50 programmers, five days, groundbreaking ideas.

צילום אילוסטרציה: דובר צה”ל

Special Development held Marathon featured well “Lotem unit” teleprocessing. The results were presented to commanders and later developed on demand

תאריך: 20/10/2013, 17:14    
מחבר: יפתח כרמלי, אגף התקשוב

About 50 of the best development of “Cistus” teleprocessing gathered this month for five days in a room at a military base there. The goal was to cut the long and complex processes that require technology development and ICT professionals itzirthiotam hack-Marathon as high-tech companies in the economy.

OP CTO event held during the LEAD last week in one of the Lotem unit base. The event, led by the industry CTO (Chief Technology Officer) of the unit, about 50 soldiers and ktsinia per week intensive development work and communication systems, especially those that address the operational system of the IDF.

The only people that came a week after marathon saw the space, various exercises were joined. During the week, various ideas, hitherto existed only in the minds of the people, developed the prototype level, this weekend featured the various commanders and hopefully find them demanding the IDF units and take steps
Advanced development and eventually for full operations.

The same topic:

C4I Corps Commander in a special interview to “science fiction”
Service Directorate officers patrol in Jerusalem to the Haredi society

“This is a very productive event at zero cost,” explains major Moose head, violinist
The CTO sector and was responsible for leading the event. “There are 13 projects developed in parallel, the financial shahocea was the food,” he elaborated.

In addition, major Ajay that development of products within the unit, instead of working with external companies, also allows greater economic efficiency and gives a professional challenge to
The unit – as part of a trend in teleprocessing of returns for technological development itself. Among the projects developed during the week, you can find a variety of systems, some of which were developed for the Warrior, and the Assistant.

Vitrine-different classifications, one computer

‘ Vitrine ‘ is a system developed by the Department staff (order
Security Code) of Cistus. “The goal is to give the customer a top-secret network working from the same computer and a secret clearance online. This is done securely to prevent the passage of information between networks, whether in the form of directed or due to human error, “says one of the officers who were involved in developing the system. That way they can for people who use two networks to switch between them without resorting to another computer.

Except ש”ויטרינה” make life easier for many oshoaistim, it’s about economic efficiency: to access both networks from one computer can save, according to estimates about 10,000 additional computer stations, all accompanying them: jacks
Network layouts, and more. “We talked with various commanders and already existing unit requirement for the system,” says the officer. “It was with us for a long time, but economic efficiency, he became very relevant”, he explains.

Border control system

Border control system, whose name cannot be published, developed by a team of Big Data experts Lotem unit. ‘ Big Data ‘ is a huge amount of
Data and information that come into the system. The challenge is to decide what information will be directed to, thus providing users with the information that is relevant only to them.

The system uses a huge database of IDF inlet which Palestinians to Israel legally,
Through the checkpoints. The database records all valid from 1995 to the present. “The new system performs smart Big Data analysis to find suspicious behaviors and anomalies. For example – if a person regularly entered the checkpoint in a specific time, but then moves to a different location or different times, the system detects the change. Until
Now was not the time and place where people came in while the entrance was
Invalid “. Using statistical analysis, the system detects suspicious behavior, and also data visible on valid inputs, can detect potentially malicious intentions. “There has been high demand for system security factors are different,” said one of those involved in developing the system.


Today there are command and control systems that help to identify the forces in the field, such as the ‘ Holocaust ‘, but they include other data content.
WIFFI is affordable, providing its user – the Commander in the field-related forces, scattering with tags attached to the soldiers to see the movement – a bit like GPS.

“We were in the Division exercise to see what the needs that arise from the field, and saw there with lots of activities-נגמ”שים vehicles, helicopters, and leads that you always know who is where, “explained Captain Uriah Stern, CTO branch officer responsible for
Development of the system.

Translated from Hebrew