|
|
The
concept of Cursor on Target is to link systems together to pass
information more efficiently. CoT does this by using XML. XML supports
the DOD's vision of network-centric warfare, in which data is shared
like that on the World Wide Web. XML allows users to define, validate,
transmit, and interpret many types of data between many types of
applications.
With XML,
users structure their data using a standardized set of rules, called a
schema. Once a Multi Text Format (MTF) message is converted to an XML
structure through the XML MTF Mapping and Schema specifications
developed by MITRE, there are limitless ways any system can exploit the
content of the message by using off-the-shelf XML software.
Vendor-implemented, internationally agreed upon XML-MTF Schema
Generation Specifications are available today. These schemas
collectively constitute more than 600 messages and 6,000 simple and
complex data types defined, agreed upon, and implemented by more than 70
nations. In addition, the schemas are being incorporated into the DOD
XML Registry and NATO XML Registry, which will make this valuable
metadata available in a uniform, well-supported syntax, increasing the
opportunities for reuse in DOD command, control, communications,
computer, and intelligence, surveillance, and reconnaissance systems and
programs.
XML is
non-proprietary, therefore it greatly reduces the cost of developing
software. The shift from custom programming which take many man hours
to develop and test is now available off the shelf. Creating a
significant cost savings and allows the DOD to implement the capability
immediately. Separating the elements of representation, syntax, and
semantics presents another benefit by allowing each facet to be managed
independently, reducing the impact of change on operational systems.
And use of XML schemas reduces the resources required to sustain message
families. XML-MTF also provides more accuracy. Message content is
validated against the schema to ensure adherence to allowable values,
prescribed vocabulary, and proper relationships between message
components. The use of XML tag attributes and validation against a
schema can provide security markings and assist in enforcing
releasability constraints.
Source:http://www.mitre.org/news/the_edge/summer_04/edge_summer_04.pdf
|
|