{"id":5324,"date":"2023-05-23T18:53:13","date_gmt":"2023-05-23T16:53:13","guid":{"rendered":"https:\/\/actrans.de\/?p=5324"},"modified":"2024-05-29T16:45:56","modified_gmt":"2024-05-29T14:45:56","slug":"software-defined-defense-key-to-combat-superiority","status":"publish","type":"post","link":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/","title":{"rendered":"Software-defined Defense &#8211; Key to Combat Superi\u00adority"},"content":{"rendered":"\n<p><strong>By Dr. Martin Krause and Dr. Mike K\u00f6rner  \/\/<\/strong><\/p>\n\n\n\n<p>Today, most products in the defense sector can no longer do without software, and digiti\u00adzation is becoming an increasingly important differ\u00adentiator. In recent months, a paradigm shift towards software as the defining element has become increasingly apparent. Is software-defined defense on the way?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Software-defined Defense<\/h3>\n\n\n\n<p>Software-defined defense describes a sophisticated combination of hardware and software in which the entire functionality spectrum of the armament system is constructed around the functionality of the software. This does not represent a proprietary system, but an open, modular architecture with standardized interfaces for hardware and especially for software. While hardware is often exhausted to a significant extend, software-driven functionalities offer a comparatively high potential to enhance the performance of the overall system.<\/p>\n\n\n\n<p>Civilian products where a combination of hardware and software has been successfully built around software functionality include the iPhone or Elon Musk&#8217;s Tesla cars.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Advantages and possible applications<\/h3>\n\n\n\n<p>This offers numerous advantages, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fundamental new functionalities<\/li>\n\n\n\n<li>Shorter development times<\/li>\n\n\n\n<li>Lower development costs<\/li>\n\n\n\n<li>Higher flexibility<\/li>\n\n\n\n<li>Interchangeability of individual modules<\/li>\n\n\n\n<li>Higher potential for performance enhancing upgrades<\/li>\n<\/ul>\n\n\n\n<p>It is a data-centric approach where automation is not necessarily about operating autonomous systems without a human operator (human-out-of-loop). Rather, it enables one operator to efficiently and effectively monitor and guide a large number of systems, such as a swarm of drones (human-on-loop).<\/p>\n\n\n\n<p>Possible applications for software-defined defense exist in almost all areas of the armed forces: autonomous systems (UxS), manned-unmanned teaming (MUM-T), command and control (C2), cyber warfare, networked communications, virtual\/ augmented reality (VR\/ AR), logistics, electronic warfare (EW), intelligence, surveillance and reconnaissance (ISR), and many more.<\/p>\n\n\n\n<p>While the software portion is on the rise with every new military system, these systems are mostly based on proprietary software that is only sporadically developed once the systems are delivered. Software-defined defense is still in its infancy and no complete system has yet been developed based on this concept. Various major development programs such as the Future Combat Air System (FCAS) are attempting to create cross-domain networking of sensors, effectors, and situation pictures at a previously unattainable level. This is being done through new approaches such as a Multi-domain Combat Cloud. However, there are also initial examples, which can already be observed in the Ukraine war.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Starlink &#8211; resilience through flexibility<\/h3>\n\n\n\n<p>Elon Musk&#8217;s Starlink communication satellites proved particularly important for Ukraine&#8217;s military coordination. Their forces relied on the small, portable terminals to communicate and relay information across the battlefield. The Starlink terminals were also integrated directly onto reconnaissance drones, allowing them to reconnoiter enemy positions and relay target coordinates directly to artillery via Starlink satellites. This has led to a significant shortening of the so-called &#8220;kill chain&#8221;.<\/p>\n\n\n\n<p>Russia attempted to disrupt Starlink communications in the early months using electronic warfare and targeted jamming attacks on the frequencies used. However, these jamming attacks were only successful for a short period of time. At Starlink, a software update for the satellites and terminals was developed in a very short time, which successfully repelled the Russian jamming attacks. The Starlink system thus proved adaptable and resilient via software updates. Classical proprietary satellite systems without the possibility of software updates would not have been capable of this adaptation in the frequency spectrum. Military experts were enthusiastic about the possibilities of such software updates.<\/p>\n\n\n\n<p>However, there are now increasing reports that Russia is back in the lead, as Russian electronic warfare (Tobol system) now relies on a different attack vector. Instead of jamming the frequencies, reports say that they are relying on jamming the GPS signal. This disrupts or complicates synchronization between the Starlink ground station and the Starlink satellite. How Starlink will respond to this new challenge remains to be seen. However, scientists have now demonstrated that the signals from Starlink satellites can be used to determine position with an accuracy of eight meters. This inherent GPS alternative could put Starlink back in the lead over Russian electronic warfare and, of course, would have other interesting applications. The Starlink example provides a preview of the speed and dynamics of mutual adaptations in future software-defined defense.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Challenges for the introduction of Software-defined Defense<\/h3>\n\n\n\n<p>The rapid adoption of software-defined defense faces a number of challenges:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lack of interoperability of systems<\/li>\n\n\n\n<li>National norms and standards<\/li>\n\n\n\n<li>New cyber security risks<\/li>\n\n\n\n<li>Complexity of the overall system<\/li>\n\n\n\n<li>Integration of non-digital legacy systems<\/li>\n\n\n\n<li>Legal and ethical requirements<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Transformation of the business model<\/h3>\n\n\n\n<p>For traditional defense companies, the introduction of software-defined defense is associated with a comprehensive transformation. The business model will change from a hardware-driven project business to a software-driven service business. This change is associated with the development of new competencies, especially in R&amp;D and product management as well as in the context of redesigning development processes. However, early and deliberate transformation is worthwhile, as it enables a long-term competitive advantage to be gained.<\/p>\n\n\n\n<p>This advantage takes effect as soon as governmental customers will demand these functionalities. For example, in the case of the US Optionally Manned Fighting Vehicle program (OMFV), with which the Pentagon intends to replace the US M2 Bradley infantry fighting vehicle (IFV), this is already explicitly the case in the form of a modular open system architecture (MOSA).<\/p>\n\n\n\n<p>Of course, there is a certain resistance to this transformation process among the established OEMs, as the companies have long benefited from the lock-in effect of proprietary systems. And the service business will partially cannibalize the established project business. However, changing customer demands will most likely enforce this adaptation sooner or later anyway. In this respect, setting the course at an early stage creates a first-mover advantage that differentiates one&#8217;s own products from the competition and avoids a changeover that will be even more painful later on.<\/p>\n\n\n\n<p>ACTRANS is a management consultancy with a focus on the aerospace and defense industry. Together with our network of experts, we support our clients in aligning their product portfolio, processes, and technology to software-defined defense.<\/p>\n<div class=\"shariff shariff-align-left shariff-widget-align-left\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button twitter shariff-nocustomcolor\" style=\"background-color:#595959\"><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Factrans.de%2Fen%2Fsoftware-defined-defense-key-to-combat-superiority%2F&text=Software-defined%20Defense%20%E2%80%93%20Key%20to%20Combat%20Superi%C2%ADority\" title=\"Share on X\" aria-label=\"Share on X\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#000; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\"><path fill=\"#000\" d=\"M14.258 10.152L23.176 0h-2.113l-7.747 8.813L7.133 0H0l9.352 13.328L0 23.973h2.113l8.176-9.309 6.531 9.309h7.133zm-2.895 3.293l-.949-1.328L2.875 1.56h3.246l6.086 8.523.945 1.328 7.91 11.078h-3.246zm0 0\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button facebook shariff-nocustomcolor\" style=\"background-color:#4273c8\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Factrans.de%2Fen%2Fsoftware-defined-defense-key-to-combat-superiority%2F\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" role=\"button\" rel=\"nofollow\" class=\"shariff-link\" style=\"; background-color:#3b5998; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 18 32\"><path fill=\"#3b5998\" d=\"M17.1 0.2v4.7h-2.8q-1.5 0-2.1 0.6t-0.5 1.9v3.4h5.2l-0.7 5.3h-4.5v13.6h-5.5v-13.6h-4.5v-5.3h4.5v-3.9q0-3.3 1.9-5.2t5-1.8q2.6 0 4.1 0.2z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Factrans.de%2Fen%2Fsoftware-defined-defense-key-to-combat-superiority%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button xing shariff-nocustomcolor\" style=\"background-color:#29888a\"><a href=\"https:\/\/www.xing.com\/spi\/shares\/new?url=https%3A%2F%2Factrans.de%2Fen%2Fsoftware-defined-defense-key-to-combat-superiority%2F\" title=\"Share on XING\" aria-label=\"Share on XING\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#126567; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 25 32\"><path fill=\"#126567\" d=\"M10.7 11.9q-0.2 0.3-4.6 8.2-0.5 0.8-1.2 0.8h-4.3q-0.4 0-0.5-0.3t0-0.6l4.5-8q0 0 0 0l-2.9-5q-0.2-0.4 0-0.7 0.2-0.3 0.5-0.3h4.3q0.7 0 1.2 0.8zM25.1 0.4q0.2 0.3 0 0.7l-9.4 16.7 6 11q0.2 0.4 0 0.6-0.2 0.3-0.6 0.3h-4.3q-0.7 0-1.2-0.8l-6-11.1q0.3-0.6 9.5-16.8 0.4-0.8 1.2-0.8h4.3q0.4 0 0.5 0.3z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Factrans.de%2Fen%2Fsoftware-defined-defense-key-to-combat-superiority%2F&subject=Software-defined%20Defense%20%E2%80%93%20Key%20to%20Combat%20Superi%C2%ADority\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button whatsapp shariff-nocustomcolor\" style=\"background-color:#5cbe4a\"><a href=\"https:\/\/api.whatsapp.com\/send?text=https%3A%2F%2Factrans.de%2Fen%2Fsoftware-defined-defense-key-to-combat-superiority%2F%20Software-defined%20Defense%20%E2%80%93%20Key%20to%20Combat%20Superi%C2%ADority\" title=\"Share on Whatsapp\" aria-label=\"Share on Whatsapp\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#34af23; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#34af23\" d=\"M17.6 17.4q0.2 0 1.7 0.8t1.6 0.9q0 0.1 0 0.3 0 0.6-0.3 1.4-0.3 0.7-1.3 1.2t-1.8 0.5q-1 0-3.4-1.1-1.7-0.8-3-2.1t-2.6-3.3q-1.3-1.9-1.3-3.5v-0.1q0.1-1.6 1.3-2.8 0.4-0.4 0.9-0.4 0.1 0 0.3 0t0.3 0q0.3 0 0.5 0.1t0.3 0.5q0.1 0.4 0.6 1.6t0.4 1.3q0 0.4-0.6 1t-0.6 0.8q0 0.1 0.1 0.3 0.6 1.3 1.8 2.4 1 0.9 2.7 1.8 0.2 0.1 0.4 0.1 0.3 0 1-0.9t0.9-0.9zM14 26.9q2.3 0 4.3-0.9t3.6-2.4 2.4-3.6 0.9-4.3-0.9-4.3-2.4-3.6-3.6-2.4-4.3-0.9-4.3 0.9-3.6 2.4-2.4 3.6-0.9 4.3q0 3.6 2.1 6.6l-1.4 4.2 4.3-1.4q2.8 1.9 6.2 1.9zM14 2.2q2.7 0 5.2 1.1t4.3 2.9 2.9 4.3 1.1 5.2-1.1 5.2-2.9 4.3-4.3 2.9-5.2 1.1q-3.5 0-6.5-1.7l-7.4 2.4 2.4-7.2q-1.9-3.2-1.9-6.9 0-2.7 1.1-5.2t2.9-4.3 4.3-2.9 5.2-1.1z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>By Dr. Martin Krause and Dr. Mike K\u00f6rner \/\/ Today, most products in the defense sector can no longer do without software, and digiti\u00adzation is becoming an increasingly important differ\u00adentiator. In recent months, a paradigm shift towards software as the defining element has become increasingly apparent. Is software-defined defense on the way? Software-defined Defense Software-defined [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5332,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-5324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Software-defined Defense - Key to Combat Superi\u00adority<\/title>\n<meta name=\"description\" content=\"ACTRANS Insights: Software-defined Defense puts software functionality at the center, leading to greater flexibility and resilience\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software-defined Defense - Key to Combat Superi\u00adority\" \/>\n<meta property=\"og:description\" content=\"ACTRANS Insights: Software-defined Defense puts software functionality at the center, leading to greater flexibility and resilience\" \/>\n<meta property=\"og:url\" content=\"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/\" \/>\n<meta property=\"og:site_name\" content=\"ACTRANS Consulting f\u00fcr Aerospace und Defence\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-23T16:53:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-29T14:45:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/actrans.de\/wp-content\/uploads\/iStock-1399136562_web3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Martin Krause\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Martin Krause\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/\"},\"author\":{\"name\":\"Martin Krause\",\"@id\":\"https:\\\/\\\/actrans.de\\\/#\\\/schema\\\/person\\\/b6072d27152bc45627edab475bb61960\"},\"headline\":\"Software-defined Defense &#8211; Key to Combat Superi\u00adority\",\"datePublished\":\"2023-05-23T16:53:13+00:00\",\"dateModified\":\"2024-05-29T14:45:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/\"},\"wordCount\":1000,\"publisher\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/actrans.de\\\/wp-content\\\/uploads\\\/iStock-1399136562_web3.png\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/\",\"url\":\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/\",\"name\":\"Software-defined Defense - Key to Combat Superi\u00adority\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/actrans.de\\\/wp-content\\\/uploads\\\/iStock-1399136562_web3.png\",\"datePublished\":\"2023-05-23T16:53:13+00:00\",\"dateModified\":\"2024-05-29T14:45:56+00:00\",\"description\":\"ACTRANS Insights: Software-defined Defense puts software functionality at the center, leading to greater flexibility and resilience\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/#primaryimage\",\"url\":\"https:\\\/\\\/actrans.de\\\/wp-content\\\/uploads\\\/iStock-1399136562_web3.png\",\"contentUrl\":\"https:\\\/\\\/actrans.de\\\/wp-content\\\/uploads\\\/iStock-1399136562_web3.png\",\"width\":1280,\"height\":720,\"caption\":\"Software-defined Defense. Copyright: iStock-1399136562\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/software-defined-defense-key-to-combat-superiority\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/actrans.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software-defined Defense &#8211; Key to Combat Superi\u00adority\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/actrans.de\\\/#website\",\"url\":\"https:\\\/\\\/actrans.de\\\/\",\"name\":\"ACTRANS Consulting f\u00fcr Aerospace und Defence\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/actrans.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/actrans.de\\\/#organization\",\"name\":\"Actrans GmbH\",\"url\":\"https:\\\/\\\/actrans.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/actrans.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/actrans.de\\\/wp-content\\\/uploads\\\/actrans_logo-square.jpg\",\"contentUrl\":\"https:\\\/\\\/actrans.de\\\/wp-content\\\/uploads\\\/actrans_logo-square.jpg\",\"width\":512,\"height\":512,\"caption\":\"Actrans GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/actrans.de\\\/#\\\/schema\\\/person\\\/b6072d27152bc45627edab475bb61960\",\"name\":\"Martin Krause\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/746a3d84f36b1f11aef012c3299d61e0b9f503dc3513e2a24372929c0bd2964d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/746a3d84f36b1f11aef012c3299d61e0b9f503dc3513e2a24372929c0bd2964d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/746a3d84f36b1f11aef012c3299d61e0b9f503dc3513e2a24372929c0bd2964d?s=96&d=mm&r=g\",\"caption\":\"Martin Krause\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software-defined Defense - Key to Combat Superi\u00adority","description":"ACTRANS Insights: Software-defined Defense puts software functionality at the center, leading to greater flexibility and resilience","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/","og_locale":"en_US","og_type":"article","og_title":"Software-defined Defense - Key to Combat Superi\u00adority","og_description":"ACTRANS Insights: Software-defined Defense puts software functionality at the center, leading to greater flexibility and resilience","og_url":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/","og_site_name":"ACTRANS Consulting f\u00fcr Aerospace und Defence","article_published_time":"2023-05-23T16:53:13+00:00","article_modified_time":"2024-05-29T14:45:56+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/actrans.de\/wp-content\/uploads\/iStock-1399136562_web3.png","type":"image\/png"}],"author":"Martin Krause","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Martin Krause","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/#article","isPartOf":{"@id":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/"},"author":{"name":"Martin Krause","@id":"https:\/\/actrans.de\/#\/schema\/person\/b6072d27152bc45627edab475bb61960"},"headline":"Software-defined Defense &#8211; Key to Combat Superi\u00adority","datePublished":"2023-05-23T16:53:13+00:00","dateModified":"2024-05-29T14:45:56+00:00","mainEntityOfPage":{"@id":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/"},"wordCount":1000,"publisher":{"@id":"https:\/\/actrans.de\/#organization"},"image":{"@id":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/#primaryimage"},"thumbnailUrl":"https:\/\/actrans.de\/wp-content\/uploads\/iStock-1399136562_web3.png","articleSection":["Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/","url":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/","name":"Software-defined Defense - Key to Combat Superi\u00adority","isPartOf":{"@id":"https:\/\/actrans.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/#primaryimage"},"image":{"@id":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/#primaryimage"},"thumbnailUrl":"https:\/\/actrans.de\/wp-content\/uploads\/iStock-1399136562_web3.png","datePublished":"2023-05-23T16:53:13+00:00","dateModified":"2024-05-29T14:45:56+00:00","description":"ACTRANS Insights: Software-defined Defense puts software functionality at the center, leading to greater flexibility and resilience","breadcrumb":{"@id":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/#primaryimage","url":"https:\/\/actrans.de\/wp-content\/uploads\/iStock-1399136562_web3.png","contentUrl":"https:\/\/actrans.de\/wp-content\/uploads\/iStock-1399136562_web3.png","width":1280,"height":720,"caption":"Software-defined Defense. Copyright: iStock-1399136562"},{"@type":"BreadcrumbList","@id":"https:\/\/actrans.de\/en\/software-defined-defense-key-to-combat-superiority\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/actrans.de\/en\/"},{"@type":"ListItem","position":2,"name":"Software-defined Defense &#8211; Key to Combat Superi\u00adority"}]},{"@type":"WebSite","@id":"https:\/\/actrans.de\/#website","url":"https:\/\/actrans.de\/","name":"ACTRANS Consulting f\u00fcr Aerospace und Defence","description":"","publisher":{"@id":"https:\/\/actrans.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/actrans.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/actrans.de\/#organization","name":"Actrans GmbH","url":"https:\/\/actrans.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/actrans.de\/#\/schema\/logo\/image\/","url":"https:\/\/actrans.de\/wp-content\/uploads\/actrans_logo-square.jpg","contentUrl":"https:\/\/actrans.de\/wp-content\/uploads\/actrans_logo-square.jpg","width":512,"height":512,"caption":"Actrans GmbH"},"image":{"@id":"https:\/\/actrans.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/actrans.de\/#\/schema\/person\/b6072d27152bc45627edab475bb61960","name":"Martin Krause","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/746a3d84f36b1f11aef012c3299d61e0b9f503dc3513e2a24372929c0bd2964d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/746a3d84f36b1f11aef012c3299d61e0b9f503dc3513e2a24372929c0bd2964d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/746a3d84f36b1f11aef012c3299d61e0b9f503dc3513e2a24372929c0bd2964d?s=96&d=mm&r=g","caption":"Martin Krause"}}]}},"_links":{"self":[{"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/posts\/5324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/comments?post=5324"}],"version-history":[{"count":2,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/posts\/5324\/revisions"}],"predecessor-version":[{"id":5326,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/posts\/5324\/revisions\/5326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/media\/5332"}],"wp:attachment":[{"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/media?parent=5324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/categories?post=5324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/tags?post=5324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}