Enterprise Architecture for decision making in MODAF

Size: px
Start display at page:

Download "Enterprise Architecture for decision making in MODAF"

Transcription

1 Enterprise Architecture for decision making in MODAF Ulrik Franke, Ph.D. student Industrial Information and Control Systems Royal Institute of Technology, Stockholm SESAM, Stockholm, April 27,

2 To It defines assist decision-makers, a way of representing MODAF an provides Enterprise the Architecture means of Ministry which abstracting enables of essential Defence stakeholders information to from focus the in on underlying Architecture specific areas complexity of Framework interests and presenting the it enterprise, in a way that whilst maintains retaining coherence sight of the and big consistency. picture. 2

3 Would you tell me, please, which way I ought to go from here? That depends a good deal on where you want to get to, said the Cat. I don t much care where said Alice. Then it doesn t matter which way you go, said the Cat. 3

4 LESSON #1 An Enterprise Architecture effort is not an end in itself; it is a means to something else. Never ever start an EA effort before you know what you want to achieve. 4

5 Information System Decision Domain s Availability IT Department Decision Domain DECISION MAKING Delivery Quality Business Goal Domain 5

6 ? DECISION MAKING 6

7 Information Systems SCADA System Availability Maturity IT Department Availability Management DECISION MAKING Delivery Quality Business Electricity Distribution 7

8 Information Systems SCADA System Availability IT Department Availability Management DECISION MAKING Delivery Quality Business Electricity Distribution 8

9 ? DECISION MAKING 9

10 Information Systems SCADA System Availability Maturity IT Department Availability Management DECISION MAKING Delivery Quality Business Electricity Distribution 10

11 Information Systems SCADA System Availability IT Department Availability Management DECISION MAKING Delivery Quality Business Electricity Distribution 11

12 ? Delivery Quality Delivery Quality Delivery Quality Delivery Quality DECISION MAKING Delivery Quality Delivery Quality 12

13 LESSON #2 Different decisions require different information. Good models structure what you know before making decisions, and enable scenario analysis. 13

14 Dependency analysis How do high-level operational concepts (airlift capability, search and rescue, etc.) depend upon particular technical systems (vehicles, radars, IT systems, etc.)? There is a gap between the enterprise-level decision making and the low-level implementation If this gap is not bridged, decisions will not be rational 14

15 Dependencies in MODAF Dependencies of interest to MOD include: capability dependencies, programmatic dependencies, technology dependencies etc. Analysis of dependencies of this type is considered a key use of an Enterprise Architecture. 15

16 Sample MODAF products 16

17 How should MODAF models look? The challenge is to give just enough contents to MODAF models to enable the relevant kind of decision making no more, no less! 17

18 LESSON #3 MODAF models are good for visualizing dependencies, but not so good for analyzing them. Therefore, they are difficult to use for scenario analysis. 18

19 Can MODAF become a more powerful decision making tool? Information on causal relations enables decision making using scenarios. As part of KTH research, we have developed a method for extending MODAF models with attributes and attribute relations for dependency analysis using Fault Tree Analysis and Bayesian networks 19

20 Simple FT-BN analysis example 20

21 From a MODAF model Operational <<Op. Activity>> Target acquisition <<needline>> <<Op. Activity>> Kill target <<needline>> <<Op. Activity>> C2 <<needline>> <<Op. Activity>> Strike Systems/Services <<System>> UGV TA <<needline>> <<needline>> <<System>> UAV TA <<needline>> <<System>> Comms satellite to TA system <<needline>> << System>> Comms satellite to striking system <<needline>> << System>> Armed UAV <<needline>> << System>> Artillery 21

22 to a fault tree Operational <<Op. Activity>> Target acquisition <<Op. Activity>> Kill target AND <<Op. Activity>> C2 <<Op. Activity>> Strike Systems/Services <<System>> UGV TA OR <<System>> UAV TA << System>> Comms satellite to TA system AND <<System>> Comms satellite to striking system OR << System>> Armed UAV << System>> Artillery 22

23 to a Bayesian network System Status satellite Non-failed Failed Signal delay Yes No Yes No Moving target Yes No Yes No Yes No Yes No High Quality Medium of C2 None Inspired by Dougherty [7] Systems/Services Operational <<System>> UGV TA - System status <<Node>> Target - Moving <<Op. Activity>> Target acquisition OR <<System>> UAV TA <<Op. Activity>> Kill target - Successful kill AND <<Op. Activity>> C2 AND <<System>> Comms satellite <<Node>> UAV operator platform <<Op. Activity>> Strike - Quality - Quality - Precision - Video UI enhancement status - System status - Signal latency - System status - Moving OR <<System>> Armed UAV - Autopilot status - System status <<System>> Artillery - System status Antonov et. al and Dixon et. al System status of UGV System status Non-failed Failed of UAV Non-failed Failed Non-failed Failed Video UI enhancement Nonfailed Non- Non- Non- status Failed failed Failed failed Failed failed Failed High Quality Medium of TA None Inspired by Fincannon et. al [10] Inspired by Antonov et. al [1] and Dixon et al. [6] System Status of Armed UAV Non-failed Failed System Status of Artillery Non-failed Failed Non-failed Failed Moving UAV op. Plattform Yes No Yes No Yes No Yes No Nonfailed Non- Non- Non- Non- Non- Non- Non- Autopilot status Failed failed Failed failed Failed failed Failed failed Failed failed Failed failed Failed failed Failed High Precision Medium None

24 Scenarios for decision making 24

25 LESSON #4 Fault Tree Analysis and Bayesian networks enable causality based analysis in close support of decision making needs 25

26 Summary of the lessons 1. Set the goals before you choose the means 2. Scenario analysis is a powerful way to visualize the impact of decisions 3. Traditional MODAF analysis is weak on causality and not very good for scenario driven decision making 4. Fault Tree Analysis and Bayesian networks enable causality based analysis in close support of decision making needs 26

27 Thank you! Questions and feedback? 27

28 References Ulrik Franke, Waldo Rocha Flores, Pontus Johnson: Enterprise Architecture Dependency Analysis using Fault Trees and Bayesian Networks, Proc. 42nd Annual Simulation Symposium (ANSS), pp , March 2009 Ulrik Franke, Pontus Johnson, Evelina Ericsson, Waldo Rocha Flores, Kun Zhu: Enterprise Architecture analysis using Fault Trees and MODAF, Proc. CAiSE Forum 2009, June 2009, to appear Read more on 28

ANALYZING SYSTEM MAINTAINABILITY USING ENTERPRISE ARCHITECTURE MODELS

ANALYZING SYSTEM MAINTAINABILITY USING ENTERPRISE ARCHITECTURE MODELS ANALYZING SYSTEM MAINTAINABILITY USING ENTERPRISE ARCHITECTURE MODELS Lagerström, Robert, Royal Institute of Technology, Osquldas väg 12, 100 44 Stockholm, Sweden, [email protected] Abstract A fast and

More information

The Cornwell Enterprise Architecture Maturity Dashboard

The Cornwell Enterprise Architecture Maturity Dashboard The Cornwell Enterprise Architecture Maturity Dashboard Ian Bailey This paper outlines Cornwell s approach to assessing the maturity of an organisation s Enterprise Architecture. The method uses standard

More information

Traffic Signal Asset Management System (TSAMS)

Traffic Signal Asset Management System (TSAMS) BUREAU OF MAINTENANCE & OPERATIONS Traffic Signal Asset Management System (TSAMS) DATA COLLECTION PROJECT April 18, 2016 Why TSAMS? How many traffic signals exist in Pennsylvania? I don t know! How many

More information

SUCCESSFUL INTERFACE RISK MANAGEMENT FROM BLAME CULTURE TO JOINT ACTION

SUCCESSFUL INTERFACE RISK MANAGEMENT FROM BLAME CULTURE TO JOINT ACTION SUCCESSFUL INTERFACE RISK MANAGEMENT FROM BLAME CULTURE TO JOINT ACTION SUMMARY Axel Kappeler, Principal James Catmur, Director Interfaces are important because they are everywhere. However, interfaces

More information

Leveraging UX Insights to Influence Product Strategy

Leveraging UX Insights to Influence Product Strategy Leveraging UX Insights to Influence Product Strategy Frank Guo, PhD Many UX researchers and analysts aspire to influencing not only design implementation, but also product strategy. However, it is rather

More information

CRO Forum Paper on the Own Risk and Solvency Assessment (ORSA): Leveraging regulatory requirements to generate value. May 2012.

CRO Forum Paper on the Own Risk and Solvency Assessment (ORSA): Leveraging regulatory requirements to generate value. May 2012. CRO Forum Paper on the Own Risk and Solvency Assessment (ORSA): Leveraging regulatory requirements to generate value May 2012 May 2012 1 1. Introduction 1.1. Purpose of the paper In this discussion paper

More information

POLISH DEFENSE AND SECURITY R&T SYSTEM

POLISH DEFENSE AND SECURITY R&T SYSTEM MINISTRY OF NATIONAL DEFENCE POLISH DEFENSE AND SECURITY RT SYSTEM STRUCTURES, FINANCING, PROJECTS, LESSONS LEARNED Col Marek KALBARCZYK NATIONAL RT POC Tallinn, 20 September 2010 MAIN TOPICS OF THE PRESENTATION

More information

The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems

The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems Mathias Ekstedt, Associate Prof. KTH Royal Institute of Technology, Stockholm

More information

The Role of Business Capabilities in Strategic Planning. Sneaking up on Quality Using Business Architecture in a learning corporation

The Role of Business Capabilities in Strategic Planning. Sneaking up on Quality Using Business Architecture in a learning corporation The Role of Business Capabilities in Strategic Planning Sneaking up on Quality Using Business Architecture in a learning corporation 2 Credits The Open Management Group, Business Architecture Special Interest

More information

Application Overhaul. Key Initiative Overview

Application Overhaul. Key Initiative Overview Scott D. Nelson Research Managing Vice President This overview provides a high-level description of the Application Overhaul Key Initiative. IT leaders can use this guide to understand how to develop an

More information

Major Project Governance Assessment Toolkit

Major Project Governance Assessment Toolkit Major Project Governance Assessment Toolkit Mark Ritchie, University of Edinburgh Pauline Woods-Wilson, Lancaster University Project and Change Management Group Project and Change Management Group Established

More information

CAPABILITY FOR DEFENCE IN TURKEY

CAPABILITY FOR DEFENCE IN TURKEY NETWORK ENABLED CAPABILITY FOR DEFENCE IN TURKEY Mr. Mete ARSLAN, [email protected] Presentation Plan Introduction of SSM SSM point of view for NEC concept and National motivation NEC Technical Feasibility

More information

Journey of a Document CoE. History of a Document CoE At Unum Group September 2014

Journey of a Document CoE. History of a Document CoE At Unum Group September 2014 Journey of a Document CoE History of a Document CoE At Unum Group September 2014 1 Intro and Agenda Moderator: David Hines HP Exstream 2 Agenda Moderator: David Hines HP Exstream Introductions and overview

More information

Presented by. Denis Darveau CISM, CISA, CRISC, CISSP

Presented by. Denis Darveau CISM, CISA, CRISC, CISSP Presented by Denis Darveau CISM, CISA, CRISC, CISSP Las Vegas ISACA Chapter, February 19, 2013 2 COBIT Definition Control Objectives for Information and Related Technology (COBIT) is an IT governance framework

More information

Safety Management Systems (SMS) guidance for organisations

Safety Management Systems (SMS) guidance for organisations Safety and Airspace Regulation Group Safety Management Systems (SMS) guidance for organisations CAP 795 Published by the Civil Aviation Authority, 2014 Civil Aviation Authority, CAA House, 45-59 Kingsway,

More information

Requirements- based UAV Design Process Explained

Requirements- based UAV Design Process Explained Requirements- based UAV Design Process Explained A UAV manufacturer s guide By Howard Loewen Unmanned aerial vehicle (UAV) manufacturers depend on design processes, whether they are unstructured and ad-

More information

Reflection Report International Semester

Reflection Report International Semester Reflection Report International Semester Studying abroad at KTH Royal Institute of Technology Stockholm 18-01-2011 Chapter 1: Personal Information Name and surname: Arts, Rick G. B. E-mail address: Department:

More information

Enhancing Student Motivation: what factors are important and what actions can be taken

Enhancing Student Motivation: what factors are important and what actions can be taken Enhancing Student Motivation: what factors are important and what actions can be taken Rima Afifi, PhD, MPH Faculty of Health Sciences American University of Beirut April 26/27 2010 Introductions and Expectations

More information

Kirsten Sinclair SyntheSys Systems Engineers

Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Spicing-up IBM s Enterprise Architecture tools with Petri Nets On Today s Menu Appetiser: Background Starter: Use

More information

Module 6 Essentials of Enterprise Architecture Tools

Module 6 Essentials of Enterprise Architecture Tools Process-Centric Service-Oriented Module 6 Essentials of Enterprise Architecture Tools Capability-Driven Understand the need and necessity for a EA Tool IASA Global - India Chapter Webinar by Vinu Jade

More information

Auditdraw: Generating Audits the FAST Way

Auditdraw: Generating Audits the FAST Way Auditdraw: Generating Audits the FAST Way Neeraj K. Gupta Lalita Jategaonkar Jagadeesan Eleftherios E. Koutsofios David M. Weiss January 1997 In Proceedings of the 3rd IEEE International Symposium on Requirements

More information

A pragmatic approach to modeling large systems

A pragmatic approach to modeling large systems Theodore Kahn Ian Sturken NASA Ames Research Center Moffett Field, CA NASA/Army Systems and Software Engineering Forum May 11 & 12, 2010 University of Alabama, Huntsville [email protected] [email protected]

More information

TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization

TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization Negar Koochakzadeh Vahid Garousi Software Quality Engineering Research Group University of Calgary, Canada Acknowledging funding and

More information

the role of the head of internal audit in public service organisations 2010

the role of the head of internal audit in public service organisations 2010 the role of the head of internal audit in public service organisations 2010 CIPFA Statement on the role of the Head of Internal Audit in public service organisations The Head of Internal Audit in a public

More information

Board report for 31 May 06 Item 8

Board report for 31 May 06 Item 8 Board report for 31 May 06 Item 8 DRAFT Internal communications strategy Contents 1. Executive Summary 2. Introduction 3. Background 4. The vision for communications 5. Strategic objectives 6. Early priorities

More information

Software development life cycle. Software Engineering - II ITNP92 - Object Oriented Software Design. Requirements. Requirements. Dr Andrea Bracciali

Software development life cycle. Software Engineering - II ITNP92 - Object Oriented Software Design. Requirements. Requirements. Dr Andrea Bracciali Software development life cycle Software life cycle: Software Engineering - II ITNP92 - Object Oriented Software Design Dr Andrea Bracciali Module Co-ordinator 4B86 [email protected] Spring 2014 (elicitation)

More information

California Enterprise Architecture Framework

California Enterprise Architecture Framework Version 2.0 August 01, 2013 This Page is Intentionally Left Blank Version 2.0 ii August 01, 2013 TABLE OF CONTENTS 1 Executive Summary... 1 1.1 What is Enterprise Architecture?... 1 1.2 Why do we need

More information

Chap 1. Introduction to Software Architecture

Chap 1. Introduction to Software Architecture Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)

More information

ARB's overarching goals The Board has identified two objectives from the Act which underpin all of our work:

ARB's overarching goals The Board has identified two objectives from the Act which underpin all of our work: Architects Registration Board Communications Strategy Introduction Effective communication is key to the work of the Architects Registration Board (ARB), enabling the organisation to build and maintain

More information

LEADERSHIP CULTURE SURVEY

LEADERSHIP CULTURE SURVEY LEADERSHIP CULTURE SURVEY THE LEADERSHIP CULTURE SURVEY TM See the whole picture and discover a compelling rationale for change The LEADERSHIP CULTURE SURVEY TM delivers a powerful litmus test of your

More information

Models for Cyber Security Analysis

Models for Cyber Security Analysis Enterprise Architecture t Models for Cyber Security Analysis Teodor Sommestad Royal Institute of Technology KTH Stockholm, Sweden 1 Consequences of Cyber Security Incidents (?) CIA senior analyst Tom Donahue:

More information

THE FUNDAMENTALS OF PROJECT MANAGEMENT

THE FUNDAMENTALS OF PROJECT MANAGEMENT THE FUNDAMENTALS OF PROJECT MANAGEMENT Learning the Essential Elements for Effective Management at UW-Stout WHAT IS A PROJECT? 1. Improve the efficiency of a specific production line. 2. Organize the annual

More information

4. Multiagent Sys stems Design. Part 2: The PROMETHEUS methodology.

4. Multiagent Sys stems Design. Part 2: The PROMETHEUS methodology. 4. Multiagent Systems Design Part 2: Multiagent Syste ems (SMA-UPC) https://kemlg.upc.edu The PROMETHEUS methodology. Javier Vázquez-Salceda SMA-UPC Methodological Extensions to Object-Oriented Approaches

More information

Reaching CMM Levels 2 and 3 with the Rational Unified Process

Reaching CMM Levels 2 and 3 with the Rational Unified Process Reaching CMM Levels 2 and 3 with the Rational Unified Process Rational Software White Paper TP174 Table of Contents INTRODUCTION... 1 LEVEL-2, REPEATABLE... 3 Requirements Management... 3 Software Project

More information

A Tool for Enterprise Architecture Analysis using the PRM formalism

A Tool for Enterprise Architecture Analysis using the PRM formalism A Tool for Enterprise Architecture Analysis using the PRM formalism Markus Buschle, Johan Ullberg, Ulrik Franke, Robert Lagerström, and Teodor Sommestad Industrial Information and Control Systems, KTH

More information

Utilizing Domain-Specific Modelling for Software Testing

Utilizing Domain-Specific Modelling for Software Testing Utilizing Domain-Specific Modelling for Software Testing Olli-Pekka Puolitaival, Teemu Kanstrén VTT Technical Research Centre of Finland Oulu, Finland {olli-pekka.puolitaival, teemu.kanstren}@vtt.fi Abstract

More information

An Integrated Quality Assurance Framework for Specifying Business Information Systems

An Integrated Quality Assurance Framework for Specifying Business Information Systems An Integrated Quality Assurance Framework for Specifying Business Information Systems Frank Salger 1, Stefan Sauer 2, Gregor Engels 1,2 1 Capgemini sd&m AG, Carl-Wery-Str. 42, D-81739 München, Germany

More information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?

More information

Enhancing Law Enforcement Response to Victims:

Enhancing Law Enforcement Response to Victims: Enhancing Law Enforcement Response to Victims: Strategy Implementation Checklist Enhancing Law Enforcement Response to Victims is a new professional standard developed by the International Association

More information

Resources for Implementing the WWF Project & Programme Standards. Step 2.3 Design Operational Plan

Resources for Implementing the WWF Project & Programme Standards. Step 2.3 Design Operational Plan Resources for Implementing the WWF Project & Programme Standards Step 2.3 Design Operational Plan June 2007 Step 2.3 Design Operational Plan Contents What Is An Operational Plan?... 1 Why Is An Operational

More information

BCS Specialist Certificate in Change Management Syllabus

BCS Specialist Certificate in Change Management Syllabus BCS Specialist Certificate in Change Management Syllabus Version 1.9 March 2015 BCS Specialist Certificate in Change Management Syllabus Contents Change History... 2 Rationale... 3 Aims and Objectives...

More information

Principles of IT Governance

Principles of IT Governance Principles of IT Governance Governance of enterprise IT focuses on delivering services to support top line growth while moving operational savings to the bottom line. The management of IT services has

More information

SUPERVISION GUIDELINE NO. 9 ISSUED UNDER THE AUTHORITY OF THE FINANCIAL INSTITUTIONS ACT 1995 (NO. 1 OF 1995) RISK MANAGEMENT

SUPERVISION GUIDELINE NO. 9 ISSUED UNDER THE AUTHORITY OF THE FINANCIAL INSTITUTIONS ACT 1995 (NO. 1 OF 1995) RISK MANAGEMENT SUPERVISION GUIDELINE NO. 9 ISSUED UNDER THE AUTHORITY OF THE FINANCIAL INSTITUTIONS ACT 1995 (NO. 1 OF 1995) RISK MANAGEMENT Bank of Guyana July 1, 2009 TABLE OF CONTENTS 1.0 Introduction 2.0 Management

More information

A Methodology for Safety Critical Software Systems Planning

A Methodology for Safety Critical Software Systems Planning A Methodology for Safety Critical Software Systems Planning EHAB SHAFEI 1, IBRAHIM F. MOAWAD 2, HANY SALLAM 1, ZAKI TAHA 3, MOSTAFA AREF 3 1 Operation Safety and Human Factors Department, 2 Information

More information

An Open Framework for Reverse Engineering Graph Data Visualization. Alexandru C. Telea Eindhoven University of Technology The Netherlands.

An Open Framework for Reverse Engineering Graph Data Visualization. Alexandru C. Telea Eindhoven University of Technology The Netherlands. An Open Framework for Reverse Engineering Graph Data Visualization Alexandru C. Telea Eindhoven University of Technology The Netherlands Overview Reverse engineering (RE) overview Limitations of current

More information

Social-Sensed Multimedia Computing

Social-Sensed Multimedia Computing Social-Sensed Multimedia Computing Wenwu Zhu Tsinghua University Multimedia Computing Search Recommend Multimedia Summarize Social Distribution... Sense from Social Preference Influence User behaviors

More information

SWISS ORDINANCE ON MATERIALS AND ARTICLES IN CONTACT WITH FOOD (SR 817.023.21) Permitted Substances for Packaging Inks. Questions & Answers

SWISS ORDINANCE ON MATERIALS AND ARTICLES IN CONTACT WITH FOOD (SR 817.023.21) Permitted Substances for Packaging Inks. Questions & Answers SWISS ORDINANCE ON MATERIALS AND ARTICLES IN CONTACT WITH FOOD (SR 817.023.21) Permitted Substances for Packaging Inks Questions & Answers Page 1 of 5 The Swiss Federal Department of Home Affairs (FDHA)

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

STRENGTHENING DEPARTMENT OF DEFENSE LABORATORIES David Graham, Robert Leheny, and Susan Clark-Sestak

STRENGTHENING DEPARTMENT OF DEFENSE LABORATORIES David Graham, Robert Leheny, and Susan Clark-Sestak STRENGTHENING DEPARTMENT OF DEFENSE LABORATORIES David Graham, Robert Leheny, and Susan Clark-Sestak The Problem Department of Defense (DoD) laboratories primarily focus on sustaining innovation in known

More information

An Artesian Whitepaper

An Artesian Whitepaper An Artesian Whitepaper This short paper talks about the subject of the semantic web, providing a definition and context and outlining how this can be exploited to drive commercial productivity particularly

More information

A Mock RFI for a SD-WAN

A Mock RFI for a SD-WAN A Mock RFI for a SD-WAN Ashton, Metzler & Associates Background and Intended Use After a long period with little if any fundamental innovation, the WAN is now the focus of considerable innovation. The

More information

Physical Security for Drinking Water Facilities

Physical Security for Drinking Water Facilities Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland

More information

The Big Assurance Picture

The Big Assurance Picture The Big Assurance Picture Stuart Wooldridge, Partner in Internal Audit Services at PwC, spoke at the joint ACCA/IIA networking forum on 25 October 2011 on The Big Assurance Picture. This is an overview

More information

A Remote Maintenance System with the use of Virtual Reality.

A Remote Maintenance System with the use of Virtual Reality. ICAT 2001 December 5-7, Tokyo, JAPAN A Remote Maintenance System with the use of Virtual Reality. Moez BELLAMINE 1), Norihiro ABE 1), Kazuaki TANAKA 1), Hirokazu TAKI 2) 1) Kyushu Institute of Technology,

More information

SFJPE1.3 Evaluate the effectiveness of the operational delivery business process

SFJPE1.3 Evaluate the effectiveness of the operational delivery business process Evaluate the effectiveness of the operational delivery business process Overview This standard concerns evaluating the effectiveness of new and adapted business processes. The scope of work needs to address

More information

The Handbook of Program Management: How to Facilitate Project Success with Optimal Program Management. Dr. James T. Brown, McGraw Hill, 2008

The Handbook of Program Management: How to Facilitate Project Success with Optimal Program Management. Dr. James T. Brown, McGraw Hill, 2008 The Handbook of Program Management: How to Facilitate Project Success with Optimal Program Management Dr. James T. Brown, McGraw Hill, 2008 I received this book unsolicited in the mail from Dr. Brown.

More information

How to Create a Business Focused Data Quality Assessment. Dylan Jones, Editor/Community Manager [email protected]

How to Create a Business Focused Data Quality Assessment. Dylan Jones, Editor/Community Manager editor@dataqualitypro.com How to Create a Business Focused Data Quality Assessment Dylan Jones, Editor/Community Manager [email protected] Why Do We Need a Data Quality Assessment? We need to perform a data quality assessment

More information

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond

More information

Most CPA firms understand the importance of strategic

Most CPA firms understand the importance of strategic Accountability It s Just What the Doctor Ordered By August Aquila You may think that creating a culture of accountability in your firm is an impossible task. In reality, it may be one of the simplest things

More information

Service Quality Management The next logical step by James Lochran

Service Quality Management The next logical step by James Lochran www.pipelinepub.com Volume 4, Issue 2 Service Quality Management The next logical step by James Lochran Service Quality Management (SQM) is the latest in the long list of buzz words floating around the

More information

Intranet Case Study Cisco. March 2014

Intranet Case Study Cisco. March 2014 Intranet Case Study Cisco March 2014 Heather Gallegos Senior Manager, Internal Communication Channels Global Corporate Communications Strategic, Executive, Internal Communications Strategic Planning Business

More information

Case Studies in Systems Engineering Central to the Success of Applied Systems Engineering Education Programs

Case Studies in Systems Engineering Central to the Success of Applied Systems Engineering Education Programs Complexity Case Studies in Systems Engineering Central to the Success of Applied Systems Engineering Education Programs Carlee A. Bishop Principal Research Engineer, Georgia Tech Research Institute Georgia

More information

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci 1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks

More information

STSG Methodologies and Support Structure

STSG Methodologies and Support Structure STSG Methodologies and Support Structure STSG Application Life Cycle Management STSG utilizes comprehensive lifecycle tools that are fully integrated and provide capabilities for most of the roles in its

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

Five Core Principles of Successful Business Architecture

Five Core Principles of Successful Business Architecture Five Core Principles of Successful Business Architecture Authors: Greg Suddreth and Whynde Melaragno Strategic Technology Architects (STA Group, LLC) Sponsored by MEGA Presents a White Paper on: Five Core

More information

UNITED KINGDOM HYDROGRAPHIC OFFICE STRUCTURAL AND OWNERSHIP OPTIONS STUDY EXECUTIVE SUMMARY. November 2007

UNITED KINGDOM HYDROGRAPHIC OFFICE STRUCTURAL AND OWNERSHIP OPTIONS STUDY EXECUTIVE SUMMARY. November 2007 UNITED KINGDOM HYDROGRAPHIC OFFICE STRUCTURAL AND OWNERSHIP OPTIONS STUDY EXECUTIVE SUMMARY November 2007 Laid in the library of the House 6 th December 2007 Ministry of Defence Directorate of Business

More information

Project organisation and establishing a programme management office

Project organisation and establishing a programme management office PROJECT ADVISORY Project organisation and establishing a programme office Leadership Series 1 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital

More information

Capacity building for Maritime Domain Awareness in East Africa

Capacity building for Maritime Domain Awareness in East Africa 1 US Naval Forces Africa Capacity building for Maritime Domain Awareness in East Africa Kirsty McLean + 39 081 568 8104 +39 335 179 6404 [email protected] Overview 2 What is NAVAF and what do we

More information

ASNE Intelligent Ships Symposium X. Navy Research @Villanova. Dr. Gary A. Gabriele Drosdick Endowed Dean of Engineering

ASNE Intelligent Ships Symposium X. Navy Research @Villanova. Dr. Gary A. Gabriele Drosdick Endowed Dean of Engineering ASNE Intelligent Ships Symposium X Navy Research @Villanova Dr. Gary A. Gabriele Drosdick Endowed Dean of Engineering Some numbers and highlights 930 Undergraduate Students 400 Graduate Students 61 Tenured

More information

HP DevOps by Design. Your Readiness for Continuous Innovation Rony Van Hove/ April 2 nd, 2015. HP Software: Apps meet Ops 2015

HP DevOps by Design. Your Readiness for Continuous Innovation Rony Van Hove/ April 2 nd, 2015. HP Software: Apps meet Ops 2015 HP Software: Apps meet Ops 2015 HP DevOps by Design Your Readiness for Continuous Innovation Rony Van Hove/ April 2 nd, 2015 HP Software: Apps meet Ops 2015 Build it, test it, and fix the things that go

More information

Software Safety Strategy for US Navy Gun System Acquisition Programs

Software Safety Strategy for US Navy Gun System Acquisition Programs Software Safety Strategy for US Navy Gun System Acquisition Programs Joey Rivera, Paul Dailey Software Engineering Ph.D. Students, Naval Postgraduate School 1 Background US Navy weapon and combat system

More information

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence

More information

How does HR support the business?

How does HR support the business? Exercise How does HR support the business? Contact Details + 44 (0) 845 862 1767 or [email protected] www.courageoushr.com How does HR support the business strategy? Corporate (Level One) Define

More information

SLAC Communications Strategy

SLAC Communications Strategy SLAC Communications Strategy Farnaz Khadem Agenda Vision Where we stand today Key communications pillars Strategic Priorities Benchmarking/data gathering Measurement Timeline Vision To create a world-class

More information

Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert

Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Int'l Conf. Software Eng. Research and Practice SERP'15 225 Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

Good Practice Guidelines for Indicator Development and Reporting

Good Practice Guidelines for Indicator Development and Reporting Good Practice Guidelines for Indicator Development and Reporting A contributed paper Third World Forum on Statistics, Knowledge and Policy Charting Progress, Building Visions, Improving Life 27-30 October

More information

Assessment of IT Governance - A Prioritization of Cobit -

Assessment of IT Governance - A Prioritization of Cobit - Paper #151 Assessment of IT Governance - A Prioritization of Cobit - Mårten Simonsson and Pontus Johnson KTH, Royal Institute of Technology Osquldas väg 12, 7 tr, S-100 44 Stockholm, Sweden [email protected],

More information

Design of Network Educating Information System Based on Use Cases Driven Shenwei Wang 1 & Min Guo 2

Design of Network Educating Information System Based on Use Cases Driven Shenwei Wang 1 & Min Guo 2 International Symposium on Social Science (ISSS 2015) Design of Network Educating Information System Based on Use Cases Driven Shenwei Wang 1 & Min Guo 2 1 College of Electronic and Control Engineering,

More information