Legacy Upgrade Solutions

The life spans of today’s weapon, support and training systems are being extended well beyond their original design limits as the viability of these systems remains strong and their replacement costs continue to grow. At the same time, mission requirements are increasing for situational awareness, and Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) missions within a Global Information Grid (GIG). Northrop Grumman offers technology and complete solutions to upgrade systems at low cost and enable new mission capability while preserving software and platform investments and avoiding costly platform modifications.

Northrop Grumman understands that the dynamics of warfare have changed. In the evolving battlespace, information is power and providing actionable information is a force enabler. There are three primary technical limitations that restrict the ability of legacy systems to meet new requirements: 1) processor and communications technology from the 1970s through the early 1990s are operating near full capacity and cannot meet current requirements; 2) legacy systems are not able to store and process the large amounts of data needed for current and future missions; and 3) legacy interconnections like MIL-STD-1553B are already at or near their bandwidth limits and cannot meet the data throughputs needed for new capabilities.

RePLACE BadgeRePLACE

RePLACE virtualization technology offers a cost effective means of achieving significant sustainment and performance improvements through the introduction of modern computer technology in vital weapons and support systems.

Topo MapPathFinder Route Replanner

The PathFinder Route Replanner adapts a platform’s planned route based on changing operational conditions to maximize the probability of mission success in real time with minimal user interaction.

Sentinel Soldier PosterSentinel-XD

Sentinel-XD provides an affordable, small form factor, embeddable solution for connecting tactical platform centric systems to information sharing networks to allow communications across security domains.