JTIMS Working Group 27 Aug
|
|
|
- Kenneth Johns
- 9 years ago
- Views:
Transcription
1 JTIMS Working Group 27 Aug LTC Brian Hittner Mr. Gregg Martin
2 Agenda JTIMS Program Management JTIMS Policy and User Requirements CJCSM E Status JTIMS Force Requests Using JTIMS Lite STRATLIFT Module Developing a CJCSG for JTIMS JTIMS Requirements Management Technical Requirements (Includes IA and System Patches) Operational Requirements 2
3 JTIMS Program Management Joint Training System JTIMS JS J7 Deputy Director Program Mgmt. Activity Operational & Policy Pentagon JS J7 Deputy Director Joint Training Financial & Technical Suffolk VA LTC Brian Hittner Operational Lead & Requirements Manager Coordination Mr. Gregg Martin Program Manager & Technical Lead JTIMS User Group JTIMS Contract Support Requirements Management Configuration Management 3
4 JTIMS Lifecycle Status Affected by DoD IT Mandates (DCCI, JIE) JTIMS reached FOC with JTIMS Lite Deployment JTIMS on sustainment budget (by direction) Bug fixes Information Assurance Updates Critical enhancements Requirement Management and Configuration Management Processes JTIMS release every 6-9 months JTIMS being incorporated into the Joint Training Enterprise Environment (JTEA) What is JTEA.J7 response to JIE, which is DoD response to Federal DCCI? DoD Joint Information Environment (JIE) 4
5 CJCSM E Status 5 Eliminates sections that detailed how to use JTIMS Enclosure D Appendix D on JTIMS Force Requests Enclosure F Appendix A on JTIMS Examples States that Joint Staff J-7 will post force provider force sourcing and exercise participation business rules on the JTIMS Information Center to provide guidance and business rules for requesting, sourcing, and tracking exercise force or non-dod USG exercise participants in JTIMS Currently defines a force request as a request from a CCMD for units or capabilities to address exercise requirements that cannot be sourced by the requesting HQ. Intent is to expand this language to include Service requests to support Service exercise and events Could also allow requests for Coalition support which would be routed to appropriate CCMD
6 JTIMS Force Requests Handling Force Requests Requests from CCMDs for Service forces: Processed through JS J35 Requests from Services for Service forces: Processed by appropriate Service (Requires policy change) Requests for non-dod Federal Government support: Processed through JS J7 Joint Training Expand to allow Services to request Fed Gov support for Service exercises (Requires policy change) Requests for CCMD forces: Processed through appropriate CCMD Expand to allow Services to request CCMD forces for Service exercises (Requires policy change) Requests for DoD Agency Assets Processed through appropriate DoD Agency Requests for Coalition Forces Processed through appropriate CCMD Expand to allow Services to request Coalition forces for Service exercises (Requires policy change) 6
7 Using JTIMS Lite 7 Intent of JTIMS Lite is to allow units to have a local server for building MSELs at MSEL conferences and for driving MSEL implementation during exercise execution Local servers are more responsive (faster) than remote servers Local servers can focus a single exercise at a time Local servers can have tech support available 24/7 during critical times Steps for using JTIMS Lite Before MSEL conference: build training objectives and attach user accounts in JTIMS Enterprise At MSEL conference: build MSELs in JTIMS Lite Before exercise execution: build CMP in JTIMS Enterprise During exercise: enter TPOs and TPEs in JTIMS Lite After exercise: assess TPAs in JTIMS Enterprise
8 STRATLIFT Module 8 Very limited utilization of STRATLIFT module to date USTRANSCOM is requesting increased tracking of STRATLIFT requirements and funding
9 Developing a CJCSG for JTIMS 9 CJCSM E removed sections that detail how to use JTIMS Sections were too detailed for a CJCSM Sections were very difficult to keep current because updating a CJCSM is time consuming Current JTIMS Users Guide was written by the JTIMS Development Team Focuses on functions of individual buttons and fields Does not explain the intent of JTIMS features or how they relate to the JTS Will need JTIMS User Group assistance in building a useful JTIMS User s Guide CJCSG When could we have an initial draft?
10 Requirements & Configuration Management 10 JTIMS User Requests Code Fix & Usability Issues Functional Enhancements Requirements and Program Managers (Vetting) Contact Support / Developers (Technical Evaluation/Cost Estimate) JTIMS Internal Process (4-6 months) Requirements and Configuration Manager (Prioritization) JTEA Configuration Management Comprehensive Verification of Requirements to Technical Implementation Configuration Control Board for Approval (1) Approval to expend resources/start development (2) Approval to change production system JS J7 Joint Training (1 month)
11 JTIMS User Request Process JTIMS User Requests will now be requested and processed in coordination with the annual POM cycle JSAP will be issued to the JTIMS User Community in late September requesting prioritized user requests by the end of October Validating and prioritizing user request submissions will be led by Joint Staff JTIMS Requirements Manager (LTC Brian Hittner) through the JTIMS User Group JTIMS Requirements Manager and JTIMS Program Manager (Mr Gregg Martin) will work with the JTIMS development team on cost estimates for the prioritized list If required, additional funds will be sought through CE2T2 POM process System outages, bugs, and other issues requiring immediate action should always be reported to the JTIMS help desk immediately 11
12 Back up 12
13 Other Discussion Topics JTIMS Enterprise Lite functional use, business model, lessons learned 2. Changing the coding of JTIMS export file 3. JTIMS Community of Interest Intelink Site 4. JTIMS Training System is there a need? 5. JTIMS Lite links are available within a document in the Information Center 6. JTIMS NIPR / JTIMS NIPR Lite: Considering Readiness is only reported through DRRS SIPR, how does this affect the use of JTIMS NIPR. - the NIPR/SIPR Enterprise Baseline are the same even the METL/Assessment functionality is not required
14 Joint Training Enterprise Architecture (JTEA) JTEA Operationally JTEA is an architectural framework which enables the delivery of operationally relevant, realistic, flexible and innovative Joint training capabilities to Combatant Commands and Services, where and when it is needed JTEA leverages the power of Information technology and an enterprise approach to meet the current and future demands of the warfighter One Architecture
15 Joint Training Enterprise Architecture Framework JTEA Technically Consolidate Support Infrastructure
Joint Training Information Management System (JTIMS) User Advisory Group (UAG) Meeting
Joint Training Information Management System (JTIMS) User Advisory Group (UAG) Meeting LTC Brian Hittner Joint Staff J7/JETD JTIMS Program Manager 19 September 2012 JTIMS UAG Agenda 1300 1320 Welcome Program
Joint Training Enterprise Architecture
Joint Training Enterprise Architecture WJTSC M&S WG 19 September 2012 Mandate for Change Reduce JLVC Operating & Sustainment Costs Keep pace with the operating environment Joint Force 2020 CE2T2 Program
NOV. 2 2 2q11. DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTOr D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTOr D.C. 20301-6000 CHIEF INFORMATION OFFICER NOV 2 2 2q11 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF
UNCLASSIFIED Joint M&S Strategy WJTSC M&S Working Group September, 2012 COL Mark Edgren Technical Solutions Officer
Joint Staff J7 Joint M&S Strategy WJTSC M&S Working Group September, 2012 COL Mark Edgren Technical Solutions Officer Mandate for Change Why Change? Operating & Sustainment Costs Joint Force 2020 Keep
Space Ground Services in the Joint Information Environment (JIE)
Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation Space Ground Services in
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1400.25, Volume 1100 January 3, 2014 USD(P&R) SUBJECT: DoD Civilian Personnel Management System: Civilian Human Resources Management Information Technology Portfolio
Joint Information Environment Single Security Architecture (JIE SSA)
Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz DISA JIE Special Assistant to the Mission Assurance Executive /JIE SSA Integrated Design Team Lead 12 May 2014 Problem
DECC Montgomery. Mr. Chris Kemp Director May 2009
DECC Montgomery Mr. Chris Kemp Director May 2009 MISSION Provide information technology for the warfighter when, where, and how it is required and without interruption. VISION Achieve and sustain the most
How To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
1. Has your command deployed an Enterprise Content Management (ECM) application? Yes, but we do not have TRIM deployed in ECM mode.
ECM Questions USPACOM 1. Has your command deployed an Enterprise Content Management (ECM) application? Yes, but we do not have TRIM deployed in ECM mode. a. If Yes, please answer the questions below: 1)
ITIL: Service Operation
ITIL: Service Operation Course Course Chapter 01 - Course Lesson: Course Organization Welcome to the Course! Mentoring Community s Why Are You Here? Using Bloom s Taxonomy What do you Expect? Housekeeping
What s What Ahead For Architectures in the DoD? Mr. Dav Da e v DeVr DeV ies Mr. Martin Westphal
What s Ahead For Architectures in the DoD? Mr Dave DeVries Mr. Dave DeVries Mr. Martin Westphal What Has Happened Organization changes and declining budgets Progress made in Electronic Health Record Data
A Comprehensive Cyber Compliance Model for Tactical Systems
A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
Advanced Systems & Development
Advanced Systems & Development Transitioning to an Enterprise Ground System Lt Col Matt Kimsal SMC/ADY Envisioning and Shaping the Future of Space BLUF SMC/AD is generating a plan for the transformation
Individual/Staff Training
Individual/Staff Training 1 Purpose and Agenda Purpose: Gain the Joint Training Enterprise concurrence of the requirement for Functional area proponents for individual/staff training requirements. Agenda:
"Service Lifecycle Management strategies for CIOs"
"Service Lifecycle strategies for CIOs" Ralf Hart, Sales Manager CEE Europe FrontRange Solutions 10th December 2008 Agenda FrontRange Solutions The challenges the IT community faces What is the solution?
Operationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
ort Office of the Inspector General Department of Defense YEAR 2000 COMPLIANCE OF THE STANDARD ARMY MAINTENANCE SYSTEM-REHOST Report Number 99-165
it ort YEAR 2000 COMPLIANCE OF THE STANDARD ARMY MAINTENANCE SYSTEM-REHOST Report Number 99-165 May 24, 1999 Office of the Inspector General Department of Defense Additional Copies To obtain additional
Defining a Secure Mobile Framework Architecture at DHA
Ms. Janine Oakley, Transition Manager Innovation and Advanced Technology Development Division 2015 Defense Health Information Technology Symposium Defining a Secure Mobile Framework Architecture at DHA
Course: 8911B: Installation and Deployment in Microsoft Dynamics CRM 4.0
Course: 8911B: Installation and Deployment in Microsoft Dynamics CRM 4.0 Description: This two-day instructor-led course provides students with the tools to install and configure Microsoft The course focuses
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8440.01 December 24, 2015 DoD CIO SUBJECT: DoD Information Technology (IT) Service Management (ITSM) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority
Information Assurance Workforce (IAWF) Contracting Officer Representative (COR) & Project Manager (PM) Workshop
Information Assurance Workforce (IAWF) Contracting Officer Representative (COR) & Project Manager (PM) Workshop Shannon Lawson Command IAM SSC Pacific Distribution Statement A. Approved for Public Release;
ReMilNet Service Experience Overview
ReMilNet Service Experience Overview ReMilNet s knowledge across all functional service areas enables us to provide qualified personnel with knowledge across the spectrum of support services. This well
Resources Management. Pascal Nuyttens Consultant. Stephan Pauwels Technology Specialist
Pascal Nuyttens Consultant Stephan Pauwels Technology Specialist What is Required Today? Ensure Security and Compliance Enforce business rules and processes by policy Ensure systems are secure and locked
AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration
Headquarters Air Combat Command AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration This Briefing is: UNCLASSIFIED Mr. John Vona, GS-15 AFC2IC/C2P Purpose Discuss
DISA and the Evolving DoD Enterprise
1 DISA and the Evolving DoD Enterprise 11 June 2014 Major General Alan R. Lynn Vice Director, Defense Information Systems Agency 20th Century Circuit & Dial tone Delivery UNCLASSIFIED DISA is Changing
GSA Services Catalog
INCLUDES CHANGES THROUGH MODIFICATION P00007 immixtechnology, Inc. N00104-08-A-ZF31 GS-35-F-0265X Attachment D GSA Services Catalog Training Services... 2 Introductory Training - WebEx... 4 Level 1 Help
PEO IWS Enterprise Product Lifecycle Management Integrated Data Environment (eplm IDE) Jolene Marshall Thomas Murphy
2011 Integrated Warfare Systems Conference PEO IWS Enterprise Product Lifecycle Management Integrated Data Environment (eplm IDE) Jolene Marshall Thomas Murphy eplm IDE Initiation Malcolm Baldrige Source:
Novo Service Desk Software
Product Data Sheet The Novo Service Desk has helped streamline processes, reduce costs, provide better metrics, and run a more efficient help desk Lender Processing Services Novo Service Desk Software
Iowa State Government Reorganization Commission
Iowa State Government Reorganization Commission Colin Nurse. Chief Technology Officer, Microsoft State & Local Government Microsoft s Commitment to Iowa Communities Microsoft s Partners Microsoft works
Table of Contents. Introduction. Audience. At Course Completion. Prerequisites. Microsoft Certified Professional Exams
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This two-day instructor-led course provides
Cyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
Delivering Cost Effective IT Services
M2 Technology Delivering Cost Effective IT Services Defense agencies have been directed to move towards cloud and shared service models by the Federal Data Center Consolidation Initiative (FDCCI), the
SUBJECT: Army Information Technology Service Management (ITSM) Policy
DEPARTMENT OF THE ARMY OFFICE OF THE SECRETARY OF THE ARMY 107 ARMY PENTAGON WASHINGTON DC 20310-0107 Office, Chief Information Officer/G-6 SAIS-PR MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Information
DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
Cyber Superiority. Weapon System Normalization Update. Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority. AFCEA Luncheon Jan 2015
Cyber Superiority Weapon System Normalization Update AFCEA Luncheon Jan 2015 Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority Overview A5/8 Organization Where We Were/Are Way Forward Challenges
Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
An Unreliable Chart of Accounts Affected Auditability of Defense Enterprise Accounting and Management System Financial Data
Report No. DODIG-2012-140 September 28, 2012 An Unreliable Chart of Accounts Affected Auditability of Defense Enterprise Accounting and Management System Financial Data Additional Copies To obtain additional
Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing. 1 P a g e. www.analytixds.com
Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing 1 P a g e Table of Contents What is the key to agility in Data Warehousing?... 3 The need to address requirements completely....
APAN Brief. Governance
APAN Brief Governance Table of Contents Roles and Relationships Significant Events Program Management Governance Overview Responsibilities Points of Contact Acronyms 2 Roles and Relationships OVERSIGHT
2014 Defense Health Information Technology Symposium Service Desk Strategy for the Defense Health Agency
Mr. Wayne Speaks - Acting Branch Chief Mr. Bill Novak - Acting Branch Chief of Operations DHA Infrastructure and Operations 2014 Defense Health Information Technology Symposium Service Desk Strategy for
HP SiteScope 11.x Essentials
HP SiteScope 11.x Essentials Overview This course provides the technical knowledge and skills needed to manage and monitor an IT infrastructure with the help of the HP SiteScope product. Students gain
VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution
AM 1. 8New Features VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution May 2012 AM 1.8 Version 1 Copyright 2012 Alcatel-Lucent 1 Table of Contents 1. Document Purpose... 3 2. What
A Combat Support Agency
Department t of Defense (DoD DoD) Enterprise Email May 9, 2012 v2 Agenda Purpose: Create awareness of Department of Defense (DoD) Enterprise Email and increase AGENDA understanding of the service ss benefits
Desktop Central Managing Windows Computers in WAN
Overview ManageEngine Desktop Central is Web-Based windows desktop administration software that helps administrators to effectively manage the desktops from a central point. It provides Software Deployment,
7 Practical insights for IT Asset Management
7 Practical insights for IT Asset Management Tauneel McKay Director Swiss Reinsurance Company Ltd Subbarao Chaganty Principal Consultant Infosys Ltd RELATE MANAGE.. Context KNOW. Consolidate the IT Asset
Defense Healthcare Management Systems
Defense Healthcare Management Systems Recovering Warrior Task Force Interagency Program Office (IPO) Review Mr. Christopher Miller 28 January 2014 1 Agenda Topic Introduction Program Executive Office (PEO)
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-3 CJCSI 3265.01A DISTRIBUTION: A, B, C, S COMMAND AND CONTROL GOVERNANCE AND MANAGEMENT References: See Enclosure C 1. Purpose. This instruction applies
ASSISTANT SECRETARY OF DEFENSE 3700 DEFENSE PENTAGON WASHINGTON, DC 20301-3700
ASSISTANT SECRETARY OF DEFENSE 3700 DEFENSE PENTAGON WASHINGTON, DC 20301-3700 OPERATIONAL ENERGY PLANS AND PROGRAMS June 14, 2011 MEMORANDUMeFOR THE COMMANDERS OF THE COMBATANT COMMANDS DEPUTY ASSISTANT
How To Integrate Software And Systems
September 25, 2014 EFFECTIVE METHODS FOR SOFTWARE AND SYSTEMS INTEGRATION P R E S E N T E D B Y: D R. B O Y D L. S U M M E R S 1 Software Engineer (Quality) Defense and Space The Boeing Company - Seattle,
How To Get A Production Line Of A Cloud Based System To Work For A Military
Global Combat Support System- Marine Corps (GCSS-MC) Program Overview and Status Andrew Dwyer, PM GCSS-MC 1 May 2012 Agenda Bottom Line Up Front GCSS-MC Program Overview Increment 1 Concept of Employment
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
HP Service Manager software
HP Service Manager software The HP next generation IT Service Management solution is the industry leading consolidated IT service desk. Brochure HP Service Manager: Setting the standard for IT Service
Forecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
Software Safety Strategy for US Navy Gun System Acquisition Programs
Software Safety Strategy for US Navy Gun System Acquisition Programs Joey Rivera, Paul Dailey Software Engineering Ph.D. Students, Naval Postgraduate School 1 Background US Navy weapon and combat system
DOD Medical Device Cybersecurity Considerations
Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1 DHA Vision A joint,
About me - Joel Montvelisky
About me - Joel Montvelisky PractiTest Co Founder & Prod. Architect QA Instructor & Consultant Mercury Interactive - QA Manager (retired ) TD, QC, WR, QTP, etc ITCB (IL) Advisory Board QABlog.practitest.com
Creating Added Value for the IT Service Management Practice. How ConsoleWorks Creates Value for ITSM Best Practices
Creating Added Value for the IT Service Practice Many of the best practices documented within ITSM provide guidance on how to perform IT functions in a consistent and reliable manner. It calls for a seamless
SUBJECT: Joint Information Environment Implementation Guidance
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 SEP 2 6 2013 CHIEF INFORMATION OFFICER MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF
Accenture Development Partnerships Cloud Lessons Learned
Accenture Development Partnerships Cloud Lessons Learned Agenda Introducing Accenture Development Partnerships Speaking The Same Language Best Practices For Cloud Projects Project Based Lessons Learned
Guide to Successful Program Management
RG Perspective Guide to Successful Program Management 12 Ways to Make Your Program Deliver on Time, on Target, and on Budget 11 Canal Center Plaza Alexandria, VA 22314 HQ 703-548-7006 Fax 703-684-5189
DISA Acquisition Opportunities
DISA Acquisition Opportunities 2014 Forecast to Industry 1 CAE Acquisition Opportunities GCCS-J Program support Base year and one 1 year option with total estimated value of $5M Current PoP ends 28 Nov
E 2 T 2 ENTERPRISE ENGINE FOR TROUBLE TICKETING
E 2 T 2 ENTERPRISE ENGINE FOR TROUBLE TICKETING Cluster Reply has developed a framework software based on Microsoft SharePoint 2007 (MOSS 2007) technology which, leveraging some native functions in combination
Project Manager Integrated
Project Manager Integrated Training Environment (PM ITE) COL Roland M. Gaddy Jr. PEO STRI Project Manager Integrated Training Environment (PM ITE) 18 June 2015 PM ITE Organization PM Integrated Training
Welcome to the ARCO Group Support Desk
Welcome to the ARCO Group Support Desk To allow us to provide you the best service possible when you have a support need it is very important that you follow these instructions when requesting support.
Red Hat ISV Program Guide
Red Hat ISV Program Guide Accelerate Your Success! APJ ISV program Guide 1 of 17 WELCOME TO THE ISV PARTNER PROGRAM RED HAT PARTNER PROGRAM ISV PARTNER TRACK Welcome to the Red Hat Partner Program ISV
Release Management. ProPath. Office of Information and Technology
Release Management ProPath Office of Information and Technology Table of Contents Release Management Process Maps... 1 Process: Release Management... 7 Release Management and Goals... 9... 9 Goals... 9
Effective Team Development Using Microsoft Visual Studio Team System
Effective Team Development Using Microsoft Visual Studio Team System Course 6214A: Three days; Instructor-Led Introduction This three-day instructor-led course provides students with the knowledge and
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION Directive Current as of 19 November 2014 J-8 CJCSI 8410.02 DISTRIBUTION: A, B, C, JS-LAN WARFIGHTING MISSION AREA (WMA) PRINCIPAL ACCREDITING AUTHORITY
HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode)
HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Processes and Best Practices Guide (Codeless Mode) Document Release Date: December, 2014 Software Release
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
2007 Follow-Up Report on the Audit of Information Technology January 2005
2007 Follow-Up Report on the Audit of Information Technology January 2005 Natural Sciences & Engineering Research Council of Canada & Social Sciences & Humanities Research Council of Canada October 2007
Managing Application Performance with JBoss Operations Network and OC Systems RTI
Managing Application Performance with JBoss Operations Network and OC Systems RTI Joe Fernandes - Sr. Product Marketing Manager, Red Hat Steve Sturtevant - Product Manager, OC Systems March 21, 2012 Agenda
Security in Space: Intelsat Information Assurance
Security in Space: Intelsat Information Assurance 14/03/6997 Intelsat Information Assurance Intelsat maintains the highest standards of Information Assurance by assessing and building the Intelsat infrastructure,
ITIL Service Lifecycle Operation
ITIL Service Lifecycle Operation Course Details Course Code: Duration: Notes: ITILSL-Oper 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8115.01 October 10, 2005 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management References: (a) Subtitle III of title 40, United States Code (formerly
Software defined networking. Your path to an agile hybrid cloud network
Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?
Product Build. ProPath. Office of Information and Technology
Product Build ProPath Office of Information and Technology Table of Contents Product Build Process Maps... 1 Process: Product Build... 3 Product Build and Goals... 4... 4 Goals... 4 Product Build RACI
AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015
AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))
Organizations remain under intense pressure to reduce costs To reduce costs we must increase efficiency in resource allocation
Total Cost of Ownership: What is it Really? August 11, 2003 The Challenge How do I optimize my IT investments? Organizations remain under intense pressure to reduce costs To reduce costs we must increase
Managing Open Source Code Best Practices
Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate
Strategic Plan for DoD Cultural Property Protection Training & Planning
Strategic Plan for DoD Cultural Property Protection Training & Planning James A. Zeidler, PhD, RPA Center for Environmental Management of Military Lands Colorado State University, Fort Collins, CO Laurie
10533: Deploying, Configuring, and Administering Microsoft Lync Server 2010 Duration: Five Days
To register or for more information call our office (208) 898-9036 or email [email protected] 10533: Deploying, Configuring, and Administering Microsoft Lync Server 2010 Duration: Five Days
VAIL-Plant Asset Integrity Management System. Software Development Process
VAIL-Plant Asset Integrity Management System Software Development Process Document Number: VAIL/SDP/2008/008 Engineering For a Safer World P u b l i c Approved by : Ijaz Ul Karim Rao Revision: 0 Page:2-of-15
Website: http://www.acq.osd.mil/ic/cwp.html Email: [email protected]
Overview CWP provides funding on a competitive basis to DoD organizations to conduct cooperative research, development, test, and evaluation (RDT&E) projects with foreign partners. The goals of the CWP
National Interagency Resource Ordering and Status System. Change Management Procedures
National Interagency Resource Ordering and Status System Change Management Procedures Working Copy June 9, 2003 Table of Contents 1. Purpose...3 2. Change Control Board Description and Roles... 3 3. Change
DoD s Strategic Mobility Vision: Needs & Challenges
DoD s Strategic Mobility Vision: Needs & Challenges Greg Youst DISA Chief Mobility Engineer October 22, 2014 Agenda DoD Mobility Strategy Overview End-State Visions Implementation Challenges: A Reality
Core Solutions of Microsoft Lync Server 2013
Course 20336B: Core Solutions of Microsoft Lync Server 2013 Course Details Course Outline Module 1: Architecture and Design Approach for Microsoft Lync Server 2013 This module will help you to plan and
Software Sustainment Issues and Challenges
Software Sustainment Issues and Challenges 9 December 2015 Presented to: 2015 DoD Maintenance Symposium Distribution Statement A. Approved for Public Release. Distribution is unlimited (3 December 2015).
How To Configure Syslog over VPN
How To Configure Syslog over VPN Applicable Version: 10.00 onwards Overview Cyberoam provides extensive logging capabilities for traffic, system and network protection functions. Detailed log information
Administering System Center 2012 Configuration Manager
Administering System Center 2012 Configuration Manager MOC 10747 Duración: 25 horas Introducción This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and
D&CP BUREAU OF RESOURCE MANAGEMENT
Resource Management Resource Summary ($ in thousands) Appropriations Actual FY 2009 Estimate FY 2010 Request Increase / Decrease Positions 357 357 368 11 Funds 101,759 106,971 146,156 39,185 Mission The
