Biometric Enterprise Architecture
|
|
|
- Abel Hunter
- 10 years ago
- Views:
Transcription
1 Prepared by: Team Biometric Enterprise Architecture (Team BM-EA) In partial fulfillment Of Requirements for SYS/OR 798 Fall 2009 Date:
2 Revision History Date Purpose Revision Level Responsible Person October 11, 2009 Initial Draft 0.1 Luckey i
3 Table of Contents 1 Introduction Background Problem Statement and Project Purpose Customer Stakeholders Team Biometric Enterprise Architecture (Team BM-EA) Nat Hall Mike Luckey Jeremy Worley Technical Approach Problem Formulation and Analysis Preliminary Problem Statement Project Organization Requirements Definition Solution Definition Project Design and Development Expected Results... 7 ii
4 List of Figures No table of figures entries found. iii
5 List of Tables No table of figures entries found. iv
6 1 INTRODUCTION 1.1 BACKGROUND Biometrics is the science of establishing the identity of a person based on his/or her physical, chemical, or behavioral characteristics. It is a rapidly growing field with many applications that includes various and sundry applications including a means to restrict access to a computer, the use of Automated Teller Machines (ATMs), and passage through airport security checkpoints. Today many commercial and government identity management systems deploy biometric technologies to support their operations. Some use biometrics as support service in their enterprise environment and while others offer biometric services to companies and organizations that require biometric capabilities and cannot bear the biometric enterprise investment. Finally and predominately, the preponderance of biometric applications supports both the legal and security domains allow those stakeholders the ability to assure success within the given domain. The most common types of biometric applications include the capture, display, search and assessment of fingerprints, facial features, iris scans, and voice traits of individuals for comparison to reference population of scans. The challenge, across an enterprise is to ensure that all biometric applications can interact and be fused into mutually supporting identities across the entire domain and those identities are efficiently compared to ad-hoc, randomly collected data points consisting of a subset of the reference data. 1.2 PROBLEM STATEMENT AND PROJECT PURPOSE Current biometric systems are generally inflexible and are not optimized for use within an enterprise. Most biometric systems are monolithic, thick-client or standalone applications with very little ability to interface to enterprise management information systems (MISs). While many biometric applications do offer some interoperability and integration points with and for established MISs such as PeopleSoft, SAS, Oracle and the like for personnel and accountability functions, the ability of such enterprise systems to collaborate across a diverse set of biometric systems is limited as a result of the lack of standardization and enterprise architecture support amongst the various biometric systems. Likewise there is a distinct lack of robust architectural support within the security and legal domains when using biometrics in those business contexts evidenced by the significant investment in stovepipe biometric systems. Thus, the biometric market today is continuing a trend towards monopolistic stovepipe systems risking higher prices and less innovation. Small scale, open-source, initiatives however demonstrate the opportunity for improving biometric system collaboration and performance through higher quality and 1
7 modern architectural choices. The purpose of this project is to document and demonstrate the comparison and trade-off of current systems and within their current architecture to like systems supported by a more robust and modern architecture. 1.3 CUSTOMER Our customer is Noblis, Inc., a nonprofit science, technology and strategy organization that helps clients solve complex systems, process and infrastructure problems in ways that benefit the public. We have partnered with them through Mr. Nat Hall, who works at Noblis and has colleagues interested in engaging our team for architectural analysis of biometric systems. Some of the relevant areas of interest are to identify architecture for next-generation large-scale government biometric systems identifying effective performance, cost, and flexibility tradeoffs and develop a guidance document for system design, system procurement, and performance testing. Goals for next-generation systems include: Improved system performance such as maximizing match accuracies with set throughput and response time requirements. Search against very large image/identity repository(ies) in the millions Incentivize vendors to continually invest to improve match algorithm performance Incentivize anti-monopoly and open-source algorithms Support per search prioritization Support flexible system scaling for rapidly changing threat levels Identify financially effective tradeoffs among system hardware/software, maintenance, testing, and match review (may assume a fixed sample acquisition process) The resulting guidance document is to assume that precise weightings of goals will be application specific. Hypothetical examples may help illustrate how the guidance should be followed in practice. These goals are part of our project this semester; there is no guarantee that we will be able to answer each and every one. We will however, at a minimum, set the stage for answering these requirements and will provide answers at the end where we are able, as we go through the process of documenting processes technology and implementation of enterprise application of biometric capabilities. 1.4 STAKEHOLDERS Our stakeholders primarily consist of agencies that require biometric capabilities to support their internal business processes and need to expose portions of their business processes to their brother/sister organizations in resolving identity issues. 2
8 Many of these agencies collect and dismeinate biometric information internally but are reluctant to invest in additional, needed biometric-sourced infmation, primarily because these organization understand that similar (or the same) information is possessed, (but unabvailable) from the other/brother/sister organization. These agencies include: Department of Homeland Security (DHS) Federal Bureau of Investigation (FBI) Department of Justice (DOJ) State and Local Law Enforcement Agencies 1.5 TEAM BIOMETRIC ENTERPRISE ARCHITECTURE (TEAM BM-EA) NAT HALL MIKE LUCKEY Mike is enrolled in his last class in the George Mason University MSSE program. He specialized in the Computer Based Systems track, and has over 19 years of program management and systems engineering experience working for the Department of Defense. He has a BS in Business Finance from the University of Florida. As a DOD contractor he is the lead engineer and project manager working with the U. S. Army s Logistics Innovation Agency working to modernize Army Logistics business processes and technologies. A retired U. S. Marine Corps Officer Mike has deployed to Somalia and Okinawa Japan supporting USMC and DOD C4I activities in his role as a Data Communications Officer. Upon retiring, Mike has worked in various levels both with various DOD contractors and with the Defense Information Systems Agency (DISA) working a variety of systems engineering and project management areas. Mike s experiences include requirements planning and analysis, system design and architectures, workflow analysis, scheduling, developmental and operational testing, risk management, configuration management, quality assurance, operations and sustainment, process improvement, and the like. Mike s interest are primarily in engineering and implementation of large-scale and enterprise systems.d by the significant investment in stovepipe biometric systems JEREMY WORLEY 3
9 2 TECHNICAL APPROACH Team BM-EA will proceed through literature research, project organization, problem formulation, problem space analysis, problems space requirements definition, solution space definition, solutions space design and development including model design, development, execution and results analysis. The remaining parts of this section describe at a high level our plans for implementing this approach. 2.1 PROBLEM FORMULATION AND ANALYSIS Team BM-EA will use literature review to analyze key aspects of the problem statement; to uncover existing Biometric System Enterprise Architecture (EA) and how that is applied across the systems that employ it and assess the data processing and communications flow required, how the various data algorithms can be used to improve data flow, and ultimately develop a model that provides an analysis of best case response to chosen Biometric Assessment in our proposed EA. The following literature will be reviewed as a part of our Biometric Enterprise Architecture research efforts to include published papers, reports, trade journals, books, and other research materials. Research for this project falls mainly into three categories: Current Biometric System Architectures, Current Biometric Systems Implementation Biometric Architecture Modeling and Simulation Each is discussed briefly below: Current Biometric System Architectures Research in this category will include investigating what architecture is in place supporting the various biometric capabilities and includes a look at if various architectures are mutually supporting. Current Biometric Systems Implementation Research in this category will include investigating the carious systems implemented within the various architectures and will serve as a catalog for considering architectural trade-offs when assessing alternative architectures. Likewise this catalog is to be used as a basis for documenting the existing and contemplated architecture. Biometric Architecture Modeling and Simulation - The Biometric Enterprise Architecture project will research modeling and simulation methods and models mining for algorithms and data types that allow for efficient and where possible optimal collection and data exchange of biometric data and information. Where adequate models exist we will take advantage of them, where needed, we will create our own. 4
10 With these models, the team will investigate technical and economic performance of existing biometric architecture and determine improvements resulting from proposed architecture PRELIMINARY PROBLEM STATEMENT Biometric practitioners require acquisition of various biometric images from various biometric acquisition systems. These systems are acquired based on thier image acquisition method rather than the purpose or circumstances for which the images are acquired or needed. As a result vendors produce stovepipe systems that include solutions for requirements that do not exist from the perspective of IImage Acquisition. Biometric practitioners do not have a reliable source for Image Management capabilities beyond purchasing or acquiring image acquisition capabilities (hardware) that happens to have its own, (often proprietary) image management software. As a result Biometric practitioners who have a need to integrate or use multiple biometric capabilities (such as coupling fingerprint, facial and voice recognition into an identity) end up with duplicative but not inter operable image management software. They also end up with a significant interoperability dilemma when integrating operations with other agencies. 2.2 PROJECT ORGANIZATION This phase includes organizing the project into executable phases and partitioning and allocating work across available project resources. The result is a work breakdown structure (WBS) and associated schedule-to-completion defined within the context of the semester. 2.3 REQUIREMENTS DEFINITION This phase of the effort will include scoping of system objectives, characteristics and parameters in the form of requirements and derived requirements for the system. From the overarching set of system requirements, the subset to be designed and modeled will be determined. 2.4 SOLUTION DEFINITION Our solution is made up of four key components, all of which require significant investment in research, analysis and solution engineering to arrive at what we believe to be a salient point or set of points that represent our solution: 1. Collect requirements and model them in an as-is representation of the enterprise biometrics architecture under a stated set of assumptions and conditions. 5
11 2. Using the same set of assumptions and conditions we will propose an alternative to-be architecture 3. We will model the competing architecture s technical and economic/financial performance characteristics. 4. Finally, we will compare the results of the competing models PROJECT DESIGN AND DEVELOPMENT As suggested above we will model the as-is architecture and use that as a basis for developing and designing our technical and economic/financial performance models. After defining the requirements and selecting the scope and domain for the as-is architecture we will use SysML to develop a context model, the as-is reference architecture and the to-be architecture. Once complete we will design and develop technical and economic/financial models for use in the later comparison of the developed to-be model MODEL DESIGN AND DEVELOPMENT Our approach to model design and development is to use the combination of our customer/stakeholder needs (requirements) to understand the distinction between the as-is (the de-facto, ad hoc) architecture and a prospective to-be architecture. We will use Systems Engineering methods and tools to accomplish this by analyzing and documenting user needs, developing a context defining the boundary conditions for our architecture, and modeling both the as-is and to-be architecture using SysML to document the system s architecture currently and the systems architecture going forward. Finally using this architecture we will develop operationally relevant technical and financial models to assess the effectiveness of the to-be architecture as compared to the as-is architecture MODEL EXECUTION AND MODEL RESULTS Our technical models (the technical and the financial) will be used to compare the technical and financial performance of the current (as-is) and prospective (to-be) architecture and support formulating strategy in moving toward the to-be architecture. The goal of our models will be to support answering strategic question such as: Improved system performance such as maximizing match accuracies with set throughput and response time requirements. Search against very large image/identity repository(ies) in the millions Incentivize vendors to continually invest to improve match algorithm performance Incentivize anti-monopoly and open-source algorithms Support per search prioritization 6
12 Support flexible system scaling for rapidly changing threat levels Identify financially effective tradeoffs among system hardware/software, maintenance, testing, and match review (may assume a fixed sample acquisition process) 3 EXPECTED RESULTS The expected result of this system is proposed alternative architecture for Enterprise scale Biometric systems. Below are the products that will be expected at the end of this study. 1. A technical performance model will be developed to analyze the feasibility of the system as compared to existing implementations for similar capabilities. The artifacts captured in the architecture of the system will be used by our queuing model to simulate the operational concept of this architecture. The result of the model will be an analysis that shows the various performance characteristics for resolving selected, various business requirements. 2. SysML will be used to capture the architecture of the existing biometric architecture. A set of views or artifacts that are defined below will be developed to present the sensor architecture: - High-Level Operational Concept Description (OV-1): This view will capture the high level operational concept of this sensor system. Describe boundary conditions - Operational Node Connectivity Description (OV-2): This view will list all operational nodes/stakeholders of the system, and also the information needed to be exchanged among these nodes. In this architecture, all image acquisition nodes image management nodes and image exchange nodes will be captured along with all information exchanged among them. - Operational Information Exchange Matrix (OV-3): This view will summarize and expand the characteristics of the exchanged information captured in OV-2. The exchanged information s attributes such as information content, classification, periodicity, criticality, and timeliness will be included in this view. - Activity Model (OV-5): This view will depict a high-level operational activity process of the system. It will display the high-level activities of image acquisition, management and exchanges. - Event/Trace Description (OV-6c): This view will capture different scenarios/use cases of the operational concept. This view will depict the time-based information flow processes of the activities captured in OV-5. - Systems Interface Description (SV-1): This view will capture the internal and external interfaces of this system. It will capture system interfaces and boundaries. 7
13 - Systems Communication Description (SV-2): This view will capture the communication pathway of the system. All communication nodes that help transmit data among the systems will be captured. - Systems Functionality Description (SV-4): This view will capture the high-level functionalities of the system. It will capture image acquisition, management and exchange functionalities. - Operational Activity to System Function Trace ability Matrix (SV-5): This view will map the operational activities captured in OV-5 with functions captured in SV-4 to show how the operational requirements/capabilities can be supported by system s capabilities. - Systems Data Exchange Matrix (SV-6): This view will capture more details of the data exchanged among systems. Exchanged data s attributes such as data content, format, criticality, periodicity, timeliness, classification, and communication entry point will be captured in this matrix. - Systems Performance Parameters Matrix (SV-7): This view will capture the performance parameters of the system. All sensors performance parameters will be captured along with those of C2 systems. 8
Biometrics Enterprise Architecture Project Management Plan (BMEA PMP)
Biometrics Enterprise Architecture Project Management Plan (BMEA PMP) Version 1.0 Prepared by: Date: November 24, 2008 Revision History Purpose Revision Date Level 11/17/2009 First Draft 1.0 Responsible
ARCHITECTURE DESIGN OF SECURITY SYSTEM
Trakia Journal of Sciences, Vol. 8, No. 3, pp 77-82, 2010 Copyright 2009 Trakia University Available online at: http://www.uni-sz.bg ISSN 1313-7050 (print) ISSN 1313-3551 (online) Review ARCHITECTURE DESIGN
Biometrics. 2020 Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group
2020 Workshop The evolution of largescale biometric architecture Facilitators Mark Crego, Accenture Mike Matyas, Mount Airey Group Approach and Agenda Workshop Goal: An open discussion on the future of
Optical Memory Cards in Federal Government
NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation
INTELLIGENCE AND HOMELAND DEFENSE INSIGHT
I N D U S T R Y INTELLIGENCE AND HOMELAND DEFENSE INSIGHT INTELLIGENCE AND HOMELAND DEFENSE CHALLENGES The Intelligence Community (IC) needs the right information, in real time, to make critical decisions.
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
Department of Administration Portfolio Management System 1.3 June 30, 2010
E 06/ 30/ 2010 EX AM PL 1. 3 06/ 28/ 2010 06/ 24/ 2010 06/ 23/ 2010 06/ 15/ 2010 06/ 18/ 2010 Portfolio System 1.3 June 30, 2010 Contents Section 1. Project Overview... 1 1.1 Project Description... 1 1.2
IDENTITY SOLUTIONS FOR A BETTER WORLD
IDENTITY SOLUTIONS FOR A BETTER WORLD OUR COMPANY #1 GLOBAL PROVIDER OF BIOMETRICS-BASED IDENTITY SOLUTIONS Founded in 2002, Fulcrum Biometrics is a leading provider, distributor, and integrator of biometric
MegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
Development, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Business Intelligence Project Management 101
Business Intelligence Project Management 101 Managing BI Projects within the PMI Process Groups Too many times, Business Intelligence (BI) and Data Warehousing project managers are ill-equipped to handle
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0
NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5
Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
DoD Business Process Reengineering CONSTRUCTION IN PROGRESS REQUIREMENTS DOCUMENT
DoD Business Process Reengineering CONSTRUCTION IN PROGRESS REQUIREMENTS DOCUMENT Office of the Deputy Undersecretary of Defense (Installations & Environment) Business Enterprise Integration Directorate
Best Practices Statement Project Management. Best Practices for Managing State Information Technology Projects
State of Arkansas Office of Information Technology 124 W. Capitol Ave. Suite 990 Little Rock, AR 72201 501.682.4300 Voice 501.682.4020 Fax http://www.cio.arkansas.gov/techarch Best Practices Statement
Information Security Policy
Essay 7 Information Security Policy Ingrid M. Olson and Marshall D. Abrams This essay discusses information security policy, focusing on information control and dissemination, for automated information
The Leading Provider of Identity Solutions and Services in the U.S.
THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that
System/Data Requirements Definition Analysis and Design
EXECUTIVE SUMMARY This document provides an overview of the Systems Development Life-Cycle (SDLC) process of the U.S. House of Representatives. The SDLC process consists of seven tailored phases that help
STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY U.S. HOUSE OF REPRESENTATIVES
HKITPC Competency Definition
HKITPC Competency Definition for the Certification copyright 2011 HKITPC HKITPC Competency Definition Document Number: HKCS-CD-L1L2 Version: 1.0 Date: June 2011 Prepared by Hong Kong IT Professional Certification
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
Achieve Economic Synergies by Managing Your Human Capital In The Cloud
Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid
ImageWare Systems, Inc.
ImageWare Systems, Inc. Delivering next-generation biometrics as an interactive and scalable cloud-based service SUMMARY Catalyst ImageWare Systems, Inc. (IWS) is a developer of leading-edge, identity-based,
Fieldprint Implementation Plan
Fieldprint Implementation Plan The implementation of the proposed management and technical plan, outline in Section 3 of this proposal will consist of the following steps: Contract Begins (0 days) In this
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I s Integration Dr. Timothy D. Kehoe, Irene Chang, Dave Czulada, Howard Kong, Dr. Dino Konstantopoulos
Architecture Modeling Approach for Net-Centric Enterprise Services (C4ISR/C2 Architecture Track)
A Paper submitted to the 10th International Command and Control Research and Technology Symposium "The Future of C2" Architecture Modeling Approach for Net-Centric Enterprise s (C4ISR/C2 Architecture Track)
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research
Montana Department of Transportation Information Services Division. System Development Life Cycle (SDLC) Guide
Montana Department of Transportation Information Services Division System Development Life Cycle (SDLC) Guide Version 2 August 2, 2007 \mdt_sdlc_process\mdt_sdlc_v02.doc Table of Contents 1 Business Analysis...3
Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology
MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric
Jump Starting Data Governance: a Program Manager's Story
Jump Starting Data Governance: a Program Manager's Story ABSTRACT One of the many challenges facing a federal organization endeavoring to implement an enterprise Data Governance framework involves the
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Project Management Plan Template
Abstract: This is the project management plan document for . This is a controlled document and should be maintained in a configuration environment. Project Management Plan Template Contents REVISION
Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services
4937 Fargo Street North Charleston SC 29418 Phone 843.266.2330 Fax 843.266.2333 w w w. c o d e l y n x. c o m Request for Information: Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring,
PROJECT SCOPE STATEMENT
PROJECT SCOPE STATEMENT Note: Any work not explicitly included in the Project Scope Statement is implicitly excluded from the project. Project Name: Prepared by: BI - IT Governance Amy Winkel Date: 12/20/2010
The State of DoD Biometrics
The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E [email protected] 1 Agenda What We ve Done Biometrics
Software Systems Consultants Inc. IT Solutions & Staffing Services
Software Systems Consultants Inc. IT Solutions & Staffing Services 137 Carter Court SW Suite 107 Vienna VA, 22180 703.597.4847 Fax 1.877.256.9979 WWW.SSCI-IT.COM [email protected] Since it s inception,
Team A SaaS Strategy
Team A SaaS Strategy What is a strategy? Strategy is the direction and scope of an organization over the long-term term: : which achieves advantages for the organization through its configuration of resources
Space and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Business and Force Support Portfolio Industry Opportunities SSC Atlantic Small Business and Industry Outreach Initiative Gulf Coast Government Contractor
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
ACQUISITION OF SOFTWARE AND SERVICES TO SUPPORT THE CORPORATE HUMAN RESOURCES INFORMATION SYSTEM
ACQUISITION OF SOFTWARE AND SERVICES TO SUPPORT THE CORPORATE HUMAN RESOURCES INFORMATION SYSTEM Audit Report No. 00-011 March 30, 2000 OFFICE OF AUDITS OFFICE OF INSPECTOR GENERAL Federal Deposit Insurance
Before getting started, we need to make sure we. Business Intelligence Project Management 101: Managing BI Projects Within the PMI Process Group
PMI Virtual Library 2010 Carole Wittemann Business Intelligence Project Management 101: Managing BI Projects Within the PMI Process Group By Carole Wittemann, PMP Abstract Too many times, business intelligence
Manag. Roles. Novemb. ber 20122
Information Technology Manag gement Framework Roles and Respo onsibilities Version 1.2 Novemb ber 20122 ITM Roles and Version History Version ed By Revision Date Approved By Approval Date Description of
Schedule 871 GSA Professional Engineering Services (PES)
Product and Process Development PPD Consultants GENERAL SERVICES ADMINISTRATION Federal Supply Service AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICE LIST On-line access to contract ordering information, terms
Project Management Plan for
Project Management Plan for [Project ID] Prepared by: Date: [Name], Project Manager Approved by: Date: [Name], Project Sponsor Approved by: Date: [Name], Executive Manager Table of Contents Project Summary...
How To Develop Software
Agile Systems Engineering Approach to Software Project Development 1 Chris Ritter, Daniel Hettema, and Steven H. Dam, Ph.D., ESEP, SPEC Innovations, 571-485-7807 [email protected] October
U.S. Dept. of Defense Systems Engineering & Implications for SE Implementation in Other Domains
U.S. Dept. of Defense Systems Engineering & Implications for SE Implementation in Other Domains Mary J. Simpson System Concepts 6400 32 nd Northwest, #9 Seattle, WA 98107 USA Joseph J. Simpson System Concepts
Service Oriented Architectures Using DoDAF1
1 Service Oriented Architectures Using DoDAF1 Huei-Wan Ang, Fatma Dandashi, Michael McFarren The Mitre Corporation The MITRE Corp. 7515 Colshire Dr. McLean, VA 22102 hwang(at)mitre.org, dandashi(at)mitre.org,
ENTERPRISE ARCHITECTUE OFFICE
ENTERPRISE ARCHITECTUE OFFICE Date: 12/8/2010 Enterprise Architecture Guiding Principles 1 Global Architecture Principles 1.1 GA1: Statewide Focus 1.1.1 Principle Architecture decisions will be made based
An Architectural Approach for Command, Coordination, and Communications Capabilities Assessment
An Architectural Approach for Command, Coordination, and Communications Capabilities Assessment Kristin Lee Sheila Cane Salwa Abdul-Rauf Carlos E. Martinez The MITRE Corporation McLean, Virginia March
SUBJECT: Army Information Technology Service Management (ITSM) Policy
DEPARTMENT OF THE ARMY OFFICE OF THE SECRETARY OF THE ARMY 107 ARMY PENTAGON WASHINGTON DC 20310-0107 Office, Chief Information Officer/G-6 SAIS-PR MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Information
The Next Generation Air Transportation System Information Sharing Environment (NISE)
The Next Generation Air Transportation System Information Sharing Environment (NISE) Semantic Technical Symposium Series March 21, 2012 Charleston, SC 1 NextGen Air Transportation System As traffic in
Description of Program Management Processes (Initiating, Planning) 2011 PROGstudy.com. All rights reserved
Description of Program Management Processes (Initiating, Planning) Topics Covered Program Management Process Groups salient features Description of all processes in Initiating Process Group: Initiate Program
Trends in Finger Vein Authentication and Deployment in Europe
Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:
SOA: The missing link between Enterprise Architecture and Solution Architecture
SOA: The missing link between Enterprise Architecture and Solution Architecture Jaidip Banerjee and Sohel Aziz Enterprise Architecture (EA) is increasingly being acknowledged as the way to maximize existing
PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME >
PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > Date of Issue: < date > Document Revision #: < version # > Project Manager: < name > Project Management Plan < Insert Project Name > Revision History Name
GENERAL SERVICES ADMINISTRATION Federal Supply Schedule Authorized Federal Supply Schedule
GENERAL SERVICES ADMINISTRATION Federal Supply Schedule Authorized Federal Supply Schedule On line access to contract ordering information, terms and conditions, up-to-date pricing, and the option to create
CASE MATTER MANAGEMENT TRACKING SYSTEM
for the CASE MATTER MANAGEMENT TRACKING SYSTEM September 25, 2009 Contact Point Mr. Donald A. Pedersen Commandant (CG-0948) (202) 372-3818 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
VDI 2206 Prof. Dr. Magdy M. Abdelhameed
Course Code: MDP 454, Course Name:, Second Semester 2014 VDI 2206 Mechatronics System Design The mechatronic design methodology is based on a concurrent (instead of sequential) approach to discipline design,
Project Type Guide. Project Planning and Management (PPM) V2.0. Custom Development Version 1.1 January 2014. PPM Project Type Custom Development
Project Planning and Management (PPM) V2.0 Project Type Guide Custom Development Version 1.1 January 2014 Last Revision: 1/22/2014 Page 1 Project Type Guide Summary: Custom Development Custom software
How To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
Chap 1. Introduction to Software Architecture
Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)
Student Background Personal Background & Learning Objectives
Systems Engineering Program (SYSE) Integrated Workshop Portfolio Student Background Personal Background & Learning Objectives Version 1.0 Tam Nguyen 1 The following section describes the student s personal
Position Classification Flysheet for Logistics Management Series, GS-0346
Position Classification Flysheet for Logistics Management Series, GS-0346 Table of Contents SERIES DEFINITION... 2 SERIES COVERAGE... 2 EXCLUSIONS... 4 DISTINGUISHING BETWEEN LOGISTICS MANAGEMENT AND OTHER
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
Biometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
CA Technologies Solutions for Criminal Justice Information Security Compliance
WHITE PAPER OCTOBER 2014 CA Technologies Solutions for Criminal Justice Information Security Compliance William Harrod Advisor, Public Sector Cyber-Security Strategy 2 WHITE PAPER: SOLUTIONS FOR CRIMINAL
Project Proposal: SAP Big Data Analytics on Mobile Usage Inferring age and gender of a person through his/her phone habits
George Mason University SYST 699: Masters Capstone Project Spring 2014 Project Proposal: SAP Big Data Analytics on Mobile Usage Inferring age and gender of a person through his/her phone habits February
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision
Project Management Guidelines
Project Management Guidelines 1. INTRODUCTION. This Appendix (Project Management Guidelines) sets forth the detailed Project Management Guidelines. 2. PROJECT MANAGEMENT PLAN POLICY AND GUIDELINES OVERVIEW.
Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability
Defense Information Systems Agency Identity and Access Management (IdAM): Consistent Access to Capability 17 August 2011 Disclaimer The information provided in this briefing is for general information
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8115.01 October 10, 2005 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management References: (a) Subtitle III of title 40, United States Code (formerly
Developing SOA solutions using IBM SOA Foundation
Developing SOA solutions using IBM SOA Foundation Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this
STSG Methodologies and Support Structure
STSG Methodologies and Support Structure STSG Application Life Cycle Management STSG utilizes comprehensive lifecycle tools that are fully integrated and provide capabilities for most of the roles in its
SAIC Corporate and Small Business Introduction
SAIC Corporate and Small Business Introduction April 2016 Michael A. Townsend, Sr. Director, SBLO SAIC Small Business Development and Utilization Office SAIC. All rights reserved. SAIC Overview Leading
WIDE AREA WORKFLOW (WAWF) Electronic Invoicing
NAVFAC PACIFIC WIDE AREA WORKFLOW (WAWF) Electronic Invoicing 2012 NAVFAC Pacific Industry Forum Sherry Diones e-business Administrator i Acquisition, NAVFAC Pacific 26 March 2012 Background Problem: Acceptance
Human Resources Management. Portfolio Management Concept of Operations
Human Resources Management Portfolio Management Concept of Operations September 30, 2012 Table of Contents 1.0 Overview... 2 1.1 Background... 2 1.2 Purpose... 2 1.3 Organization of This Document... 2
INFORMATION TECHNOLOGY PROJECT MANAGER
JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION INFMATION TECHNOLOGY PROJECT MANAGER Employees in this job function as information technology professionals and are responsible for a
RUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch
RUP Design RUP Artifacts and Deliverables RUP Purpose of Analysis & Design To transform the requirements into a design of the system to-be. To evolve a robust architecture for the system. To adapt the
COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INFORMATION TECHNOLOGY (C4&IT) INFRASTRUCTURE MANAGEMENT POLICY
Commandant United States Coast Guard 2100 Second Street, S.W. Washington, DC 20593-0001 Staff Symbol: CG-6 Phone: (202) 267-2767 Fax: (202) 267-2598 COMDTINST 5230.70 FEB 11 2005 COMMANDANT INSTRUCTION
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
The Systems Security Engineering Capability Maturity Model (SSE-CMM)
The Systems Security Engineering Capability Maturity Model (SSE-CMM) Karen Ferraiolo ISSEA Director of Technical Development [email protected] 410-309-1780 Topics Why define security engineering
2) trusted network, resilient against large scale Denial of Service attacks
Sam Crooks Network Design Engineer My background is that I have worked in the gaming (as in casinos, gambling), credit card processing industries, consumer credit and related
DLA Corporate Intern Program
DLA Corporate Intern Program The Program is a 2-year corporate training program designed to train entry-level personnel for subsequent advancement to the journey-level in professional, administrative,
ITS Projects Systems Engineering Process Compliance Checklist
ITS Projects Systems Engineering Process Compliance Checklist FHWA Final Rule (23 CFR 940) This checklist is to be completed by the MDOT or LPA Project Management Staff. Please refer to the accompanying
