DEFENSE ACQUISITION UNIVERSITY ISA 101 BASIC INFORMATION SYSTEM ACQUISITION

Size: px
Start display at page:

Download "DEFENSE ACQUISITION UNIVERSITY ISA 101 BASIC INFORMATION SYSTEM ACQUISITION"

Transcription

1 1 Identify applicable United States laws, federal regulations and DoD directives that govern management of IT/SW systems. Identify key statutes related to the acquisition of Information Technology (IT) and software. Identify Executive Orders, OMB Circulars and Federal regulations important to DoD IT/SW Acquisition. Identify DoD key Information Technology (IT) and software management directives (policies), instructions (regulations), and guidebooks. Recognize how Integrated Product Teams (IPTs) can help improve the acquisition of software systems thru the use of collaboration. Identify the requirements of Title 40, Subtitle III (Clinger-Cohen Act (CCA)). Identify the responsibilities of a Chief Information Officer (CIO). 2 Given a DoD IT/SW acquisition scenario, describe appropriate acquisition strategies that achieve system capabilities. Define the most common IT Acquisition Strategy approaches. Select the appropriate systems-level acquisition approach based on the characteristics of the system being developed. Identify the proposed, system software-based, Evolutionary Acquisition model options defined by DoD. Relate acquisition strategy approaches to risks. 3 Given a DoD IT/SW scenario, describe the IT/SW factors that impact a Product Support Business Case Analysis (PS BCA). Define Product Support BCA. Recognize that Modular Open Systems Approach (MOSA) is a critical product support factor when developing a Product Support BCA. Recognize that Intellectual Property (IP) is a critical product support factor when developing a Product Support BCA. Recognize which software support products are needed for successful product support. Recognize the data management products needed for successful product support. Recognize IT/SW security inputs needed for successful product support. Identify the purpose for a Product Support BCA. Identify Department of Defense (DoD) Product Support BCA policy and guidance. Interpret the meaning of 'best value' analysis as accomplished by Product Support BCAs. Identify the seven (7) major tasks the IT Professional provides to building a Product Support BCA. Identify at least three benefits of doing the Product Support BCA. Identify three Information Technology (IT) areas that impact the best value benefits analysis of the Product Support BCA. Recall the important sections of the Product Support BCA to ensure Information Technology (IT) product support considerations are included. Recognize the IT inputs needed for software cost estimation. 4 Describe DoD cost and schedule estimation methods. List factors that most influence software cost and schedule estimates. Describe common cost and schedule estimation methods. Describe the attributes of parametric models. Identify commonly-used parametric models. List the seven (7) steps of a typical software estimation process. Describe each of the seven (7) steps of a typical software estimation process. 5 Given a DoD IT/SW acquisition scenario, describe the Joint Capability Integration and Development System (JCIDS) and the Investment Review Board's Business Capability Definition (BCD) planning documents mandated to describe the new DoD capability to be developed. Given an overview of the DoD capability planning processes, its objectives and expected results, identify capability planning documents from a list. Describe the Business Capability Acquisition Lifecycle (BCAC) model. Identify the role of the ICD and IS ICD in the JCIDS process. Identify how Sponsors use the ICD and IS ICD/IT Box to document IT capability requirements. Identify the role of the CDD in the JCIDS process. Identify the role of the CPD in the JCIDS process. 6 Describe the reasons why Enterprise Architecture (EA) is critical to the successful acquisition of DoD IT/SW systems. Identify the laws and policies mandating the use of an Enterprise Architecture (EA). Define Enterprise Architecture (EA). Describe the role of domain engineering. Describe the purpose of Enterprise Architecture (EA). Identify the benefits of creating an Enterprise Architecture (EA) for your domain. Page 1 of 5

2 Recognize that DoD Architecture Framework (DoDAF) is used to create the DOD Enterprise Architecture (EA). Identify three benefits of using EA tools. Identify the purpose of the DoD Architecture Framework (DoDAF) views. Views include All," "Operational," "Systems" and "Standards" views. 7 Given a DoD IT/SW acquisition scenario, describe appropriate acquisition strategies that achieve system capabilities. Define common software development paradigms. Match the software paradigm best suited for a given software item (SI) development. Describe the relationship of software paradigms being proposed in the supplier's Software Development Plan (SDP) and the Acqusition Approach you should use for your program. 8 Describe how software development process maturity impacts IT/SW programs. Recognize how standards and maturity models differ. Recognize characteristics of "process maturity". Distinguish between "mature" and "immature" developers. Identify the five levels of the CMMI. Identify characteristics of the CMMI Process Areas. 9 Given a DoD IT/SW acquisition scenario, describe critical requirements found. Describe why safety, security and privacy are critical requirements. 10 Describe the requirements management process. Explain how software requirements are determined. 11 Given a DoD IT/SW acquisition scenario, describe the Program Manager's responsibilities for software cost and schedule management. Describe why accurate estimates are needed. Identify key estimation "Lessons Learned." Recognize methods best suited for different software estimation situations. 12 Given a DoD software acquisition scenario, describe the key contractual activities used for effective technical and business solutions. Recognize the relationship between acquisition planning and the Contracting Strategy. Identify the conditions under which an enterprise license should be used. Recognize key attributes of software systems that should be considered for inclusion as part of the Request For Proposal (RFP). Recognize the opportunities and specific limitations of commercial acquisitions. Recognize the statutory and regulatory preference for competitive acquisition Differentiate between a requirement expressed as performance or outcome focused verses one that is method or procedure based. Recognize the requirement to use a surveillance strategy to monitor contractor performance. Define Modular Contracting. Identify the benefits of using Modular Contracting. Identify the contract types best suited for the acquisition of software systems. Describe the DoD Enterprise Software Initiative (ESI). 13 Given a DoD IT/SW acquisition scenario, recognize earned value as an important metric for managing software development. Describe what experienced-based best practices, lessons learned and rules of thumb (heuristics) are. Recognize examples of best practices related to DoD IT/SW acquisition. Identify where you can gain support for implementing best practices. 14 Describe why an IT/SW measurement program is critical to software development projects. Recognize the benefits and characteristics of software measurement. Define the four (4) fundamental measurement principles and terminology used in conjunction with the PSM Measurement Information Model. Identify the key experienced-based best practices used to design the DoD Practical Software and System Measurement (PSM) process. Describe the PSM Measurement Process Model used to develop and implement a measurement program. Recognize the seven (7) categories of software measures. Describe how software indicators are used to "paint the picture" of progress for an information need. Recognize the PSM lessons learned in planning for a measurement program. 15 Describe how to use IT/software measurement methods to help determine software development progress. Page 2 of 5

3 Identify top-level categories of software measures. Recognize ways indicators should be selected. Identify activities and associated tasks for putting measurement into practice. Recognize criteria used to interpret common software measures. 16 Given a DoD IT/SW program with a measurement program, describe effective ways to interpret the data to track software acquisition progress. Recognize the impacts to the software development plan (e.g., trends) when interpreting software measures. Describe potential software acquisition problems after viewing a program's metric data. Recognize characteristics of Technical Performance Measurement and software measurement. Recall characteristics of enterprise-level measurement. Recall key laws mandating enterprise-level measurement. 17 Given a software-reliant system, describe appropriate Risk, Opportunity and Issue Management processes. Define the term "Risk, Issue and Opportunity Management." List some common software development risks. Describe potential mitigation strategies for common software development risks. Recognize the key attributes of Risk Management. Recall the five (5) steps of the DoD Risk Management process. Identify the elements of risk management planning. Summarize factors making software risk management difficult. Identify Federal statutes, DoD policies and Best Practices relating to Risk Management. Describe the five steps that compose the Risk Management Process: Risk Planning, Risk Identification, Risk Analysis, Risk Handling, Risk Monitoring. Describe the Risk Management Inputs and Outputs. Describe Risk Roll Up. Recognize benefits of Tracking Earned Value in measuring program progress. 18 Describe the role of DoD Test & Evaluation (T&E) in DoD software development. Recognize characteristics of DoD Test & Evaluation (T&E). Recognize characteristics of the Test and Evaluation Master Plan (TEMP). Recognize characteristics of the Software Test Plan (STP). Identify the different types of software testing. Recognize the different types of software testing tools. Recognize characteristics of Software Test Report (STR) management. Identify sample criteria that could be used to categorize software as mature. Identify what Independent Verification and Validation (IV&V) is. Recognize the benefits of Independent Verification and Validation (IV&V) in T&E. Recognize when IV&V should be employed on DoD programs. Identify laws, policies and regulations that govern DoD Test & Evaluation (T&E). Define the purpose of DoD Test & Evaluation (T&E). Recognize characteristics of Software Testing. Recognize the Software Test & Evaluation (T&E) mission. Identify the Test & Evaluation (T&E) responsibilities of the IT Program Manager (PM). Recognize characteristics of DoD Software Test Planning. Identify critical software test articles and events in planning for T&E. Identify critical DoD test plans and reviews in planning for Test & Evaluation (T&E). 19 Describe the important attributes of a DoD IT/Software Quality Assurance (SQA) program. Define the purpose of Software Quality Assurance (SQA) Identify the components (activities and events) of an effective Software Quality Assurance (SQA) program. Identify examples of common defects injected into a software development during the various phases of lifecycle development. Identify software quality factors. Page 3 of 5

4 Identify common measures used to track product and process quality in software development efforts. Given a list of quality factors and their descriptions, match the factor with its description (ISO 9126 vs Kano Model). Recognize the influences for choosing specific software quality factors. 20 Given a DoD IT/SW acquisition scenario, describe cybersecurity requirements regarding security measures, continuity of operations, privacy and protection of acquisition systems and system content. Identify the purpose of a Program Protection Plan (PPP). Define a Continuity of Operations Plan (COOP). Identify elements of a Continuity of Operations Plan (COOP). Identify the key components of a Program Protection Plan (PPP). Identify key laws dealing with critical requirements of security and privacy. Summarize the need for information security. Recognize technologies that can be used to improve information security. Recognize how the Common Criteria is used to evaluate the security of software products used in Department of Defense (DoD) information systems. Define Cybersecurity. Define the five (5) attributes of cybersecurity. Identify the overarching principles of the Risk Management Framework (RMF) for DoD Information Technology (IT). 21 Describe how the Joint Integration Environment (JIE) contributes to the interoperability of DoD IT/SW systems. Describe the Joint Integration Environment (JIE). Identify the benefits of the JIE. Identify the purpose of the JIE. 22 Describe the basics of Software Engineering in support of Systems Engineering. Identify the eight (8) steps of the Systems Engineering technical processes. Identify the eight (8) Systems Engineering technical management processes. Describe the purpose of each Systems Engineering technical process. Describe the purpose of each Systems Engineering technical management process. Recognize the software components of a Work Breakdown Structure (WBS). Identify life cycle reviews that can be used to help manage software development. Identify documentation used to specify software design. Identify key commercial standards used in DoD software development. Describe the purpose of ANSI/EIA 632, ISO 9000:2000, and ISO Recognize Net-Centric Data Management practices. Identify the key attributes of Net-Centricity. Identify DoD's Net-Centric data management strategy. Summarize DoD's Net-Centric data management strategy goals. Recognize DoD Net-Centric data management primary activities and what they mean to the PMO. Identify key program management and acquisition requirements needed for Net-Centric data management. 24 Describe the purpose of Section 508, Title 29 U.S. Code as it applies to DoD IT/SW systems. Recognize federal accessibility requirements for devices, software, and web sites. Identify the types of technology that must be included in designing accessible systems. Identify the exceptions to Section 508 accessibility requirements. 25 Given a DoD IT/SW acquisition scenario, describe the requirements for Electronic and Information Technology (E&IT) devices and software to satisfy the accessibility standards of Section 508, Title 29 U.S. law. Recognize federal accessibility requirements for electronic devices, software and websites. 26 Given a Department of Defense (DoD) IT acquisition scenario early in the lifecycle, describe software sustainment planning factors critical to the success of a potential Software Support Activity (SSA). Describe why software support planning is important. Identify key terminology for software sustainment. Describe key SW logistics support elements. Page 4 of 5

5 Identify software support planning activities. Describe key software support plans. Describe how Reliability, Availability and Maintainability (RAM) impacts software support. 27 Given a DoD IT/SW acquisition scenario, describe the cost effectiveness of the Cloud services solution. Identify basic Cloud Computing terms. Identify the risks of multitenancy. Identify the advancements in technology that enabled the rise of cloud computing. Identify cloud service models. Identify cloud deployment models. Identify five essential characteristics of cloud service. Identify the difference between virtual and physical infrastructure. Identify the laws, policies and standards that apply to Cloud Computing. Identify the benefits of consuming cloud services. Identify the benefits of multitenancy. 28 Describe the basics of Configuration Management (CM). Explain the role of Configuration Management (CM) in DoD software development. Describe the four (4) Software Configuration Management (CM) baselines. 29 Given a DoD IT/SW acquisition scenario, describe IT Service Management and DoD Enterprise Service Management Framework (DESMF). Identify Information Technology Service Management (ITSM). Identify the benefits of ITSM. Identify the Department of Defense (DoD) Enterprise Service Management Framework (DESMF). Identify the benefits of DESMF. 30 Given a DoD software acquisition, describe software systems that are acquired in support of the National Defense Strategy. Define information superiority as it relates to the National Defense Strategy objectives. Identify the three (3) key DoD software domains. Define features of a DoD software system. Page 5 of 5

ISA 201 Intermediate Information System Acquisition

ISA 201 Intermediate Information System Acquisition ISA 201 Intermediate Information System Acquisition Lesson 4 Learning Objectives Today we will learn to: Given the decision to develop a DoD IT/SW system, select the appropriate acquisition strategies

More information

Given design trade studies, interpret the results to recommend the most cost-effective concept for development.

Given design trade studies, interpret the results to recommend the most cost-effective concept for development. 1 Summarize the Planning, Programming, Budgeting and Execution (PPBE) process. Analyze the financial structure and the movement of funds within the PPBE. 2 Given a scenario, develop an appropriate PMO

More information

DOD INSTRUCTION BUSINESS SYSTEMS REQUIREMENTS AND ACQUISITION

DOD INSTRUCTION BUSINESS SYSTEMS REQUIREMENTS AND ACQUISITION DOD INSTRUCTION 5000.75 BUSINESS SYSTEMS REQUIREMENTS AND ACQUISITION Originating Component: Office of the Under Secretary of Defense for Acquisition and Sustainment Effective: February 2, 2017 Change

More information

Boost Your Skills with On-Site Courses Tailored to Your Needs

Boost Your Skills with On-Site Courses Tailored to Your Needs Boost Your Skills with On-Site Courses Tailored to Your Needs www.aticourses.com The Applied Technology Institute specializes in training programs for technical professionals. Our courses keep you current

More information

DoD Template for Application of TLCSM and PBL In the Weapon System Life Cycle

DoD Template for Application of TLCSM and PBL In the Weapon System Life Cycle DoD Template for Application of TLCSM and PBL In the Weapon System Life Cycle The purpose of this template is to provide program managers, their staff, and logistics participants in the acquisition process

More information

TOPIC DESCRIPTION SUPPLEMENT for the SYSTEMS ENGINEERING SURVEY DESCRIPTION

TOPIC DESCRIPTION SUPPLEMENT for the SYSTEMS ENGINEERING SURVEY DESCRIPTION 1 2 Objectives of Systems Engineering 3 4 5 6 7 8 DoD Policies, Regulations, & Guidance on Systems Engineering Roles of Systems Engineering in an Acquisition Program Who performs on an Acquisition Program

More information

Interoperability Developmental Test & Evaluation Guidance

Interoperability Developmental Test & Evaluation Guidance Developmental Test & Evaluation Guidance May 2017 DT&E Initiative Team BLUF DT&E Guidance Include interoperability as part of overall DT&E strategy, developed early Outline DT&E activities in the TEMP

More information

Program Management. PREFERRED: o Level II or III Certification in a second DAWIA career field.

Program Management. PREFERRED: o Level II or III Certification in a second DAWIA career field. Program Management Specific Functional Requirements for Key Leadership Positions (Attributes and Demonstrated Experience Beyond Level III Certification) Education: PREFERRED: o Advanced Degree Preferably

More information

ISA 201 Information System Acquisition

ISA 201 Information System Acquisition ISA 201 Information System Acquisition Lesson 16 Learning Objectives Today we will learn to: Overall: Given a DoD IT/SW acquisition scenario, apply software T&E best practices that result in system acceptance.

More information

25 January 2010 Software Maintenance Cost Worksheet

25 January 2010 Software Maintenance Cost Worksheet WBS Title Description Government Or Contractor 1.0 Operations, Maintenance & This entry collects the total cost associated with maintaining a system after it has been accepted by the customer (DD-250).

More information

Net-Ready Key Performance Parameter (NR-KPP) Implementation Guidebook

Net-Ready Key Performance Parameter (NR-KPP) Implementation Guidebook Net-Ready Key Performance Parameter (NR-KPP) Implementation Guidebook Version 1.0 1 October 2009 Assistant Secretary of the Navy (Research, Development, and Acquisition) Chief Systems Engineer Department

More information

New Acquisition Policy and Its Impact on Systems Engineering

New Acquisition Policy and Its Impact on Systems Engineering New Acquisition Policy and Its Impact on Systems Engineering NDIA 11 th Annual Systems Engineering Conference October 21, 2008 Sharon Vannucci Systems and Software Engineering/Enterprise Development Office

More information

Mission-Level Systems Engineering

Mission-Level Systems Engineering 6 th Annual DoD Enterprise Architecture Conference Mission-Level Systems Engineering Mr. Ricardo Cabrera ASN (RD&A) CHSENG Hampton, VA 13 Apr 2011 DISTRIBUTION STATEMENT A. Approved for public release;

More information

This resource is associated with the following paper: Assessing the maturity of software testing services using CMMI-SVC: an industrial case study

This resource is associated with the following paper: Assessing the maturity of software testing services using CMMI-SVC: an industrial case study RESOURCE: MATURITY LEVELS OF THE CUSTOMIZED CMMI-SVC FOR TESTING SERVICES AND THEIR PROCESS AREAS This resource is associated with the following paper: Assessing the maturity of software testing services

More information

AGILE DEVELOPMENT AND DELIVERY FOR INFORMATION TECHNOLOGY

AGILE DEVELOPMENT AND DELIVERY FOR INFORMATION TECHNOLOGY I. Purpose Department of Homeland Security DHS Directives System Instruction Number: 102-01-004 Revision Number: 00 Issue Date: 4/11/2016 AGILE DEVELOPMENT AND DELIVERY FOR INFORMATION TECHNOLOGY For information

More information

An Enhanced Analysis of Alternatives (AoA)

An Enhanced Analysis of Alternatives (AoA) An Enhanced Analysis of Alternatives (AoA) A Mission-Oriented, Evaluation-Based Framework for Defense Test & Evaluation Highlighting Emerging Roles for Systems Engineering in Defense Decision Making Abstract

More information

Unemployment Compensation Project Independent Verification and Validation Monthly Assessment Report Summary. period ending 30 September 2010

Unemployment Compensation Project Independent Verification and Validation Monthly Assessment Report Summary. period ending 30 September 2010 Unemployment Compensation Project Independent Verification and Validation Monthly Assessment Report Summary period ending 30 September 2010 General All critical deficiencies with the UC project identified

More information

Using CMMI with Defense Acquisition

Using CMMI with Defense Acquisition Using CMMI with Defense Acquisition Providing a Framework for Achieving Desired Outcomes 10-Dec-02 Joe Jarzombek, PMP Deputy Director for Software Intensive Systems Systems Engineering Directorate Office

More information

Major Defense Acquisition Programs (MDAP)

Major Defense Acquisition Programs (MDAP) 2 2 ACAT I Major Defense Acquisition Programs (MDAP) Sub Category Criteria in (CY00$) MDA ACAT ID Total RDT&E ($365M) ACAT 1C Total Procmt ($2.19B) USD (AT&L) special interest USD AT&L SAE or CAE Major

More information

EDWARDS PERFORMANCE SOLUTIONS

EDWARDS PERFORMANCE SOLUTIONS REVISED: J 5523920 PORTFOLIO MANAGEMENT SIZE STANDARD: $7.0M Edwards Project Solution ( ) provides portfolio management services through building enterprise project management solutions and providing portfolio

More information

Software Sustainment. Defense Acquisition University Jason Hamilton Professor, Information Technology 7 June PSM Workshop [7 June 2017] 1

Software Sustainment. Defense Acquisition University Jason Hamilton Professor, Information Technology 7 June PSM Workshop [7 June 2017] 1 Software Sustainment Defense Acquisition University Jason Hamilton Professor, Information Technology 7 June 2017 2017 PSM Workshop [7 June 2017] 1 Why does Software Sustainment Matter? Most DoD systems

More information

Intermediate Systems Acquisition Course. Lesson 3.15 Full Rate Production ADE-3. Supporting ADE-3

Intermediate Systems Acquisition Course. Lesson 3.15 Full Rate Production ADE-3. Supporting ADE-3 Supporting ADE-3 At the end of the Obtain Phase, the program office prepares for Acquisition Decision Event 3 (ADE-3). ADE-3 is the production decision to advance to the Produce/Deploy/Support/Dispose

More information

Applying Software Architecture Principles in a DoD Acquisition

Applying Software Architecture Principles in a DoD Acquisition Applying Software Architecture Principles in a DoD Software in Workshop October 2007 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information

More information

A Proposed Community Roadmap for Advancing the Practice of Model-Based Systems Engineering in Government Programs and Enterprises

A Proposed Community Roadmap for Advancing the Practice of Model-Based Systems Engineering in Government Programs and Enterprises A Proposed Community Roadmap for Advancing the Practice of Model-Based Systems Engineering in Government Programs and Enterprises Ryan Noguchi Director, System of Systems Engineering Office 3 November

More information

Title: Integrating EA into the Full Information Systems Life Cycle

Title: Integrating EA into the Full Information Systems Life Cycle Presentation to: Architecture Practitioners Conference Title: Integrating EA into the Full Information Systems Life Cycle 1 John J. Keane, Jr. M.S. Computer Science, MBA ITIL Foundation Chief Information

More information

One of the most important activities in the Production and Deployment phase is Test and

One of the most important activities in the Production and Deployment phase is Test and 1 One of the most important activities in the Production and Deployment phase is Test and Evaluation. And, as HSI practitioners, you should be right in the middle of these activities. iti You need to verify

More information

The Information Technology Management Reform Act. Clinger-Cohen Act of 1996

The Information Technology Management Reform Act. Clinger-Cohen Act of 1996 The Information Technology Management Reform Act Clinger-Cohen Act of 1996 CMWG November 9, 2004 Clinger-Cohen Act of 1996 BRIEFING OUTLINE Background Compliant Components Implementation Components Configuration

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Portfolio Management Portfolio Management is the process of analyzing, selecting, controlling, and evaluating needs

More information

National Aeronautics and Space Administration Washington, DC 20546

National Aeronautics and Space Administration Washington, DC 20546 Technical Standards Division Publication NASA-STD-2100-91 NASA Software Documentation Standard Software Engineering Program NASA-STD-2100-91 -91 Approved: July 29, 1991 National Aeronautics and Space Administration

More information

Key Leadership Position Joint Qualification Board Application

Key Leadership Position Joint Qualification Board Application Key Leadership Position Joint Qualification Board Application The information collected in this application will be used by the Key Leadership Position (KLP) Qualification Board to identify personnel with

More information

Integrated Product Support Procedures

Integrated Product Support Procedures Department of the Army Pamphlet 700 127 Logistics Integrated Product Support Procedures Headquarters Department of the Army Washington, DC 28 September 2016 UNCLASSIFIED SUMMARY of CHANGE DA PAM 700 127

More information

Project Management by Functional Capability. NDIA CMMI Technology Conference and User s Group November 15, 2007

Project Management by Functional Capability. NDIA CMMI Technology Conference and User s Group November 15, 2007 Project Management by Functional Capability NDIA CMMI Technology Conference and User s Group November 15, 2007 Fred Schenker Software Engineering Institute Bob Jacobs Computer Systems Center Inc. Goals

More information

CMMI A-Specification. Version 1.7. November, For CMMI Version 1.2. This document is controlled by the CMMI Steering Group.

CMMI A-Specification. Version 1.7. November, For CMMI Version 1.2. This document is controlled by the CMMI Steering Group. CMMI A-Specification Version 1.7 For CMMI Version 1.2 November, 2007 This document is controlled by the CMMI Steering Group. CHANGE PAGE HISTORY This is the first release of the A-Spec for CMMI v1.2. Change

More information

Department of Defense Fiscal Year (FY) 2016 President's Budget Request Defense Contract Audit Agency Overview

Department of Defense Fiscal Year (FY) 2016 President's Budget Request Defense Contract Audit Agency Overview Mission Area Business System Breakout Appropriation WMA 1.340 BMA 2.950 Total 31.633 Defense Business Systems 2.950 PROCUREMENT 1.488 EIEMA 27.343 All Other Resources 28.683 FY 2016 ($M) FY 2016 ($M) OPERATIONS

More information

Software Acquisition Best Practices for Ground Systems

Software Acquisition Best Practices for Ground Systems GSAW 2007 Software Acquisition Best Practices for Ground Systems Suellen Eslinger Software Engineering Subdivision Computers and Software Division The Aerospace Corporation March 27, 2007 2003-2007 The

More information

Intermediate Systems Acquisition Course. Lesson 2.11 Program Approval ADE-2. Program Approval ADE-2

Intermediate Systems Acquisition Course. Lesson 2.11 Program Approval ADE-2. Program Approval ADE-2 Program Approval ADE-2 At the end of the Analyze/Select Phase, the program office prepares for the next major acquisition decision event, Acquisition Decision Event 2A (ADE-2A). ADE-2A approves the program

More information

WORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B

WORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B 1. Work Plan & IV&V Methodology 1.1 Compass Solutions IV&V Approach The Compass Solutions Independent Verification and Validation approach is based on the Enterprise Performance Life Cycle (EPLC) framework

More information

KNIGHT POINT S NETWORK MANAGED SERVICES DELIVERING COMMUNICATIONS AS A SERVICE TO THE FEDERAL GOVERNMENT

KNIGHT POINT S NETWORK MANAGED SERVICES DELIVERING COMMUNICATIONS AS A SERVICE TO THE FEDERAL GOVERNMENT KNIGHT POINT S NETWORK MANAGED SERVICES DELIVERING COMMUNICATIONS AS A SERVICE TO THE FEDERAL GOVERNMENT Background: A Changing Environment Current trends in government and industry are driving dramatic

More information

Range Sustainment Enterprise Range Information Systems: Building the Foundation for a DoD Range Enterprise. March 2006

Range Sustainment Enterprise Range Information Systems: Building the Foundation for a DoD Range Enterprise. March 2006 Range Sustainment Enterprise Range Information Systems: Building the Foundation for a DoD Range Enterprise March 2006 Agenda The Range Information Enterprise Initiative Context Vision Enterprise Analysis

More information

Best Practices for the Architecture, Design, and Modernization of Defense Models and Simulations

Best Practices for the Architecture, Design, and Modernization of Defense Models and Simulations 1 Best Practices for the Architecture, Design, and Modernization of Defense Models and Simulations Dr. Katherine L. Morse, JHU/APL Brian Miller, US Army CERDEC NVESD Michael Heaphy, OSD(AT&L)/DMSCO Outline

More information

INTERMEDIATE QUALIFICATION

INTERMEDIATE QUALIFICATION PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE LIFECYCLE SERVICE TRANSITION CERTIFICATE SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a registered trade mark

More information

Leveraging Your Service Quality Using ITIL V3, ISO and CMMI-SVC. Monday Half-Day Tutorial

Leveraging Your Service Quality Using ITIL V3, ISO and CMMI-SVC. Monday Half-Day Tutorial Leveraging Your Service Quality Using ITIL V3, ISO 20000 and CMMI-SVC Monday Half-Day Tutorial Definitions Service - Employment in duties or work for another The Challenge This situation where organization

More information

Configuration Management

Configuration Management Configuration Management January 22, 2013 American Society for Quality (ASQ) Washington, DC and Maryland Section 509 Software Special Interest Group (SSIG) Co Russ Roseman and Al Florence This presenter

More information

Trends in DoD Contracting

Trends in DoD Contracting Trends in DoD Contracting 18 February 2015 Presented to: NCMA CAPT Stephen Armstrong Statement B: Distribution authorized to U.S. government agencies only; Other requests must be referred to COMSPAWAR

More information

INTERMEDIATE QUALIFICATION

INTERMEDIATE QUALIFICATION PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE LIFECYCLE SERVICE TRANSITION CERTIFICATE SYLLABUS The Swirl logo is a Trade Mark of the Office of Government Commerce ITIL is a Registered

More information

A Primer on. Software Licensing. Charlene Gross Software Engineering Institute. Do You Own It or Not? Charlene Gross, April 19-23, 2010

A Primer on. Software Licensing. Charlene Gross Software Engineering Institute. Do You Own It or Not? Charlene Gross, April 19-23, 2010 - A Primer on Noncommercial Software Licensing Charlene Gross Software Engineering Institute Carnegie Mellon University Charlene Gross, April 19-23, 2010 Report Documentation Page Form Approved OMB No.

More information

DoD Architecture Framework Version 2.0 Draft

DoD Architecture Framework Version 2.0 Draft 1 wreath stars Text 2 3 4 5 6 7 8 9 10 DoD Architecture Framework Version 2.0 Draft 11 12 13 14 15 16 17 18 19 20 21 22 23 Volume 1: Introduction, Overview, and Concepts Management Volume 24 December 2008

More information

Program Lifecycle Methodology Version 1.7

Program Lifecycle Methodology Version 1.7 Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated

More information

Continual Process Improvement (CPI) In Public-Private Partnerships (PPP)

Continual Process Improvement (CPI) In Public-Private Partnerships (PPP) Continual Process Improvement (CPI) In Public-Private Partnerships (PPP) Expanding Scope of PPP December 4th, 2017 Ms. Misty Goss (Ogden Air Logistics Complex Mr. Mike Phillips (Software Engineering Institute)

More information

Powerful Mechanism for Deployment. November 2004 Copyright 2004 Raytheon Company. All rights reserved.

Powerful Mechanism for Deployment. November 2004 Copyright 2004 Raytheon Company. All rights reserved. Team-of of-four Powerful Mechanism for Deployment Author contact info Laurie Haack Senior Principal Software Engineer Engineering Process Group Network Centric Systems Raytheon Company Fullerton, CA lahaack@raytheon.com

More information

Systems Engineering Management Plan?

Systems Engineering Management Plan? Writing a Systems Engineering Plan, or a Systems Engineering Management Plan? Think About Models and Simulations Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering

More information

Configuration Management

Configuration Management Configuration Management 12 th Annual NDIA CMMI Conference November 2012 - Denver, CO Al Florence The MITRE Corporation This presenter s affiliation with the MITRE Corporation is provided for identification

More information

Document Control Information

Document Control Information Document Control Information Document Details Document Name Purpose of Document Document Version Number 5.3 Document Status Document Owner Prepared By The ITIL Intermediate Qualification Service Transition

More information

The Integrated Baseline Review (IBR)

The Integrated Baseline Review (IBR) Page 1 of 10 The Integrated Baseline (IBR) The IBR management review is concerned more with the technical planning aspects and understanding how a contractor manages a project than past reviews that focused

More information

Test and Evaluation for Agile Information Technologies. Steve Hutchison DISA T&E

Test and Evaluation for Agile Information Technologies. Steve Hutchison DISA T&E Test and Evaluation for Agile Information Technologies Steve Hutchison DISA T&E ag ile [aj-uh l, -ahyl] - adjective 1.quick and well-coordinated in movement Dictionary.com Based on the Random House Dictionary,

More information

Configuration Management

Configuration Management Configuration Management November 2010 DC SPIN Seminar Co Russ Roseman and Al Florence This presenter s affiliation with the MITRE Corporation is provided for identification purposes only and is not intended

More information

Report of the Reliability Improvement Working Group Table of Contents

Report of the Reliability Improvement Working Group Table of Contents Report of the Reliability Improvement Working Group 1942 poster commissioned by US Office for Emergency Management, Office of War Information Courtesy of the National Archives September 2008 Report of

More information

CGEIT Certification Job Practice

CGEIT Certification Job Practice CGEIT Certification Job Practice Job Practice A job practice serves as the basis for the exam and the experience requirements to earn the CGEIT certification. This job practice consists of task and knowledge

More information

Enhanced Systems Engineering - Starting Programs Right

Enhanced Systems Engineering - Starting Programs Right Enhanced Systems Engineering - Starting Programs Right NDIA 11 th Annual Systems Engineering Conference October 23, 2008 Ceasar D. Sharper Systems and Software Engineering/Enterprise Development Office

More information

An Enhanced Analysis of Alternatives (AoA)

An Enhanced Analysis of Alternatives (AoA) An Enhanced Analysis of Alternatives (AoA) A Mission-Oriented, Evaluation-Based Framework for Defense Test Evaluation NDIA March 2-5. 2009 Vince Roske Institute for Defense Analyses vroske@ida.org 703

More information

M3 Playbook Guidance. 1.1 Establish Initial Customer PMO and Processes. Human Resources (HR)/Staffing Plan

M3 Playbook Guidance. 1.1 Establish Initial Customer PMO and Processes. Human Resources (HR)/Staffing Plan M3 Playbook Guidance Phase 1: Readiness This guidance is intended for use by organizations to confirm and validate that their plans are comprehensive and have adequate level of detail for proper migration

More information

Systems Engineering: The Glue that Binds Disparate Acquisition Organizations

Systems Engineering: The Glue that Binds Disparate Acquisition Organizations Systems Engineering: The Glue that Binds Disparate Acquisition Organizations Thomas H. Holzer, D.Sc. 1 May 2008 SSTC 2008 Thomas.h.holzer@nga.mil 1 Topics The Situation The Ways Forward The Benefits 2

More information

The Federal Enterprise Architecture Security and Privacy Profile (FEA-SPP) Architecture and Infrastructure Committee Federal CIO Council

The Federal Enterprise Architecture Security and Privacy Profile (FEA-SPP) Architecture and Infrastructure Committee Federal CIO Council The Federal Enterprise Architecture Security and Privacy Profile (FEA-SPP) Architecture and Infrastructure Committee Federal CIO Council FEA-SPP Briefing Topics Defining the FEA-SPP Visualizing an Architecture

More information

3 PART THREE: WORK PLAN AND IV&V METHODOLOGY (SECTION 5.3.3)

3 PART THREE: WORK PLAN AND IV&V METHODOLOGY (SECTION 5.3.3) 3 PART THREE: WORK PLAN AND IV&V METHODOLOGY (SECTION 5.3.3) Emagine IT s approach to Independent Verification and Validation (IV&V) has been shaped over the years by hands-on experience and contributions

More information

ITIL: Planning, Protection & Optimization Course 02 Planning, Protection & Optimization

ITIL: Planning, Protection & Optimization Course 02 Planning, Protection & Optimization ITIL: Planning, Protection & Optimization Course 02 Planning, Protection & Optimization Course Slide 1 Planning, Protection & Optimization Topics Covered Learning Objectives Terms-to-Know Introduction

More information

Software Maintenance, Sustaining Engineering, and Operational Support

Software Maintenance, Sustaining Engineering, and Operational Support Software Maintenance, Sustaining Engineering, and Operational Support Estimating Software Maintenance Costs for U.S. Army Weapons Systems Office of the Deputy Assistant Secretary of the Army for Cost and

More information

Current State of Capability-based System of Systems Engineering in Korea Ministry of National Defense

Current State of Capability-based System of Systems Engineering in Korea Ministry of National Defense Current State of Capability-based System of Systems Engineering in Korea Ministry of National Defense Jae-Hong Ahn 1, Yeunseung Ryu 2 and Doo-Kwon Baik 3 1 Agency for Defense Development, Korea koreaseman@daum.net

More information

Program managers (PMs)

Program managers (PMs) BEST PRACTICES Integrating Systems Engineering with Earned Value Management Program managers (PMs) expect their supplier s earned value management system (EVMS) to accurately report the program s integrated

More information

Dr. Fatma Dandashi October, 2003

Dr. Fatma Dandashi October, 2003 Systems Technical Operational DoD Architecture Framework Overview Dr. Fatma Dandashi October, 2003 Outline Policy and Guidance on Architecture History of the Framework Framework Definitions and Purpose

More information

INTERMEDIATE QUALIFICATION

INTERMEDIATE QUALIFICATION PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE LIFECYCLE CONTINUAL SERVICE IMPROVEMENT CERTIFICATE SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a registered

More information

Developed by: Steven Jacobs, Eck Doerry

Developed by: Steven Jacobs, Eck Doerry Developed by: Steven Jacobs, Eck Doerry 1 Consequences of Bad Requirements Engineering http://www.knovelblogs.com/2012/08/30/the-importance-of-requirements-engineering/ 2 Building an efficient organization

More information

TECHNICAL REVIEWS AND AUDITS FOR SYSTEMS, EQUIPMENT AND COMPUTER SOFTWARE

TECHNICAL REVIEWS AND AUDITS FOR SYSTEMS, EQUIPMENT AND COMPUTER SOFTWARE BY ORDER OF THE COMMANDER SMC Standard SMC-S-21 15 September 2009 ------------------------ Supersedes: New issue Air Force Space Command SPACE AND MISSILE SYSTEMS CENTER STANDARD TECHNICAL REVIEWS AND

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 63-145 30 SEPTEMBER 2016 Acquisition MANUFACTURING AND QUALITY MANAGEMENT COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications

More information

Risk Management Beyond CMMI Level 5

Risk Management Beyond CMMI Level 5 Risk Management Beyond CMMI Level 5 CMMI Technology Conference & User Group 13-16 November 2006 Warren Scheinin & Rick Hefner, Ph.D. Northrop Grumman Corporation Background There are several straightforward

More information

DoD Architecture Framework

DoD Architecture Framework wreath stars Text DoD Architecture Framework Version 2.03 Volume 1: Overview and Concepts Manager s Guide NORMATIVE 07 December 2012 i ii This page left intentionally blank Executive Summary The Department

More information

Report of the Reliability Improvement Working Group (RIWG) Volume II - Appendices

Report of the Reliability Improvement Working Group (RIWG) Volume II - Appendices Report of the Reliability Improvement Working Group (RIWG) Volume II - Appendices Appendix 1 Formulate Programs with a RAM Growth Program II-1 1.1 Reliability Improvement Policy II-3 1.2 Sample Reliability

More information

2013 Rational Software Open Labs

2013 Rational Software Open Labs 2013 Rational Software Open Labs Target to better LEARNING (not substitution for full training course) Software Choose from one or more of twelve Self-Paced, Hands-On Labs: Rational System Architect for

More information

Continuous Diagnostic and Mitigation and Continuous Monitoring as a Service. CMaaS TASK AREAS

Continuous Diagnostic and Mitigation and Continuous Monitoring as a Service. CMaaS TASK AREAS Continuous Diagnostic and Mitigation and Continuous Monitoring as a Service CMaaS TASK AREAS CMaaS TASK AREAS The contractor shall provide functional, strategic, and managerial business consulting and

More information

Document Control Information

Document Control Information Document Control Information Document Details Document Name Purpose of Document Document Version Number 5.5 Document Status Document Owner Prepared By The ITIL Intermediate Qualification Continual Service

More information

Committee. Holly Coulter Dunlap, Chair Beth Wilson, Alternate Chair. October 2013

Committee. Holly Coulter Dunlap, Chair Beth Wilson, Alternate Chair. October 2013 NDIA Systems Security Engineering Committee Welcome and Update Holly Coulter Dunlap, Chair Beth Wilson, Alternate Chair October 2013 NDIA SE Conference October 2013 1 Systems Security Engineering Committee

More information

RISK MANAGEMENT GUIDE FOR DOD ACQUISITION

RISK MANAGEMENT GUIDE FOR DOD ACQUISITION RISK MANAGEMENT GUIDE FOR DOD ACQUISITION Sixth Edition (Version 1.0) August, 2006 Department of Defense Preface The Department of Defense (DoD) recognizes that risk management is critical to acquisition

More information

Objective Demonstration of Process Maturity Through Measures

Objective Demonstration of Process Maturity Through Measures Objective Demonstration of Process Maturity Through Measures 2000 PSM Users Group Conference Vail, Colorado 24-28 July 2000 Presented By: Perry R. DeWeese Lockheed Martin 7 July 2000 1 Agenda: Concept

More information

CENTRE (Common Enterprise Resource)

CENTRE (Common Enterprise Resource) CENTRE (Common Enterprise Resource) Systems and Software Engineering Platform designed for CMMI compliance Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations

More information

Appendix. Process Inputs and Outputs

Appendix. Process Inputs and Outputs 3601cA.fm Page 493 Wednesday, October 26, 2005 12:47 AM Appendix A Process and Throughout this book, PMP: Management Professional Study Guide, 3rd Edition, I ve discussed the inputs and outputs to the

More information

Using CMMI to Improve Earned Value Management

Using CMMI to Improve Earned Value Management Using CMMI to Improve Earned Value Management CMMI Technology Conference and User Group Denver, CO November 13, 2002 Paul Solomon PMP Software Engineering Institute and Northrop Grumman Integrated Systems

More information

UNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification Date: February 2005 APPROPRIATION/BUDGET ACTIVITY DEFENSE WIDE RDT&E BA 6

UNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification Date: February 2005 APPROPRIATION/BUDGET ACTIVITY DEFENSE WIDE RDT&E BA 6 Exhibit R-2, RDT&E Budget Item Justification Date: February 2005 APPROPRIATION/BUDGET ACTIVITY DEFENSE WIDE RDT&E BA 6 R-1 ITEM NOMENCLATURE Capital Asset Management Systems -Military Equipment Evaluation

More information

Document Control Information

Document Control Information Document Control Information Document Details Document Name Purpose of Document Document Version Number 5.5 Document Status Document Owner Prepared By The ITIL Intermediate Qualification Continual Service

More information

SCEA Conference Integrated Critical Scheduling (ICS)

SCEA Conference Integrated Critical Scheduling (ICS) 0 SCEA Conference Integrated Critical Scheduling (ICS) Jared Mathey Dustin Sexton Donna Pucciarello June 2010 1 Outline THE NEED - a changing Acquisition landscape METHODOLOGY - a phased approach for managing

More information

Aligning System Development and Testing for Successful IOT&E

Aligning System Development and Testing for Successful IOT&E Aligning System Development and Testing for Successful IOT&E NDIA Systems Engineering Conference October 2011 #12967 This presentation is the work of the author. The views, opinions, and findings should

More information

Using JCIDS DoDAF Architecture Primitives to Assemble a Repository for Enterprise-wide Analysis and Decision-Making

Using JCIDS DoDAF Architecture Primitives to Assemble a Repository for Enterprise-wide Analysis and Decision-Making 12TH ICCRTS Adapting C2 to the 21st Century Using JCIDS DoDAF Architecture Primitives to Assemble a Repository for Enterprise-wide Analysis and Decision-Making Topics: Track 1: C2 Concepts, Theory, and

More information

Enterprise Architecture as an Essential Tool Supporting Army Transformation. Fernando Mezquita

Enterprise Architecture as an Essential Tool Supporting Army Transformation. Fernando Mezquita Enterprise Architecture as an Essential Tool Supporting Army Transformation Fernando Mezquita There are two ways of spreading light: to be the candle or the mirror that reflects it. Edith Wharton, 1862-1937

More information

NASA Procedural Requirements

NASA Procedural Requirements NASA Procedural Requirements NPR 7150.2 Effective Date: September 27, 2004 Expiration Date: September 27, 2009 NASA Software Engineering Requirements Responsible Office: Office of the Chief Engineer 0

More information

TECHNICAL REVIEWS AND AUDITS

TECHNICAL REVIEWS AND AUDITS Chapter 11 Technical Reviews and Audits CHAPTER 11 TECHNICAL REVIEWS AND AUDITS 11.1 PROGRESS MEASUREMENT The Systems Engineer measures design progress and maturity by assessing its development at key

More information

PART THREE: Work Plan and IV&V Methodology (RFP 5.3.3)

PART THREE: Work Plan and IV&V Methodology (RFP 5.3.3) PART THREE: Work Plan and IV&V Methodology (RFP 5.3.3) 3.1 IV&V Methodology and Work Plan 3.1.1 NTT DATA IV&V Framework We believe that successful IV&V is more than just verification that the processes

More information

Proposed Approach to Heterogeneous CMMI. Appraisals. Joseph V. Vandeville. 14 November 2007

Proposed Approach to Heterogeneous CMMI. Appraisals. Joseph V. Vandeville. 14 November 2007 Proposed Approach to Heterogeneous CMMI Appraisals 14 November 2007 Joseph V. Vandeville Northrop Grumman Corporation Andy Felschow The Process Company, LLC Topics What is a heterogeneous appraisal What

More information

On Selling the Enterprise Architecture Concept to Business Executives

On Selling the Enterprise Architecture Concept to Business Executives On Selling the Enterprise Architecture Concept to Business Executives October 22, 2003 Ajit Kapoor Lockheed Martin Corporation Architecture Practitioners' Conference Enterprise Architecture: Making IT

More information

CENTRE (Common Enterprise Resource)

CENTRE (Common Enterprise Resource) CENTRE (Common Enterprise Resource) Systems and Software Engineering Platform designed for CMMI compliance Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations

More information

A Framework for Developing a Digital System Model Taxonomy

A Framework for Developing a Digital System Model Taxonomy A Framework for Developing a Digital System Model Taxonomy Ms. Philomena Phil Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering 18th Annual NDIA Systems Engineering

More information

Reliability and Maintainability (R&M) Engineering Update

Reliability and Maintainability (R&M) Engineering Update Reliability and Maintainability (R&M) Engineering Update Mr. Andrew Monje Office of the Deputy Assistant Secretary of Defense for Systems Engineering 15th Annual NDIA Systems Engineering Conference San

More information

Systems Engineering Processes Applied To Ground Vehicle Integration at US Army Tank Automotive Research, Development, and Engineering Center (TARDEC)

Systems Engineering Processes Applied To Ground Vehicle Integration at US Army Tank Automotive Research, Development, and Engineering Center (TARDEC) 2010 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM SYSTEMS ENGINEERING MINI-SYMPOSIUM AUGUST 17-19 DEARBORN, MICHIGAN Systems Engineering Processes Applied To Ground Vehicle Integration

More information