An explanation of how 2iC’s unique software automatically connects airborne video to ground-based troops using different systems, devices and platforms. Regardless of whether they were procured at different times, from different vendors, under different contracts or to meet different needs. How 2iC is working with defence firm Spearpoint Solutions & Technology to integrate disparate military systems and multiple capabilities into the Australian Army’s Digital Combat Helmet System. Working as part of a strategic supplier consortium and to extremely tight deadlines, 2iC and its unique digital interoperability software were selected to enable different naval craft and systems with different trust domains to operate together in the same shared battlespace. A brief introduction to the problems solved by 2iC software. 2iC CONNECT:UNCREWED is software for manufacturers of autonomous and uncrewed systems (UxS) to integrate at the edge. Whether they are aerial, surface, sub-surface or ground based, the 2iC software enables these platforms to be rapidly and effectively integrated into wider tactical military networks. It enables location sharing, reliable chat, and centre-of-mass reporting with built-in throttling, reliable delivery, and bridging. It ensures mission-critical information flows across fragmented and degraded networks at the tactical edge and up to higher echelons. 2iC CONNECT:TAK is software for manufacturers, distributors and integrators of tactical communications systems. The software makes TAK work in DDIL (Denied, Degraded, Intermittent, Limited) environments. It adds resilience and works when the Internet isn’t available. Out of the box, it connects “islands” of TAK users across any bearer. It solves the mixed fleet challenge without needing flat IP architectures, static addressing or cloud routing. 2iC TRUST is commercial-off-the-shelf (COTS) cross-domain software that delivers assured digital interoperability between devices, systems and networks across different trust domains. An introduction to 2iC and its world-leading solutions to digital interoperability in the battlespace. A 1-minute video that explains how our software delivers interoperability in the battlespace. A 1-minute video that explains how HEAK is designed to revolutionise how digital functions are integrated into battlefield management. Graham Booth, CEO of 2iC, in conversation with business and technology journalist Malcolm Wheatley. The concept of “Soldier as a Sensor” has been discussed in defence circles for decades. However, the reality is that most soldiers are not even digitally connected, much less functioning as sensors. This abstract summarises why defence needs to be data driven, user-centric and digitally enabled. Resources
Case Studies
2iC case study: Airborne video to ground troops
2iC case study: Australian digital combat helmet system phase #1
2iC case study: Secure connection of warship combat system with high-speed, un-crewed, autonomous RIB
Brochures
Brochure - 2iC 2-page software capability summary
Brochure - 2iC CONNECT:UNCREWED
Brochure - 2iC CONNECT:TAK
Brochure - 2iC TRUST
2iC overview and product suite
Videos
2iC video overview
2iC Hyper Enabled Awareness Kit (HEAK)
Technology Papers & LSA Specification
Technology Q&A paper: Lean Services Architecture (LSA): What is it, and why does it matter?
White Paper: Soldier as a Sensor – putting the user at the core
- Home
- Company
- Solution
- Technology
- Products
Secure, scalable, cost-effective digital interoperability in the battlespace.
2iC core software products
The 2iC enterprise licence software suite. The digital backbone and information exchange mechanism to enable digital interoperability.
The underlying 2iC software that connects disparate devices and systems. All-in-one, ready-to-go 2iC CONNECT products include 2iC CONNECT:TAK and 2iC CONNECT:UNCREWED
For secure and flexible interoperability across different trust domains.
The software needed to research, develop and test modular, open and interoperable systems.
2iC productivity tools and services
For non-technical users to view, design and manage different systems graphically across the battlespace.
For approved users to have management control of the deployed configurations within the network.
For developers to build open interfaces and adaptors for almost any system, platform or device.
Professional services, training and technical support, including IA blueprinting.
- News
- Resources
- Contact
