The F-22 and F-35 now have an “app store” to download cross-platform software

In a remarkable technological achievement, an F-35 from the U.S. Air Force’s 461st Flight Test Squadron recently demonstrated the capability to utilize software applications that were initially developed for the F-22.

F-35, F-22, and F-16 perform the flyover for the MLB All Star Games

U.S. Air Force Photo by Kyle Larson


Those applications were updated by software developers at Hill Air Force Base and tested again at Edwards Air Force Base, where the 461st Flight Test Squadron is located, all within 24 hours.

The effort, dubbed Project FOX, is a groundbreaking initiative developed by a team of test pilots, software developers, and federal laboratories. It is poised to revolutionize the capabilities of the U.S. stealth fighter fleet. This innovation project has achieved three significant advancements that are being hailed as game-changers for the future of military aircraft.

Firstly, Project FOX enables the use of the same tactical software applications across different stealth fighters, such as the F-35 and F-22. This cross-platform compatibility eliminates the need for individual software development and integration, resulting in substantial cost savings and accelerated development timelines.

Secondly, the project establishes a government-owned and -controlled “app store” for these fighters. By sourcing software from a diverse range of suppliers, including industry leaders and government labs, the initiative harnesses the best contributions from various sectors. This increased access to software providers fosters innovation, especially in fields like AI/autonomy and cybersecurity, ensuring the fighters remain technologically advanced and adaptable to emerging threats.

Lastly, Project FOX enables rapid software updates, reducing the timeline from months to a matter of hours. This capability allows for quick adaptation based on pilot feedback, operational developments, and changing conditions. Additionally, the project enhances cyber protection by incorporating tools that can identify and address potential cyber issues in real-time.

For more information, hit the Source below

Source