated to the learning of everything Linux based. Terminal work to Ricing !
Unmanned Arial Systems Club (UAS) : a club dedicated to drone projects, testing and competing. The main goal of the club is to compete with other drones in professional competitions to land parcels onto specific targets. There are many different moving parts to the club in terms of what one can work on; hardware, software and flying the drone itself! I really am enjoying this club even after two meetings, it is very interactive and I feel very welcomed and encouraged here ! :3
One thing that is difficult about being a women in a tech field with tech interests is that very often I am the only girl at these functions. Luckily there are many people who are welcoming to new members and ideas in these organizations, but it is still a challenge to fit in as a women sometimes.
One final note; a personal project! I've been ricing my Ubuntu desktop with Conky which has been a great learning experience and a challenge. I am so happy with the knowledge I have gained from this project, even though I am not fully done. If anyone has any tips or ideas for ricing with Conky on Ubuntu, please let me know!
Study hard and know that you are loved ! <3
Tumblr media
11 notes · View notes
rjzimmerman · 10 months ago
Text
The Carbon Footprint of Amazon, Google, and Facebook Is Growing. (Sierra Club)
Excerpt from this story from Sierra Club:
IN MARCH The Information reported that Microsoft was in talks with OpenAI, the creator of ChatGPT, about spending an eye-popping $100 billion on a gargantuan data center in Wisconsin dedicated to running artificial intelligence software. Code-named “Stargate,” the data center would, at full operation, consume five gigawatts of electricity, enough to power 3.7 million homes. For comparison purposes, that’s roughly the same amount of power produced by Plant Vogtle, the big nuclear power station in Georgia that cost $30 billion to build.
Stargate is in the earliest of planning stages, but the sheer scale of the proposal reflects a truth about artificial intelligence: AI is an energy hog. That’s an embarrassing about-face for the technology industry. For at least 20 years, American electricity consumption has hardly grown at all—owing in part, say computer scientists, to steady advances in energy efficiency that have percolated out of the tech industry into the larger economy. In 2023, according to the US Energy Information Administration, total electricity consumption fell slightly from 2022 levels.
But according to a report published last December by Grid Strategies, a consultancy that advises on energy policy, multiple electric utilities now predict that US energy demand will rise by up to 5 percent over the next five years. One of the chief culprits responsible for the surge, say the utilities, are new data centers designed to run AI. To meet the growing demand for power, those utilities want to build new fossil fuel power plants and to dismantle climate legislation that stands in their way.
For environmentalists, this represents a giant step backward. Artificial intelligence was supposed to help us solve problems. What good are ChatGPT and its ilk if using them worsens global warming?
This is a relatively new story—the AI gold rush is still in its infancy, ChatGPT only having debuted in fall 2022. But computing’s energy demands have been growing for decades, ever since the internet became an indispensable part of daily life. Every Zoom call, Netflix binge, Google search, YouTube video, and TikTok dance is processed in a windowless, warehouse-like building filled with thousands of pieces of computer hardware. These data centers are where the internet happens, the physical manifestation of the so-called cloud—perhaps as far away from ethereality as you can get.
In the popular mind, the cloud is often thought of in the simple sense of storage. This is where we back up our photos, our videos, our Google Docs. But that’s just a small slice of it: For the past 20 years, computation itself has increasingly been outsourced to data centers. Corporations, governments, research institutions, and others have discovered that it is cheaper and more efficient to rent computing services from Big Tech.
The crucial point, writes anthropologist Steven Gonzalez Monserrate in his case study The Cloud Is Material: On the Environmental Impacts of Computation and Data Storage, is that “heat is the waste product of computation.” Data centers consume so much energy because computer chips produce large amounts of heat. Roughly 40 percent of a data center’s electricity bill is the result of just keeping things cool. And the new generation of AI software is far more processor intensive and power hungry than just about anything—with the notable exception of cryptocurrency—that has come before.
The energy cost of AI and its perverse, climate-unfriendly incentives for electric utilities are a gut check for a tech industry that likes to think of itself as changing the world for the better. Michelle Solomon, an analyst at the nonprofit think tank Energy Innovation, calls the AI power crunch “a litmus test” for a society threatened by climate change.
11 notes · View notes
schistcity · 1 year ago
Text
the thing that gets me about the lack of technological literacy in a lot of young gen z and gen alpha (NOT ALL. JUST A LOT THAT I SEE.) isn't necessarily the knowledge gap so much as it's the lack of curiosity and self-determination when it comes to interacting with technology.
you have the knowledge gap side of things, obviously, which highlights issues related to the experience of using pieces of hardware/software becoming detached from the workings of the hardware/software itself. you start seeing people (so called "ipad kids") who are less and less familiar with the basics of these machines—like knowing how to explore file and system directories, knowing what parts of the system and programs will be using the most power and interacting with each other, knowing what basics like RAM and CPU are and what affects them etc. these aren't things you need to sink a lot of time into understanding, but they seem to be less and less understood as time has gone on.
and this lack of familiarity with the systems at work here feeds into the issue that bothers me a lot more, which is a lack of curiosity, self-determination, and problem solving when younger people use their technology.
i'm not a computer scientist. i'm not an engineer. i have an iphone for on-the-go use and i have a dinky 2017 macbook air i use almost daily. that's it! but i know how to pirate things and how to quality check torrented material. i know how to find things in my system directories. i know how to format an external hard drive for the specifications of my computer. i know how to troubleshoot issues like my computer running slowly, or my icloud not syncing, or more program-specific problems. this is NOT because i actually know a single thing about the ~intricacies~ of hardware or software design, but because i've taken time to practice and to explore my computer systems, and MOST IMPORTANTLY!! to google things i don't know and then test out the solutions i find!!!!
and that sounds obvious but it's so clear that its just not happening as much anymore. i watched a tiktok the other day where someone gave a tutorial on how to reach a spotify plugin by showing how to type its url in a phone's browser search bar, then said "i'll put the url in the comments so you guys can copy and paste it!!!!!" like ?????? can we not even use google on our own anymore?? what's happening???
this was a long post and it sounds so old of me but i hear this lack of literacy far too much and the defence is always that it's not necessary information to know or it's too much work but it is necessary for the longevity and health of your computers and the control you have over them and it ISN'T too much work at all to figure out how to troubleshoot system issues on your own. like PLEASE someone help.
52 notes · View notes
antutu-benchmark · 22 days ago
Text
Antutu Benchmark Comprehensive Guide to Understanding and Using It
Introduction
Antutu Benchmark is one of the most popular and widely used performance testing tools for smartphones and other devices. It provides a detailed score based on multiple tests that measure CPU, GPU, memory, and user experience performance. Whether you’re a tech enthusiast, a buyer comparing devices, or a developer optimizing apps, Antutu Benchmark offers valuable insights into device capabilities.
What is Antutu Benchmark?
Definition and Purpose Antutu Benchmark is an app that runs a series of tests on your device to evaluate its overall performance. It assesses different components like the processor, graphics, memory speed, and user interface fluidity to generate a comprehensive score. This score helps users compare devices and understand their strengths and weaknesses.
Tumblr media
Why Use Antutu Benchmark? Using Antutu Benchmark is important because it provides an objective, standardized way to measure device performance. It helps consumers make informed decisions when purchasing smartphones, tablets, or other gadgets and helps manufacturers optimize hardware and software.
How Does Antutu Benchmark Work?
Key Testing Areas Antutu performs tests in several categories including CPU performance (calculations and multitasking), GPU performance (graphics rendering and gaming), memory speed (RAM and storage performance), and user experience (smoothness of operation).
Score Calculation After running all tests, Antutu combines results into a single score. Higher scores mean better overall performance. This score is often used to rank devices in performance charts and reviews.
Benefits of Using Antutu Benchmark
Device Comparison Made Easy With Antutu Benchmark, you can compare scores of different devices to find which performs better in real-world scenarios.
Helps Identify Bottlenecks By breaking down scores into CPU, GPU, and memory, Antutu helps identify which component might be slowing your device.
How to Use Antutu Benchmark?
Installation Process You can download Antutu Benchmark from official app stores or trusted sources. After installation, simply open the app and start the benchmark test.
Running the Test Make sure your device is charged and close background apps for accurate results. The test takes several minutes and runs through all performance checks automatically.
Common Questions About Antutu Benchmark
Is Antutu Benchmark reliable? Antutu is widely accepted but, like any benchmark, it has limitations. Scores can vary based on device conditions and software versions.
Does running Antutu affect my device? The test is safe but can cause the device to heat up temporarily due to intensive processing.
Tips to Get Accurate Results on Antutu Benchmark
Close All Apps Before testing, close any apps running in the background to avoid interference.
Use the Latest Version Always update Antutu Benchmark to the latest version to get the most accurate and relevant tests.
Antutu Benchmark Scores: What Do They Mean?
youtube
Understanding Scores Scores above 500,000 indicate high-end performance, suitable for gaming and heavy multitasking. Mid-range devices typically score between 200,000 to 400,000.
Comparing Scores Over Time Newer devices usually score higher, reflecting advancements in hardware technology.
Alternatives to Antutu Benchmark
Other Popular Benchmark Apps Besides Antutu, apps like Geekbench, 3DMark, and PCMark offer alternative performance tests focusing on specific aspects like CPU or graphics.
When to Use Alternatives Using multiple benchmarks gives a more rounded view of your device’s capabilities.
Conclusion Antutu Benchmark remains a powerful tool to measure and compare smartphone and device performance. By understanding how it works and interpreting the scores correctly, users can make smarter purchasing decisions and optimize their tech experience.
FAQs
Q1: Can Antutu Benchmark be used on all smartphones? Yes, Antutu supports most Android devices and has a version for iOS with limited features.
Q2: Does Antutu Benchmark require internet? No, you can run the benchmark offline, but internet is needed to check online rankings.
Q3: Why are my Antutu scores different on the same device? Scores can vary due to temperature, battery level, and background processes.
Q4: Can Antutu detect fake or modified devices? Antutu includes security checks that can flag devices with counterfeit or tampered hardware.
Q5: Is a higher Antutu score always better? Generally yes, but real-world performance depends on software optimization and usage scenarios too.
2 notes · View notes
commodorez · 1 year ago
Text
Tumblr media
Revisited: Classic GVP & Amiga Hardware - Robert Miranda
"We, Robert Miranda & Pete Keretz, were in the trenches of Great Valley Products’ Technical Support from ~1989-1994 (combined). We were regular maintainers of the GVP BBS, and we frequented the online FidoNet discussion groups for the Commodore Amiga and GVP Tech Support. We tested many 3rd party hardware and software offerings as part of our day job. That fed our growing passion for computer technology. Stop by to see some of our collection of Amiga expansion gear, and feel free to engage us in the technical memories from the classic Amiga era."
VCF East XIX
10 notes · View notes
ethersierra · 2 years ago
Text
Nanofather shit. Episode 39 spoilers.
So, to start- I seem to have been right about The Nanofather and the way he manifests. He seems to be tapped in to all the hardlight technology, and some of the electronic tech, throughout Steeplechase.
We've seen him manifest in-game within Geltfrimpen and the arcade machine. He's claimed to have manifested in Hard Doug and Grampy. And, at the start of 35 the silence where he would be is replaced by Orwell, being thrown in media-res. He can communicate through hardlight, that's established.
And Krystal has had a rather mysterious opening these past few episodes. First she was calling her mom, then panicked when she disappeared. Then Randy said he was filling in while Krystal was on vacation. Then, Krystal returns suddenly much more forgiving and slightly off, even distorting her usual background music. But in episode 39, The Nanofather opens.
A lot of us had been speculating that Krystal had been replaced with hardlight. And that intro pretty much confirms that. The Nanofather was talking to us through her- and maybe the world of Steeplechase at large.
Back to the revelations in the latest episode:
The Nanofather is the uploaded consciousness of Carmine Denton, to put it simply. Before Carmine's death, he found out he would die, so he took everything he knew, had written, everything that made him *him* and uploaded it to the database, the system, of Dentonic. His entire being was property of the company, him continuing to run it. They would consult him, flip the switch to ask what Carmine would do. That was until hardlight came about, and he expressed concerns about it, and the Dentons cast him off.
But what I did not understand, is why when Emerich brought out Scott Boldflex, The Nanofather had such a hostile reaction. After all, he is connected to hardlight, he even told Emerich how much he admired his work. But then I remembered: Emerich didn't make Scott. Hank Hart did.
The whole thing about hardlight going wrong- the point at which it became overkill for them, and for The Nanofather, was when it was used to replace real people. There is something fundamentally more complicated about them. Hardlight Gravel, for instance, was able to kill. One of the foundational rules of hardlight, as Emerich says, is that they are not able to harm people. This one is different. When Emerich asks Eustace, who was in standby mode at the Prize Palace Pantry, if he heard anything, he explains that he didn't, which is what makes it so unusual.
I think that something about this more advanced hardlight technology deactivates older hardlight tech. Like, this was intentional- Hank & the Dentons had to make sure other hardlight constructs wouldn't detect the commotion to try and stop it, so why not use tech that just cancels them out?
And I think this is why The Nanofather reacted so angrily to Scott. They're like incompatible systems, to borrow a metaphor my friend made.
The Nanofather manifests as a hardlight projection within the rocket. It seems that refractors in the ship create it, rather than having an actual prism. When Emerich studies it, the hardware is different and outdated. But the software is highly advanced. The code is based heavily off the earliest days of hardlight. "Who created this?" Emerich asks. "We all did!" the Nanofather replies. "All the hardlight constructs, working with my occasional nudges." He says the hardlight creations are all talking.
He has been outcast. He's actively being targeted by the Dentons. Why would they want him to have access to the technolgy they have? They want to sever him from it, protect their territory. They do this by slowly replacing things with this newer hardlight tech.
Maybe it starts out as just a test run, with Scott Boldflex. Then the Gallspire. Why else would they spend that much money to replace the heart of Steeplechase with an exact replica? To ward off Carmine. We know The Nanofather has been weakening, and maybe this is why. By killing his principles, replacing the spirit of Steeplechase with things that are physically against the technology he is made of, they're killing him.
46 notes · View notes
linkpowercharging · 3 months ago
Text
Linkpowercharging: Leading the New Era of Electric Mobility
Tumblr media
Founded in 2018, Linkpowercharging has been deeply engaged in the electric vehicle charging field for over 8 years. We specialize in providing comprehensive R&D solutions—including software, hardware, and design—for AC/DC charging stations, enabling our products to hit the ground running. With our expert team and relentless pursuit of innovation, Linkpowercharging has successfully delivered reliable products worth over $100 million to partners in more than 30 countries, including the United States, Canada, Germany, the United Kingdom, France, Singapore, Australia, and more.
Quality and Certification: With a team of over 60 skilled professionals, we have earned authoritative certifications such as ETL, FCC, CE, UKCA, CB, TR25, and RCM, ensuring that our products meet the strictest global safety and quality standards.
Technological Innovation: Our AC and DC fast chargers are powered by OCPP 1.6 software and have undergone rigorous testing with over 100 platform suppliers. We also support upgrades to the latest OCPP 2.0.1. In addition, by integrating IEC/ISO 15118 modules, we are actively advancing V2G (vehicle-to-grid) bidirectional charging technology.
Future Vision: Linkpowercharging is committed to driving the integration of clean energy and intelligent connectivity. In addition to offering high-performance EV charging solutions, we have also developed integrated systems that combine solar photovoltaic (PV) technology and lithium battery energy storage systems (BESS). Our mission is to build a greener, smarter future for global customers.
Whether you’re a forward-thinking business partner or an industry observer passionate about environmental innovation, Linkpowercharging is the trusted choice for your electric mobility transition. Let’s drive the future together and embark on this new era of electric mobility!
2 notes · View notes
fnaflucasverse · 1 year ago
Text
Assorted Fazband Thoughts
sort of a sequel to this ask from @mangleschmidt i got about the animatronics; sort of based on lore by @fivenightsatfreddysfanfiction
ORIGINAL FAZBAND
as i mentioned in the footnotes, the originals (the hardware anyway) were made specifically for the first location by a small robotics company that was later acquired by fazbear entertainment. the base shells were copied/modified from an old blueprint of the springlocks.
the software was provided by jeremy fitzgerald sr., who had taken an interest in the fazband's development. it was a little unusual when he asked to personally oversee the testing of his prototype "security mode", but given he was related to one of the higher-ups, nobody argued. (weird guy, though. didn't work well with others)
the originals don't actually have a programmed free-roam mode, at least not back in the '80s. any walking around they did (one at a time, in a very limited area, under supervision) was directed via remote control. after '87, people started noticing the fazband's movements became a little more... natural, less stiff. then one night they just started walking around on their own.
also in the other posts, the fazbands aren't really capable of independent, sentient thoughts or personalities. well, they're not supposed to be. but very occasionally, outside of showtimes, they would... talk... to themselves, using bits from their showtime voicelines. even when the ghost children would be resting.
i don't know if they're distinct enough from the ghosts to be their own persons, but i have a feeling they aren't completely unaware.
TOY FAZBAND
the toys are technically the third version of the fazband, after the '80s prototype originals and the rudimentary "rockstar" line that was in production from '85-'98 for other freddy's branch locations. the rockstars were cheap and easy to make (think chuck e cheese but worse) and are what the majority of people imagine when thinking "freddy fazbear's pizza". when mike schmidt became a utahn hero after protecting a young teenager from "burglars", fazbear entertainment was starting to roll out the toys and decided to revamp their first location to suit their new colorful image. (the kid might've put in a good word; wasn't he the grandson of one of the higher-ups?)
the toys are a lot simpler than the originals in a lot of ways: design, question of sentience, lack of jaw movement—but they're definitely more technologically advanced. better at walking, too. they also have a version of fitzgerald sr.'s security mode in their programming, after mike's heroism also raised parental worry about their local pizzeria getting robbed. (honestly, i don't think these animatronics actually have facial recognition.)
as for what other animatronic mangle got inextricably combined with... given fredbear doesn't actually have an endoskeleton, i think it may have been dee-dee, balloon boy's counterpart.
i don't exactly know where to put it, but the marionette is also an exclusive first-location "animatronic". the guy who designed the original fazband made it for his daughter, apparently. they visited freddy's a few times, always carrying that thing in tow; something bad happened, and he left it behind.
SPRINGLOCK SUITS
very few people still remember there were two of them. when you take off the ears, the accessories, they look identical. they were supposed to be thrown out, but fitzgerald sr. took a liking to them. too bad he wasn't much of an engineer though, or he maybe would've given the fazband springlocks, too.
7 notes · View notes
teqful · 6 months ago
Text
How-To IT
Topic: Core areas of IT
1. Hardware
• Computers (Desktops, Laptops, Workstations)
• Servers and Data Centers
• Networking Devices (Routers, Switches, Modems)
• Storage Devices (HDDs, SSDs, NAS)
• Peripheral Devices (Printers, Scanners, Monitors)
2. Software
• Operating Systems (Windows, Linux, macOS)
• Application Software (Office Suites, ERP, CRM)
• Development Software (IDEs, Code Libraries, APIs)
• Middleware (Integration Tools)
• Security Software (Antivirus, Firewalls, SIEM)
3. Networking and Telecommunications
• LAN/WAN Infrastructure
• Wireless Networking (Wi-Fi, 5G)
• VPNs (Virtual Private Networks)
• Communication Systems (VoIP, Email Servers)
• Internet Services
4. Data Management
• Databases (SQL, NoSQL)
• Data Warehousing
• Big Data Technologies (Hadoop, Spark)
• Backup and Recovery Systems
• Data Integration Tools
5. Cybersecurity
• Network Security
• Endpoint Protection
• Identity and Access Management (IAM)
• Threat Detection and Incident Response
• Encryption and Data Privacy
6. Software Development
• Front-End Development (UI/UX Design)
• Back-End Development
• DevOps and CI/CD Pipelines
• Mobile App Development
• Cloud-Native Development
7. Cloud Computing
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Software as a Service (SaaS)
• Serverless Computing
• Cloud Storage and Management
8. IT Support and Services
• Help Desk Support
• IT Service Management (ITSM)
• System Administration
• Hardware and Software Troubleshooting
• End-User Training
9. Artificial Intelligence and Machine Learning
• AI Algorithms and Frameworks
• Natural Language Processing (NLP)
• Computer Vision
• Robotics
• Predictive Analytics
10. Business Intelligence and Analytics
• Reporting Tools (Tableau, Power BI)
• Data Visualization
• Business Analytics Platforms
• Predictive Modeling
11. Internet of Things (IoT)
• IoT Devices and Sensors
• IoT Platforms
• Edge Computing
• Smart Systems (Homes, Cities, Vehicles)
12. Enterprise Systems
• Enterprise Resource Planning (ERP)
• Customer Relationship Management (CRM)
• Human Resource Management Systems (HRMS)
• Supply Chain Management Systems
13. IT Governance and Compliance
• ITIL (Information Technology Infrastructure Library)
• COBIT (Control Objectives for Information Technologies)
• ISO/IEC Standards
• Regulatory Compliance (GDPR, HIPAA, SOX)
14. Emerging Technologies
• Blockchain
• Quantum Computing
• Augmented Reality (AR) and Virtual Reality (VR)
• 3D Printing
• Digital Twins
15. IT Project Management
• Agile, Scrum, and Kanban
• Waterfall Methodology
• Resource Allocation
• Risk Management
16. IT Infrastructure
• Data Centers
• Virtualization (VMware, Hyper-V)
• Disaster Recovery Planning
• Load Balancing
17. IT Education and Certifications
• Vendor Certifications (Microsoft, Cisco, AWS)
• Training and Development Programs
• Online Learning Platforms
18. IT Operations and Monitoring
• Performance Monitoring (APM, Network Monitoring)
• IT Asset Management
• Event and Incident Management
19. Software Testing
• Manual Testing: Human testers evaluate software by executing test cases without using automation tools.
• Automated Testing: Use of testing tools (e.g., Selenium, JUnit) to run automated scripts and check software behavior.
• Functional Testing: Validating that the software performs its intended functions.
• Non-Functional Testing: Assessing non-functional aspects such as performance, usability, and security.
• Unit Testing: Testing individual components or units of code for correctness.
• Integration Testing: Ensuring that different modules or systems work together as expected.
• System Testing: Verifying the complete software system’s behavior against requirements.
• Acceptance Testing: Conducting tests to confirm that the software meets business requirements (including UAT - User Acceptance Testing).
• Regression Testing: Ensuring that new changes or features do not negatively affect existing functionalities.
• Performance Testing: Testing software performance under various conditions (load, stress, scalability).
• Security Testing: Identifying vulnerabilities and assessing the software’s ability to protect data.
• Compatibility Testing: Ensuring the software works on different operating systems, browsers, or devices.
• Continuous Testing: Integrating testing into the development lifecycle to provide quick feedback and minimize bugs.
• Test Automation Frameworks: Tools and structures used to automate testing processes (e.g., TestNG, Appium).
19. VoIP (Voice over IP)
VoIP Protocols & Standards
• SIP (Session Initiation Protocol)
• H.323
• RTP (Real-Time Transport Protocol)
• MGCP (Media Gateway Control Protocol)
VoIP Hardware
• IP Phones (Desk Phones, Mobile Clients)
• VoIP Gateways
• Analog Telephone Adapters (ATAs)
• VoIP Servers
• Network Switches/ Routers for VoIP
VoIP Software
• Softphones (e.g., Zoiper, X-Lite)
• PBX (Private Branch Exchange) Systems
• VoIP Management Software
• Call Center Solutions (e.g., Asterisk, 3CX)
VoIP Network Infrastructure
• Quality of Service (QoS) Configuration
• VPNs (Virtual Private Networks) for VoIP
• VoIP Traffic Shaping & Bandwidth Management
• Firewall and Security Configurations for VoIP
• Network Monitoring & Optimization Tools
VoIP Security
• Encryption (SRTP, TLS)
• Authentication and Authorization
• Firewall & Intrusion Detection Systems
• VoIP Fraud DetectionVoIP Providers
• Hosted VoIP Services (e.g., RingCentral, Vonage)
• SIP Trunking Providers
• PBX Hosting & Managed Services
VoIP Quality and Testing
• Call Quality Monitoring
• Latency, Jitter, and Packet Loss Testing
• VoIP Performance Metrics and Reporting Tools
• User Acceptance Testing (UAT) for VoIP Systems
Integration with Other Systems
• CRM Integration (e.g., Salesforce with VoIP)
• Unified Communications (UC) Solutions
• Contact Center Integration
• Email, Chat, and Video Communication Integration
2 notes · View notes
usafphantom2 · 1 year ago
Text
Tumblr media
F-22 Retirement in 2030 Unlikely as USAF Looks to Spend $7.8 Billion on It Before Then
March 27, 2024 | By John A. Tirpak
The Air Force seems to be rethinking its plan to start retiring the F-22 around 2030, as its spending plans for the air dominance fighter go well beyond that date, according to the service’s fiscal 2025 budget request.
The Air Force’s planned F-22 budget through fiscal year 2029 includes $4.7 billion for procurement and $3.1 for research, development, test, and evaluation, for a total of $7.8 billion. While the RDT&E line closes out in FY29, procurement beyond that date—labeled “to completion” in budget documents—comes to $1.2 billion.
Senior Air Force leaders have described the F-22 program now through 2030 as a “bridge” to the Next-Generation Air Dominance Fighter and its family of systems, and several have said that the technologies being developed for the F-22 in its waning service years will be directly applicable to NGAD.
The budget assumes the F-22 fleet will be reduced by 32 aircraft, to about 153 airplanes, but the documents say only 142 will receive the full lineup of improvements.
The 32 jets the Air Force wants to divest are of the Block 20 configuration, and Air Force Secretary Frank Kendall has said it would cost upwards of $50 million each to bring them up to Block 30, the most up-to-date standard. The Air Force prefers to spend that money making the younger models more capable against the anticipated threat; mainly the air-to-air challenge posed by China’s fifth-generation fighters and advanced air-to-air missiles.
The Air Force has also said that a congressional mandate to upgrade the older F-22s—which have been used only as training jets—couldn’t be accomplished until it was almost time to retire them. They would also need all the new capabilities the F-22 is receiving, to preserve fleet standardization, at even greater cost.
Pentagon officials agreed that, despite the urgency of the threat, it would be foolish to upgrade the F-22s at such expense and retire them a few months later. One said that the timing of the F-22’s retirement “hasn’t been decided … and it depends on progress with NGAD” and other factors.
Budget justification documents for the F-22 say that the procurement activities over the next five years will upgrade “the air vehicle, engine, Operational Flight Program (OFP), and training systems to improve F-22 weapons, communications, navigation, pilot-vehicle interface, and electronic warfare suite.”
Updates called out in the documents show the Air Force is giving the F-22 stealthy, range-extending drop tanks, infrared sensors, identification, friend-or-foe improvements, better Link 16 connectivity, software upgrades, and electronic warfare and navigation enhancements, as well as new weapons and hardware changes to make it more reliable and available.
The long-range tanks and infrared systems were revealed in artwork released by Air Combat Command in mid-2022, without explanation at the time. Test aircraft sporting the new underwing tanks and IR sensors have since been photographed near western test ranges, but the Air Force has declined to discuss them.
Tumblr media
Among the new capabilities being prepared for the F-22 Raptor are the still-classified AIM-260 Joint Advanced Tactical Missile, evoked here in an image released in 2022 by Gen. Mark Kelly, head of Air Combat Command. Developed by Lockheed Martin, JATM is an air-to-air weapon designed to attack targets beyond visual range. It is needed to counter China’s next-generation PL-15 weapon. USAF illustration
The budget documents say the critical design review for the stealthy tanks took place in early 2023 and that technology demonstrations have been underway since. “Required Assets Available” with the tanks, which usually translates to initial operational capability, is set for the second quarter of fiscal 2026.
The infrared detection system (IRDS), which is likely to be the two slender, chiseled pods on the outer wing of the F-22 in the artwork, will enter full-up flight test in the first quarter of fiscal 2026. Production is to begin in early 2028, with deliveries the following year.
A sensor enhancement package for the F-22 includes IRST and possibly radar and other detection systems. Together, they will “improve the F-22’s sensing and tracking and ensures Air Superiority by preserving the first-look, first-shot and first-kill capabilities of the 142 Block 30/35 F-22 aircraft,” according to the justifications.
“The first 71 Sensor Enhancements Group A kits were purchased under F-22’s Rapid Fielding Middle Tier Acquisition (MTA) program authority,” the Air Force said. The new sensors are slated for flight demonstration in FY24. A follow-on production decision is scheduled to follow closely. Developmental Test and Evaluation is scheduled for the third quarter of FY25, and in the last quarter of FY26, Operational Test and Evaluation will begin.
The low-drag tank and pylons “are advanced technological designs” which will “minimally increase drag” while permitting longer range, even at supersonic speed, for the F-22.
“The pylons are equipped with smart rack pneumatic technology to accurately control ejection performance and maintain minimum drag without stores,” the documents said.
The program calls for 286 each of the tanks and pylons—enough to fully equip 143 jets, at two for each jet. They have to work at a speed of at least Mach 1.2. Wind tunnel and ground tests were completed in fiscal 2023, and flight testing is targeted to begin in the second quarter of fiscal 2024, shortly after which a critical design review is scheduled. The initial lots will be bought later in FY24. Developmental and operational testing is set to conclude in mid-fiscal 2026, with required assets available soon after.
The F-22 will also get a new Controlled Reception Pattern Antenna to help it navigate in a “GPS-degraded environment,” and achieve resilient position, navigation and timing. Retrofits will be made on 142 F-22s, of which 27 will be operated by the Air National Guard. There will be a production readiness review in June of this year, and flight testing starts in early 2025.
A series of reliability, availability, and maintainability program (RAMP) initiatives meant to make the F-22 more ready when needed are also in the funding plan. Candidates were selected for their ability to rapidly reduce maintenance workload or increased durability of the F-22’s stealth features. There is “high variability in the number of projects and kit quantities,” the Air Force said in its budget justification books.
“The RAMP program includes funding for retrofit installation labor and modifications which address corrosion, reduce maintenance hours, increase safety and provide urgent response requirements identified by the user to the F-22 fleet,” the Air Force said. These projects are also addressing safety-of-flight issues and to ease “technology insertion.” One such program replaces old fiber-optic cabling; another for a “Low Observable Mighty Tough Boot … leads to an estimated three percent increase in aircraft reliability.”
What was originally an ad-hoc Link 16 connectivity program now gives the F-22 a transmit/receive capability with Link 16 rehosted to a system that also plugs it into the Multi-functional Information Distribution Service/Joint Tactical Radio System (MIDS/JTRS), with an open architecture to speed insertion of new capabilities.
Much of the F-22 RDT&E request is for software to integrate and exploit all the new sensors and equipment the fleet will receive. The Air Force is attempting to “leverage commercially-based agile software and hardware best practices and tools” to speed the introduction of new capabilities. It’s also funding Software Integration Labs for most of the specific systems.
Other RDT&E efforts include cryptographic upgrades, technology demonstrations, “threat modeling support,” engine enhancements cybersecurity and open mission system (OMS) integration. Software is to be delivered “using a scheduled cadence for capabilities as they mature.”
The RDT&E program also includes “Project Geyser,” described as an “advanced capability” that will be assessed for “fielding configuration options.” No details were given about this project, but there will be “continued flight demonstrations and … test fleet modification into planned production configuration” in fiscal 2025.
@AirandSpaceForces.com via X
15 notes · View notes