DEFENSE ACQUISITION UNIVERSITY ISA 101 BASIC INFORMATION SYSTEM ACQUISITION
|
|
- Derek Ward
- 6 years ago
- Views:
Transcription
1 1 Identify applicable United States laws, federal regulations and DoD directives that govern management of IT/SW systems. Identify key statutes related to the acquisition of Information Technology (IT) and software. Identify Executive Orders, OMB Circulars and Federal regulations important to DoD IT/SW Acquisition. Identify DoD key Information Technology (IT) and software management directives (policies), instructions (regulations), and guidebooks. Recognize how Integrated Product Teams (IPTs) can help improve the acquisition of software systems thru the use of collaboration. Identify the requirements of Title 40, Subtitle III (Clinger-Cohen Act (CCA)). Identify the responsibilities of a Chief Information Officer (CIO). 2 Given a DoD IT/SW acquisition scenario, describe appropriate acquisition strategies that achieve system capabilities. Define the most common IT Acquisition Strategy approaches. Select the appropriate systems-level acquisition approach based on the characteristics of the system being developed. Identify the proposed, system software-based, Evolutionary Acquisition model options defined by DoD. Relate acquisition strategy approaches to risks. 3 Given a DoD IT/SW scenario, describe the IT/SW factors that impact a Product Support Business Case Analysis (PS BCA). Define Product Support BCA. Recognize that Modular Open Systems Approach (MOSA) is a critical product support factor when developing a Product Support BCA. Recognize that Intellectual Property (IP) is a critical product support factor when developing a Product Support BCA. Recognize which software support products are needed for successful product support. Recognize the data management products needed for successful product support. Recognize IT/SW security inputs needed for successful product support. Identify the purpose for a Product Support BCA. Identify Department of Defense (DoD) Product Support BCA policy and guidance. Interpret the meaning of 'best value' analysis as accomplished by Product Support BCAs. Identify the seven (7) major tasks the IT Professional provides to building a Product Support BCA. Identify at least three benefits of doing the Product Support BCA. Identify three Information Technology (IT) areas that impact the best value benefits analysis of the Product Support BCA. Recall the important sections of the Product Support BCA to ensure Information Technology (IT) product support considerations are included. Recognize the IT inputs needed for software cost estimation. 4 Describe DoD cost and schedule estimation methods. List factors that most influence software cost and schedule estimates. Describe common cost and schedule estimation methods. Describe the attributes of parametric models. Identify commonly-used parametric models. List the seven (7) steps of a typical software estimation process. Describe each of the seven (7) steps of a typical software estimation process. 5 Given a DoD IT/SW acquisition scenario, describe the Joint Capability Integration and Development System (JCIDS) and the Investment Review Board's Business Capability Definition (BCD) planning documents mandated to describe the new DoD capability to be developed. Given an overview of the DoD capability planning processes, its objectives and expected results, identify capability planning documents from a list. Describe the Business Capability Acquisition Lifecycle (BCAC) model. Identify the role of the ICD and IS ICD in the JCIDS process. Identify how Sponsors use the ICD and IS ICD/IT Box to document IT capability requirements. Identify the role of the CDD in the JCIDS process. Identify the role of the CPD in the JCIDS process. 6 Describe the reasons why Enterprise Architecture (EA) is critical to the successful acquisition of DoD IT/SW systems. Identify the laws and policies mandating the use of an Enterprise Architecture (EA). Define Enterprise Architecture (EA). Describe the role of domain engineering. Describe the purpose of Enterprise Architecture (EA). Identify the benefits of creating an Enterprise Architecture (EA) for your domain. Page 1 of 5
2 Recognize that DoD Architecture Framework (DoDAF) is used to create the DOD Enterprise Architecture (EA). Identify three benefits of using EA tools. Identify the purpose of the DoD Architecture Framework (DoDAF) views. Views include All," "Operational," "Systems" and "Standards" views. 7 Given a DoD IT/SW acquisition scenario, describe appropriate acquisition strategies that achieve system capabilities. Define common software development paradigms. Match the software paradigm best suited for a given software item (SI) development. Describe the relationship of software paradigms being proposed in the supplier's Software Development Plan (SDP) and the Acqusition Approach you should use for your program. 8 Describe how software development process maturity impacts IT/SW programs. Recognize how standards and maturity models differ. Recognize characteristics of "process maturity". Distinguish between "mature" and "immature" developers. Identify the five levels of the CMMI. Identify characteristics of the CMMI Process Areas. 9 Given a DoD IT/SW acquisition scenario, describe critical requirements found. Describe why safety, security and privacy are critical requirements. 10 Describe the requirements management process. Explain how software requirements are determined. 11 Given a DoD IT/SW acquisition scenario, describe the Program Manager's responsibilities for software cost and schedule management. Describe why accurate estimates are needed. Identify key estimation "Lessons Learned." Recognize methods best suited for different software estimation situations. 12 Given a DoD software acquisition scenario, describe the key contractual activities used for effective technical and business solutions. Recognize the relationship between acquisition planning and the Contracting Strategy. Identify the conditions under which an enterprise license should be used. Recognize key attributes of software systems that should be considered for inclusion as part of the Request For Proposal (RFP). Recognize the opportunities and specific limitations of commercial acquisitions. Recognize the statutory and regulatory preference for competitive acquisition Differentiate between a requirement expressed as performance or outcome focused verses one that is method or procedure based. Recognize the requirement to use a surveillance strategy to monitor contractor performance. Define Modular Contracting. Identify the benefits of using Modular Contracting. Identify the contract types best suited for the acquisition of software systems. Describe the DoD Enterprise Software Initiative (ESI). 13 Given a DoD IT/SW acquisition scenario, recognize earned value as an important metric for managing software development. Describe what experienced-based best practices, lessons learned and rules of thumb (heuristics) are. Recognize examples of best practices related to DoD IT/SW acquisition. Identify where you can gain support for implementing best practices. 14 Describe why an IT/SW measurement program is critical to software development projects. Recognize the benefits and characteristics of software measurement. Define the four (4) fundamental measurement principles and terminology used in conjunction with the PSM Measurement Information Model. Identify the key experienced-based best practices used to design the DoD Practical Software and System Measurement (PSM) process. Describe the PSM Measurement Process Model used to develop and implement a measurement program. Recognize the seven (7) categories of software measures. Describe how software indicators are used to "paint the picture" of progress for an information need. Recognize the PSM lessons learned in planning for a measurement program. 15 Describe how to use IT/software measurement methods to help determine software development progress. Page 2 of 5
3 Identify top-level categories of software measures. Recognize ways indicators should be selected. Identify activities and associated tasks for putting measurement into practice. Recognize criteria used to interpret common software measures. 16 Given a DoD IT/SW program with a measurement program, describe effective ways to interpret the data to track software acquisition progress. Recognize the impacts to the software development plan (e.g., trends) when interpreting software measures. Describe potential software acquisition problems after viewing a program's metric data. Recognize characteristics of Technical Performance Measurement and software measurement. Recall characteristics of enterprise-level measurement. Recall key laws mandating enterprise-level measurement. 17 Given a software-reliant system, describe appropriate Risk, Opportunity and Issue Management processes. Define the term "Risk, Issue and Opportunity Management." List some common software development risks. Describe potential mitigation strategies for common software development risks. Recognize the key attributes of Risk Management. Recall the five (5) steps of the DoD Risk Management process. Identify the elements of risk management planning. Summarize factors making software risk management difficult. Identify Federal statutes, DoD policies and Best Practices relating to Risk Management. Describe the five steps that compose the Risk Management Process: Risk Planning, Risk Identification, Risk Analysis, Risk Handling, Risk Monitoring. Describe the Risk Management Inputs and Outputs. Describe Risk Roll Up. Recognize benefits of Tracking Earned Value in measuring program progress. 18 Describe the role of DoD Test & Evaluation (T&E) in DoD software development. Recognize characteristics of DoD Test & Evaluation (T&E). Recognize characteristics of the Test and Evaluation Master Plan (TEMP). Recognize characteristics of the Software Test Plan (STP). Identify the different types of software testing. Recognize the different types of software testing tools. Recognize characteristics of Software Test Report (STR) management. Identify sample criteria that could be used to categorize software as mature. Identify what Independent Verification and Validation (IV&V) is. Recognize the benefits of Independent Verification and Validation (IV&V) in T&E. Recognize when IV&V should be employed on DoD programs. Identify laws, policies and regulations that govern DoD Test & Evaluation (T&E). Define the purpose of DoD Test & Evaluation (T&E). Recognize characteristics of Software Testing. Recognize the Software Test & Evaluation (T&E) mission. Identify the Test & Evaluation (T&E) responsibilities of the IT Program Manager (PM). Recognize characteristics of DoD Software Test Planning. Identify critical software test articles and events in planning for T&E. Identify critical DoD test plans and reviews in planning for Test & Evaluation (T&E). 19 Describe the important attributes of a DoD IT/Software Quality Assurance (SQA) program. Define the purpose of Software Quality Assurance (SQA) Identify the components (activities and events) of an effective Software Quality Assurance (SQA) program. Identify examples of common defects injected into a software development during the various phases of lifecycle development. Identify software quality factors. Page 3 of 5
4 Identify common measures used to track product and process quality in software development efforts. Given a list of quality factors and their descriptions, match the factor with its description (ISO 9126 vs Kano Model). Recognize the influences for choosing specific software quality factors. 20 Given a DoD IT/SW acquisition scenario, describe cybersecurity requirements regarding security measures, continuity of operations, privacy and protection of acquisition systems and system content. Identify the purpose of a Program Protection Plan (PPP). Define a Continuity of Operations Plan (COOP). Identify elements of a Continuity of Operations Plan (COOP). Identify the key components of a Program Protection Plan (PPP). Identify key laws dealing with critical requirements of security and privacy. Summarize the need for information security. Recognize technologies that can be used to improve information security. Recognize how the Common Criteria is used to evaluate the security of software products used in Department of Defense (DoD) information systems. Define Cybersecurity. Define the five (5) attributes of cybersecurity. Identify the overarching principles of the Risk Management Framework (RMF) for DoD Information Technology (IT). 21 Describe how the Joint Integration Environment (JIE) contributes to the interoperability of DoD IT/SW systems. Describe the Joint Integration Environment (JIE). Identify the benefits of the JIE. Identify the purpose of the JIE. 22 Describe the basics of Software Engineering in support of Systems Engineering. Identify the eight (8) steps of the Systems Engineering technical processes. Identify the eight (8) Systems Engineering technical management processes. Describe the purpose of each Systems Engineering technical process. Describe the purpose of each Systems Engineering technical management process. Recognize the software components of a Work Breakdown Structure (WBS). Identify life cycle reviews that can be used to help manage software development. Identify documentation used to specify software design. Identify key commercial standards used in DoD software development. Describe the purpose of ANSI/EIA 632, ISO 9000:2000, and ISO Recognize Net-Centric Data Management practices. Identify the key attributes of Net-Centricity. Identify DoD's Net-Centric data management strategy. Summarize DoD's Net-Centric data management strategy goals. Recognize DoD Net-Centric data management primary activities and what they mean to the PMO. Identify key program management and acquisition requirements needed for Net-Centric data management. 24 Describe the purpose of Section 508, Title 29 U.S. Code as it applies to DoD IT/SW systems. Recognize federal accessibility requirements for devices, software, and web sites. Identify the types of technology that must be included in designing accessible systems. Identify the exceptions to Section 508 accessibility requirements. 25 Given a DoD IT/SW acquisition scenario, describe the requirements for Electronic and Information Technology (E&IT) devices and software to satisfy the accessibility standards of Section 508, Title 29 U.S. law. Recognize federal accessibility requirements for electronic devices, software and websites. 26 Given a Department of Defense (DoD) IT acquisition scenario early in the lifecycle, describe software sustainment planning factors critical to the success of a potential Software Support Activity (SSA). Describe why software support planning is important. Identify key terminology for software sustainment. Describe key SW logistics support elements. Page 4 of 5
5 Identify software support planning activities. Describe key software support plans. Describe how Reliability, Availability and Maintainability (RAM) impacts software support. 27 Given a DoD IT/SW acquisition scenario, describe the cost effectiveness of the Cloud services solution. Identify basic Cloud Computing terms. Identify the risks of multitenancy. Identify the advancements in technology that enabled the rise of cloud computing. Identify cloud service models. Identify cloud deployment models. Identify five essential characteristics of cloud service. Identify the difference between virtual and physical infrastructure. Identify the laws, policies and standards that apply to Cloud Computing. Identify the benefits of consuming cloud services. Identify the benefits of multitenancy. 28 Describe the basics of Configuration Management (CM). Explain the role of Configuration Management (CM) in DoD software development. Describe the four (4) Software Configuration Management (CM) baselines. 29 Given a DoD IT/SW acquisition scenario, describe IT Service Management and DoD Enterprise Service Management Framework (DESMF). Identify Information Technology Service Management (ITSM). Identify the benefits of ITSM. Identify the Department of Defense (DoD) Enterprise Service Management Framework (DESMF). Identify the benefits of DESMF. 30 Given a DoD software acquisition, describe software systems that are acquired in support of the National Defense Strategy. Define information superiority as it relates to the National Defense Strategy objectives. Identify the three (3) key DoD software domains. Define features of a DoD software system. Page 5 of 5
ISA 201 Intermediate Information System Acquisition
ISA 201 Intermediate Information System Acquisition Lesson 4 Learning Objectives Today we will learn to: Given the decision to develop a DoD IT/SW system, select the appropriate acquisition strategies
More informationGiven design trade studies, interpret the results to recommend the most cost-effective concept for development.
1 Summarize the Planning, Programming, Budgeting and Execution (PPBE) process. Analyze the financial structure and the movement of funds within the PPBE. 2 Given a scenario, develop an appropriate PMO
More informationDOD INSTRUCTION BUSINESS SYSTEMS REQUIREMENTS AND ACQUISITION
DOD INSTRUCTION 5000.75 BUSINESS SYSTEMS REQUIREMENTS AND ACQUISITION Originating Component: Office of the Under Secretary of Defense for Acquisition and Sustainment Effective: February 2, 2017 Change
More informationBoost Your Skills with On-Site Courses Tailored to Your Needs
Boost Your Skills with On-Site Courses Tailored to Your Needs www.aticourses.com The Applied Technology Institute specializes in training programs for technical professionals. Our courses keep you current
More informationDoD Template for Application of TLCSM and PBL In the Weapon System Life Cycle
DoD Template for Application of TLCSM and PBL In the Weapon System Life Cycle The purpose of this template is to provide program managers, their staff, and logistics participants in the acquisition process
More informationTOPIC DESCRIPTION SUPPLEMENT for the SYSTEMS ENGINEERING SURVEY DESCRIPTION
1 2 Objectives of Systems Engineering 3 4 5 6 7 8 DoD Policies, Regulations, & Guidance on Systems Engineering Roles of Systems Engineering in an Acquisition Program Who performs on an Acquisition Program
More informationInteroperability Developmental Test & Evaluation Guidance
Developmental Test & Evaluation Guidance May 2017 DT&E Initiative Team BLUF DT&E Guidance Include interoperability as part of overall DT&E strategy, developed early Outline DT&E activities in the TEMP
More informationProgram Management. PREFERRED: o Level II or III Certification in a second DAWIA career field.
Program Management Specific Functional Requirements for Key Leadership Positions (Attributes and Demonstrated Experience Beyond Level III Certification) Education: PREFERRED: o Advanced Degree Preferably
More informationISA 201 Information System Acquisition
ISA 201 Information System Acquisition Lesson 16 Learning Objectives Today we will learn to: Overall: Given a DoD IT/SW acquisition scenario, apply software T&E best practices that result in system acceptance.
More information25 January 2010 Software Maintenance Cost Worksheet
WBS Title Description Government Or Contractor 1.0 Operations, Maintenance & This entry collects the total cost associated with maintaining a system after it has been accepted by the customer (DD-250).
More informationNet-Ready Key Performance Parameter (NR-KPP) Implementation Guidebook
Net-Ready Key Performance Parameter (NR-KPP) Implementation Guidebook Version 1.0 1 October 2009 Assistant Secretary of the Navy (Research, Development, and Acquisition) Chief Systems Engineer Department
More informationNew Acquisition Policy and Its Impact on Systems Engineering
New Acquisition Policy and Its Impact on Systems Engineering NDIA 11 th Annual Systems Engineering Conference October 21, 2008 Sharon Vannucci Systems and Software Engineering/Enterprise Development Office
More informationMission-Level Systems Engineering
6 th Annual DoD Enterprise Architecture Conference Mission-Level Systems Engineering Mr. Ricardo Cabrera ASN (RD&A) CHSENG Hampton, VA 13 Apr 2011 DISTRIBUTION STATEMENT A. Approved for public release;
More informationThis resource is associated with the following paper: Assessing the maturity of software testing services using CMMI-SVC: an industrial case study
RESOURCE: MATURITY LEVELS OF THE CUSTOMIZED CMMI-SVC FOR TESTING SERVICES AND THEIR PROCESS AREAS This resource is associated with the following paper: Assessing the maturity of software testing services
More informationAGILE DEVELOPMENT AND DELIVERY FOR INFORMATION TECHNOLOGY
I. Purpose Department of Homeland Security DHS Directives System Instruction Number: 102-01-004 Revision Number: 00 Issue Date: 4/11/2016 AGILE DEVELOPMENT AND DELIVERY FOR INFORMATION TECHNOLOGY For information
More informationAn Enhanced Analysis of Alternatives (AoA)
An Enhanced Analysis of Alternatives (AoA) A Mission-Oriented, Evaluation-Based Framework for Defense Test & Evaluation Highlighting Emerging Roles for Systems Engineering in Defense Decision Making Abstract
More informationUnemployment Compensation Project Independent Verification and Validation Monthly Assessment Report Summary. period ending 30 September 2010
Unemployment Compensation Project Independent Verification and Validation Monthly Assessment Report Summary period ending 30 September 2010 General All critical deficiencies with the UC project identified
More informationUsing CMMI with Defense Acquisition
Using CMMI with Defense Acquisition Providing a Framework for Achieving Desired Outcomes 10-Dec-02 Joe Jarzombek, PMP Deputy Director for Software Intensive Systems Systems Engineering Directorate Office
More informationMajor Defense Acquisition Programs (MDAP)
2 2 ACAT I Major Defense Acquisition Programs (MDAP) Sub Category Criteria in (CY00$) MDA ACAT ID Total RDT&E ($365M) ACAT 1C Total Procmt ($2.19B) USD (AT&L) special interest USD AT&L SAE or CAE Major
More informationEDWARDS PERFORMANCE SOLUTIONS
REVISED: J 5523920 PORTFOLIO MANAGEMENT SIZE STANDARD: $7.0M Edwards Project Solution ( ) provides portfolio management services through building enterprise project management solutions and providing portfolio
More informationSoftware Sustainment. Defense Acquisition University Jason Hamilton Professor, Information Technology 7 June PSM Workshop [7 June 2017] 1
Software Sustainment Defense Acquisition University Jason Hamilton Professor, Information Technology 7 June 2017 2017 PSM Workshop [7 June 2017] 1 Why does Software Sustainment Matter? Most DoD systems
More informationIntermediate Systems Acquisition Course. Lesson 3.15 Full Rate Production ADE-3. Supporting ADE-3
Supporting ADE-3 At the end of the Obtain Phase, the program office prepares for Acquisition Decision Event 3 (ADE-3). ADE-3 is the production decision to advance to the Produce/Deploy/Support/Dispose
More informationApplying Software Architecture Principles in a DoD Acquisition
Applying Software Architecture Principles in a DoD Software in Workshop October 2007 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information
More informationA Proposed Community Roadmap for Advancing the Practice of Model-Based Systems Engineering in Government Programs and Enterprises
A Proposed Community Roadmap for Advancing the Practice of Model-Based Systems Engineering in Government Programs and Enterprises Ryan Noguchi Director, System of Systems Engineering Office 3 November
More informationTitle: Integrating EA into the Full Information Systems Life Cycle
Presentation to: Architecture Practitioners Conference Title: Integrating EA into the Full Information Systems Life Cycle 1 John J. Keane, Jr. M.S. Computer Science, MBA ITIL Foundation Chief Information
More informationOne of the most important activities in the Production and Deployment phase is Test and
1 One of the most important activities in the Production and Deployment phase is Test and Evaluation. And, as HSI practitioners, you should be right in the middle of these activities. iti You need to verify
More informationThe Information Technology Management Reform Act. Clinger-Cohen Act of 1996
The Information Technology Management Reform Act Clinger-Cohen Act of 1996 CMWG November 9, 2004 Clinger-Cohen Act of 1996 BRIEFING OUTLINE Background Compliant Components Implementation Components Configuration
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Portfolio Management Portfolio Management is the process of analyzing, selecting, controlling, and evaluating needs
More informationNational Aeronautics and Space Administration Washington, DC 20546
Technical Standards Division Publication NASA-STD-2100-91 NASA Software Documentation Standard Software Engineering Program NASA-STD-2100-91 -91 Approved: July 29, 1991 National Aeronautics and Space Administration
More informationKey Leadership Position Joint Qualification Board Application
Key Leadership Position Joint Qualification Board Application The information collected in this application will be used by the Key Leadership Position (KLP) Qualification Board to identify personnel with
More informationIntegrated Product Support Procedures
Department of the Army Pamphlet 700 127 Logistics Integrated Product Support Procedures Headquarters Department of the Army Washington, DC 28 September 2016 UNCLASSIFIED SUMMARY of CHANGE DA PAM 700 127
More informationProject Management by Functional Capability. NDIA CMMI Technology Conference and User s Group November 15, 2007
Project Management by Functional Capability NDIA CMMI Technology Conference and User s Group November 15, 2007 Fred Schenker Software Engineering Institute Bob Jacobs Computer Systems Center Inc. Goals
More informationCMMI A-Specification. Version 1.7. November, For CMMI Version 1.2. This document is controlled by the CMMI Steering Group.
CMMI A-Specification Version 1.7 For CMMI Version 1.2 November, 2007 This document is controlled by the CMMI Steering Group. CHANGE PAGE HISTORY This is the first release of the A-Spec for CMMI v1.2. Change
More informationDepartment of Defense Fiscal Year (FY) 2016 President's Budget Request Defense Contract Audit Agency Overview
Mission Area Business System Breakout Appropriation WMA 1.340 BMA 2.950 Total 31.633 Defense Business Systems 2.950 PROCUREMENT 1.488 EIEMA 27.343 All Other Resources 28.683 FY 2016 ($M) FY 2016 ($M) OPERATIONS
More informationSoftware Acquisition Best Practices for Ground Systems
GSAW 2007 Software Acquisition Best Practices for Ground Systems Suellen Eslinger Software Engineering Subdivision Computers and Software Division The Aerospace Corporation March 27, 2007 2003-2007 The
More informationIntermediate Systems Acquisition Course. Lesson 2.11 Program Approval ADE-2. Program Approval ADE-2
Program Approval ADE-2 At the end of the Analyze/Select Phase, the program office prepares for the next major acquisition decision event, Acquisition Decision Event 2A (ADE-2A). ADE-2A approves the program
More informationWORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B
1. Work Plan & IV&V Methodology 1.1 Compass Solutions IV&V Approach The Compass Solutions Independent Verification and Validation approach is based on the Enterprise Performance Life Cycle (EPLC) framework
More informationKNIGHT POINT S NETWORK MANAGED SERVICES DELIVERING COMMUNICATIONS AS A SERVICE TO THE FEDERAL GOVERNMENT
KNIGHT POINT S NETWORK MANAGED SERVICES DELIVERING COMMUNICATIONS AS A SERVICE TO THE FEDERAL GOVERNMENT Background: A Changing Environment Current trends in government and industry are driving dramatic
More informationRange Sustainment Enterprise Range Information Systems: Building the Foundation for a DoD Range Enterprise. March 2006
Range Sustainment Enterprise Range Information Systems: Building the Foundation for a DoD Range Enterprise March 2006 Agenda The Range Information Enterprise Initiative Context Vision Enterprise Analysis
More informationBest Practices for the Architecture, Design, and Modernization of Defense Models and Simulations
1 Best Practices for the Architecture, Design, and Modernization of Defense Models and Simulations Dr. Katherine L. Morse, JHU/APL Brian Miller, US Army CERDEC NVESD Michael Heaphy, OSD(AT&L)/DMSCO Outline
More informationINTERMEDIATE QUALIFICATION
PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE LIFECYCLE SERVICE TRANSITION CERTIFICATE SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a registered trade mark
More informationLeveraging Your Service Quality Using ITIL V3, ISO and CMMI-SVC. Monday Half-Day Tutorial
Leveraging Your Service Quality Using ITIL V3, ISO 20000 and CMMI-SVC Monday Half-Day Tutorial Definitions Service - Employment in duties or work for another The Challenge This situation where organization
More informationConfiguration Management
Configuration Management January 22, 2013 American Society for Quality (ASQ) Washington, DC and Maryland Section 509 Software Special Interest Group (SSIG) Co Russ Roseman and Al Florence This presenter
More informationTrends in DoD Contracting
Trends in DoD Contracting 18 February 2015 Presented to: NCMA CAPT Stephen Armstrong Statement B: Distribution authorized to U.S. government agencies only; Other requests must be referred to COMSPAWAR
More informationINTERMEDIATE QUALIFICATION
PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE LIFECYCLE SERVICE TRANSITION CERTIFICATE SYLLABUS The Swirl logo is a Trade Mark of the Office of Government Commerce ITIL is a Registered
More informationA Primer on. Software Licensing. Charlene Gross Software Engineering Institute. Do You Own It or Not? Charlene Gross, April 19-23, 2010
- A Primer on Noncommercial Software Licensing Charlene Gross Software Engineering Institute Carnegie Mellon University Charlene Gross, April 19-23, 2010 Report Documentation Page Form Approved OMB No.
More informationDoD Architecture Framework Version 2.0 Draft
1 wreath stars Text 2 3 4 5 6 7 8 9 10 DoD Architecture Framework Version 2.0 Draft 11 12 13 14 15 16 17 18 19 20 21 22 23 Volume 1: Introduction, Overview, and Concepts Management Volume 24 December 2008
More informationProgram Lifecycle Methodology Version 1.7
Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated
More informationContinual Process Improvement (CPI) In Public-Private Partnerships (PPP)
Continual Process Improvement (CPI) In Public-Private Partnerships (PPP) Expanding Scope of PPP December 4th, 2017 Ms. Misty Goss (Ogden Air Logistics Complex Mr. Mike Phillips (Software Engineering Institute)
More informationPowerful Mechanism for Deployment. November 2004 Copyright 2004 Raytheon Company. All rights reserved.
Team-of of-four Powerful Mechanism for Deployment Author contact info Laurie Haack Senior Principal Software Engineer Engineering Process Group Network Centric Systems Raytheon Company Fullerton, CA lahaack@raytheon.com
More informationSystems Engineering Management Plan?
Writing a Systems Engineering Plan, or a Systems Engineering Management Plan? Think About Models and Simulations Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering
More informationConfiguration Management
Configuration Management 12 th Annual NDIA CMMI Conference November 2012 - Denver, CO Al Florence The MITRE Corporation This presenter s affiliation with the MITRE Corporation is provided for identification
More informationDocument Control Information
Document Control Information Document Details Document Name Purpose of Document Document Version Number 5.3 Document Status Document Owner Prepared By The ITIL Intermediate Qualification Service Transition
More informationThe Integrated Baseline Review (IBR)
Page 1 of 10 The Integrated Baseline (IBR) The IBR management review is concerned more with the technical planning aspects and understanding how a contractor manages a project than past reviews that focused
More informationTest and Evaluation for Agile Information Technologies. Steve Hutchison DISA T&E
Test and Evaluation for Agile Information Technologies Steve Hutchison DISA T&E ag ile [aj-uh l, -ahyl] - adjective 1.quick and well-coordinated in movement Dictionary.com Based on the Random House Dictionary,
More informationConfiguration Management
Configuration Management November 2010 DC SPIN Seminar Co Russ Roseman and Al Florence This presenter s affiliation with the MITRE Corporation is provided for identification purposes only and is not intended
More informationReport of the Reliability Improvement Working Group Table of Contents
Report of the Reliability Improvement Working Group 1942 poster commissioned by US Office for Emergency Management, Office of War Information Courtesy of the National Archives September 2008 Report of
More informationCGEIT Certification Job Practice
CGEIT Certification Job Practice Job Practice A job practice serves as the basis for the exam and the experience requirements to earn the CGEIT certification. This job practice consists of task and knowledge
More informationEnhanced Systems Engineering - Starting Programs Right
Enhanced Systems Engineering - Starting Programs Right NDIA 11 th Annual Systems Engineering Conference October 23, 2008 Ceasar D. Sharper Systems and Software Engineering/Enterprise Development Office
More informationAn Enhanced Analysis of Alternatives (AoA)
An Enhanced Analysis of Alternatives (AoA) A Mission-Oriented, Evaluation-Based Framework for Defense Test Evaluation NDIA March 2-5. 2009 Vince Roske Institute for Defense Analyses vroske@ida.org 703
More informationM3 Playbook Guidance. 1.1 Establish Initial Customer PMO and Processes. Human Resources (HR)/Staffing Plan
M3 Playbook Guidance Phase 1: Readiness This guidance is intended for use by organizations to confirm and validate that their plans are comprehensive and have adequate level of detail for proper migration
More informationSystems Engineering: The Glue that Binds Disparate Acquisition Organizations
Systems Engineering: The Glue that Binds Disparate Acquisition Organizations Thomas H. Holzer, D.Sc. 1 May 2008 SSTC 2008 Thomas.h.holzer@nga.mil 1 Topics The Situation The Ways Forward The Benefits 2
More informationThe Federal Enterprise Architecture Security and Privacy Profile (FEA-SPP) Architecture and Infrastructure Committee Federal CIO Council
The Federal Enterprise Architecture Security and Privacy Profile (FEA-SPP) Architecture and Infrastructure Committee Federal CIO Council FEA-SPP Briefing Topics Defining the FEA-SPP Visualizing an Architecture
More information3 PART THREE: WORK PLAN AND IV&V METHODOLOGY (SECTION 5.3.3)
3 PART THREE: WORK PLAN AND IV&V METHODOLOGY (SECTION 5.3.3) Emagine IT s approach to Independent Verification and Validation (IV&V) has been shaped over the years by hands-on experience and contributions
More informationITIL: Planning, Protection & Optimization Course 02 Planning, Protection & Optimization
ITIL: Planning, Protection & Optimization Course 02 Planning, Protection & Optimization Course Slide 1 Planning, Protection & Optimization Topics Covered Learning Objectives Terms-to-Know Introduction
More informationSoftware Maintenance, Sustaining Engineering, and Operational Support
Software Maintenance, Sustaining Engineering, and Operational Support Estimating Software Maintenance Costs for U.S. Army Weapons Systems Office of the Deputy Assistant Secretary of the Army for Cost and
More informationCurrent State of Capability-based System of Systems Engineering in Korea Ministry of National Defense
Current State of Capability-based System of Systems Engineering in Korea Ministry of National Defense Jae-Hong Ahn 1, Yeunseung Ryu 2 and Doo-Kwon Baik 3 1 Agency for Defense Development, Korea koreaseman@daum.net
More informationProgram managers (PMs)
BEST PRACTICES Integrating Systems Engineering with Earned Value Management Program managers (PMs) expect their supplier s earned value management system (EVMS) to accurately report the program s integrated
More informationDr. Fatma Dandashi October, 2003
Systems Technical Operational DoD Architecture Framework Overview Dr. Fatma Dandashi October, 2003 Outline Policy and Guidance on Architecture History of the Framework Framework Definitions and Purpose
More informationINTERMEDIATE QUALIFICATION
PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE LIFECYCLE CONTINUAL SERVICE IMPROVEMENT CERTIFICATE SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a registered
More informationDeveloped by: Steven Jacobs, Eck Doerry
Developed by: Steven Jacobs, Eck Doerry 1 Consequences of Bad Requirements Engineering http://www.knovelblogs.com/2012/08/30/the-importance-of-requirements-engineering/ 2 Building an efficient organization
More informationTECHNICAL REVIEWS AND AUDITS FOR SYSTEMS, EQUIPMENT AND COMPUTER SOFTWARE
BY ORDER OF THE COMMANDER SMC Standard SMC-S-21 15 September 2009 ------------------------ Supersedes: New issue Air Force Space Command SPACE AND MISSILE SYSTEMS CENTER STANDARD TECHNICAL REVIEWS AND
More informationCOMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 63-145 30 SEPTEMBER 2016 Acquisition MANUFACTURING AND QUALITY MANAGEMENT COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications
More informationRisk Management Beyond CMMI Level 5
Risk Management Beyond CMMI Level 5 CMMI Technology Conference & User Group 13-16 November 2006 Warren Scheinin & Rick Hefner, Ph.D. Northrop Grumman Corporation Background There are several straightforward
More informationDoD Architecture Framework
wreath stars Text DoD Architecture Framework Version 2.03 Volume 1: Overview and Concepts Manager s Guide NORMATIVE 07 December 2012 i ii This page left intentionally blank Executive Summary The Department
More informationReport of the Reliability Improvement Working Group (RIWG) Volume II - Appendices
Report of the Reliability Improvement Working Group (RIWG) Volume II - Appendices Appendix 1 Formulate Programs with a RAM Growth Program II-1 1.1 Reliability Improvement Policy II-3 1.2 Sample Reliability
More information2013 Rational Software Open Labs
2013 Rational Software Open Labs Target to better LEARNING (not substitution for full training course) Software Choose from one or more of twelve Self-Paced, Hands-On Labs: Rational System Architect for
More informationContinuous Diagnostic and Mitigation and Continuous Monitoring as a Service. CMaaS TASK AREAS
Continuous Diagnostic and Mitigation and Continuous Monitoring as a Service CMaaS TASK AREAS CMaaS TASK AREAS The contractor shall provide functional, strategic, and managerial business consulting and
More informationDocument Control Information
Document Control Information Document Details Document Name Purpose of Document Document Version Number 5.5 Document Status Document Owner Prepared By The ITIL Intermediate Qualification Continual Service
More informationCommittee. Holly Coulter Dunlap, Chair Beth Wilson, Alternate Chair. October 2013
NDIA Systems Security Engineering Committee Welcome and Update Holly Coulter Dunlap, Chair Beth Wilson, Alternate Chair October 2013 NDIA SE Conference October 2013 1 Systems Security Engineering Committee
More informationRISK MANAGEMENT GUIDE FOR DOD ACQUISITION
RISK MANAGEMENT GUIDE FOR DOD ACQUISITION Sixth Edition (Version 1.0) August, 2006 Department of Defense Preface The Department of Defense (DoD) recognizes that risk management is critical to acquisition
More informationObjective Demonstration of Process Maturity Through Measures
Objective Demonstration of Process Maturity Through Measures 2000 PSM Users Group Conference Vail, Colorado 24-28 July 2000 Presented By: Perry R. DeWeese Lockheed Martin 7 July 2000 1 Agenda: Concept
More informationCENTRE (Common Enterprise Resource)
CENTRE (Common Enterprise Resource) Systems and Software Engineering Platform designed for CMMI compliance Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations
More informationAppendix. Process Inputs and Outputs
3601cA.fm Page 493 Wednesday, October 26, 2005 12:47 AM Appendix A Process and Throughout this book, PMP: Management Professional Study Guide, 3rd Edition, I ve discussed the inputs and outputs to the
More informationUsing CMMI to Improve Earned Value Management
Using CMMI to Improve Earned Value Management CMMI Technology Conference and User Group Denver, CO November 13, 2002 Paul Solomon PMP Software Engineering Institute and Northrop Grumman Integrated Systems
More informationUNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification Date: February 2005 APPROPRIATION/BUDGET ACTIVITY DEFENSE WIDE RDT&E BA 6
Exhibit R-2, RDT&E Budget Item Justification Date: February 2005 APPROPRIATION/BUDGET ACTIVITY DEFENSE WIDE RDT&E BA 6 R-1 ITEM NOMENCLATURE Capital Asset Management Systems -Military Equipment Evaluation
More informationDocument Control Information
Document Control Information Document Details Document Name Purpose of Document Document Version Number 5.5 Document Status Document Owner Prepared By The ITIL Intermediate Qualification Continual Service
More informationSCEA Conference Integrated Critical Scheduling (ICS)
0 SCEA Conference Integrated Critical Scheduling (ICS) Jared Mathey Dustin Sexton Donna Pucciarello June 2010 1 Outline THE NEED - a changing Acquisition landscape METHODOLOGY - a phased approach for managing
More informationAligning System Development and Testing for Successful IOT&E
Aligning System Development and Testing for Successful IOT&E NDIA Systems Engineering Conference October 2011 #12967 This presentation is the work of the author. The views, opinions, and findings should
More informationUsing JCIDS DoDAF Architecture Primitives to Assemble a Repository for Enterprise-wide Analysis and Decision-Making
12TH ICCRTS Adapting C2 to the 21st Century Using JCIDS DoDAF Architecture Primitives to Assemble a Repository for Enterprise-wide Analysis and Decision-Making Topics: Track 1: C2 Concepts, Theory, and
More informationEnterprise Architecture as an Essential Tool Supporting Army Transformation. Fernando Mezquita
Enterprise Architecture as an Essential Tool Supporting Army Transformation Fernando Mezquita There are two ways of spreading light: to be the candle or the mirror that reflects it. Edith Wharton, 1862-1937
More informationNASA Procedural Requirements
NASA Procedural Requirements NPR 7150.2 Effective Date: September 27, 2004 Expiration Date: September 27, 2009 NASA Software Engineering Requirements Responsible Office: Office of the Chief Engineer 0
More informationTECHNICAL REVIEWS AND AUDITS
Chapter 11 Technical Reviews and Audits CHAPTER 11 TECHNICAL REVIEWS AND AUDITS 11.1 PROGRESS MEASUREMENT The Systems Engineer measures design progress and maturity by assessing its development at key
More informationPART THREE: Work Plan and IV&V Methodology (RFP 5.3.3)
PART THREE: Work Plan and IV&V Methodology (RFP 5.3.3) 3.1 IV&V Methodology and Work Plan 3.1.1 NTT DATA IV&V Framework We believe that successful IV&V is more than just verification that the processes
More informationProposed Approach to Heterogeneous CMMI. Appraisals. Joseph V. Vandeville. 14 November 2007
Proposed Approach to Heterogeneous CMMI Appraisals 14 November 2007 Joseph V. Vandeville Northrop Grumman Corporation Andy Felschow The Process Company, LLC Topics What is a heterogeneous appraisal What
More informationOn Selling the Enterprise Architecture Concept to Business Executives
On Selling the Enterprise Architecture Concept to Business Executives October 22, 2003 Ajit Kapoor Lockheed Martin Corporation Architecture Practitioners' Conference Enterprise Architecture: Making IT
More informationCENTRE (Common Enterprise Resource)
CENTRE (Common Enterprise Resource) Systems and Software Engineering Platform designed for CMMI compliance Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations
More informationA Framework for Developing a Digital System Model Taxonomy
A Framework for Developing a Digital System Model Taxonomy Ms. Philomena Phil Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering 18th Annual NDIA Systems Engineering
More informationReliability and Maintainability (R&M) Engineering Update
Reliability and Maintainability (R&M) Engineering Update Mr. Andrew Monje Office of the Deputy Assistant Secretary of Defense for Systems Engineering 15th Annual NDIA Systems Engineering Conference San
More informationSystems Engineering Processes Applied To Ground Vehicle Integration at US Army Tank Automotive Research, Development, and Engineering Center (TARDEC)
2010 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM SYSTEMS ENGINEERING MINI-SYMPOSIUM AUGUST 17-19 DEARBORN, MICHIGAN Systems Engineering Processes Applied To Ground Vehicle Integration
More information