Enterprise Architecture for decision making in MODAF
|
|
|
- Hannah Wilcox
- 9 years ago
- Views:
Transcription
1 Enterprise Architecture for decision making in MODAF Ulrik Franke, Ph.D. student Industrial Information and Control Systems Royal Institute of Technology, Stockholm SESAM, Stockholm, April 27,
2 To It defines assist decision-makers, a way of representing MODAF an provides Enterprise the Architecture means of Ministry which abstracting enables of essential Defence stakeholders information to from focus the in on underlying Architecture specific areas complexity of Framework interests and presenting the it enterprise, in a way that whilst maintains retaining coherence sight of the and big consistency. picture. 2
3 Would you tell me, please, which way I ought to go from here? That depends a good deal on where you want to get to, said the Cat. I don t much care where said Alice. Then it doesn t matter which way you go, said the Cat. 3
4 LESSON #1 An Enterprise Architecture effort is not an end in itself; it is a means to something else. Never ever start an EA effort before you know what you want to achieve. 4
5 Information System Decision Domain s Availability IT Department Decision Domain DECISION MAKING Delivery Quality Business Goal Domain 5
6 ? DECISION MAKING 6
7 Information Systems SCADA System Availability Maturity IT Department Availability Management DECISION MAKING Delivery Quality Business Electricity Distribution 7
8 Information Systems SCADA System Availability IT Department Availability Management DECISION MAKING Delivery Quality Business Electricity Distribution 8
9 ? DECISION MAKING 9
10 Information Systems SCADA System Availability Maturity IT Department Availability Management DECISION MAKING Delivery Quality Business Electricity Distribution 10
11 Information Systems SCADA System Availability IT Department Availability Management DECISION MAKING Delivery Quality Business Electricity Distribution 11
12 ? Delivery Quality Delivery Quality Delivery Quality Delivery Quality DECISION MAKING Delivery Quality Delivery Quality 12
13 LESSON #2 Different decisions require different information. Good models structure what you know before making decisions, and enable scenario analysis. 13
14 Dependency analysis How do high-level operational concepts (airlift capability, search and rescue, etc.) depend upon particular technical systems (vehicles, radars, IT systems, etc.)? There is a gap between the enterprise-level decision making and the low-level implementation If this gap is not bridged, decisions will not be rational 14
15 Dependencies in MODAF Dependencies of interest to MOD include: capability dependencies, programmatic dependencies, technology dependencies etc. Analysis of dependencies of this type is considered a key use of an Enterprise Architecture. 15
16 Sample MODAF products 16
17 How should MODAF models look? The challenge is to give just enough contents to MODAF models to enable the relevant kind of decision making no more, no less! 17
18 LESSON #3 MODAF models are good for visualizing dependencies, but not so good for analyzing them. Therefore, they are difficult to use for scenario analysis. 18
19 Can MODAF become a more powerful decision making tool? Information on causal relations enables decision making using scenarios. As part of KTH research, we have developed a method for extending MODAF models with attributes and attribute relations for dependency analysis using Fault Tree Analysis and Bayesian networks 19
20 Simple FT-BN analysis example 20
21 From a MODAF model Operational <<Op. Activity>> Target acquisition <<needline>> <<Op. Activity>> Kill target <<needline>> <<Op. Activity>> C2 <<needline>> <<Op. Activity>> Strike Systems/Services <<System>> UGV TA <<needline>> <<needline>> <<System>> UAV TA <<needline>> <<System>> Comms satellite to TA system <<needline>> << System>> Comms satellite to striking system <<needline>> << System>> Armed UAV <<needline>> << System>> Artillery 21
22 to a fault tree Operational <<Op. Activity>> Target acquisition <<Op. Activity>> Kill target AND <<Op. Activity>> C2 <<Op. Activity>> Strike Systems/Services <<System>> UGV TA OR <<System>> UAV TA << System>> Comms satellite to TA system AND <<System>> Comms satellite to striking system OR << System>> Armed UAV << System>> Artillery 22
23 to a Bayesian network System Status satellite Non-failed Failed Signal delay Yes No Yes No Moving target Yes No Yes No Yes No Yes No High Quality Medium of C2 None Inspired by Dougherty [7] Systems/Services Operational <<System>> UGV TA - System status <<Node>> Target - Moving <<Op. Activity>> Target acquisition OR <<System>> UAV TA <<Op. Activity>> Kill target - Successful kill AND <<Op. Activity>> C2 AND <<System>> Comms satellite <<Node>> UAV operator platform <<Op. Activity>> Strike - Quality - Quality - Precision - Video UI enhancement status - System status - Signal latency - System status - Moving OR <<System>> Armed UAV - Autopilot status - System status <<System>> Artillery - System status Antonov et. al and Dixon et. al System status of UGV System status Non-failed Failed of UAV Non-failed Failed Non-failed Failed Video UI enhancement Nonfailed Non- Non- Non- status Failed failed Failed failed Failed failed Failed High Quality Medium of TA None Inspired by Fincannon et. al [10] Inspired by Antonov et. al [1] and Dixon et al. [6] System Status of Armed UAV Non-failed Failed System Status of Artillery Non-failed Failed Non-failed Failed Moving UAV op. Plattform Yes No Yes No Yes No Yes No Nonfailed Non- Non- Non- Non- Non- Non- Non- Autopilot status Failed failed Failed failed Failed failed Failed failed Failed failed Failed failed Failed failed Failed High Precision Medium None
24 Scenarios for decision making 24
25 LESSON #4 Fault Tree Analysis and Bayesian networks enable causality based analysis in close support of decision making needs 25
26 Summary of the lessons 1. Set the goals before you choose the means 2. Scenario analysis is a powerful way to visualize the impact of decisions 3. Traditional MODAF analysis is weak on causality and not very good for scenario driven decision making 4. Fault Tree Analysis and Bayesian networks enable causality based analysis in close support of decision making needs 26
27 Thank you! Questions and feedback? 27
28 References Ulrik Franke, Waldo Rocha Flores, Pontus Johnson: Enterprise Architecture Dependency Analysis using Fault Trees and Bayesian Networks, Proc. 42nd Annual Simulation Symposium (ANSS), pp , March 2009 Ulrik Franke, Pontus Johnson, Evelina Ericsson, Waldo Rocha Flores, Kun Zhu: Enterprise Architecture analysis using Fault Trees and MODAF, Proc. CAiSE Forum 2009, June 2009, to appear Read more on 28
ANALYZING SYSTEM MAINTAINABILITY USING ENTERPRISE ARCHITECTURE MODELS
ANALYZING SYSTEM MAINTAINABILITY USING ENTERPRISE ARCHITECTURE MODELS Lagerström, Robert, Royal Institute of Technology, Osquldas väg 12, 100 44 Stockholm, Sweden, [email protected] Abstract A fast and
The Cornwell Enterprise Architecture Maturity Dashboard
The Cornwell Enterprise Architecture Maturity Dashboard Ian Bailey This paper outlines Cornwell s approach to assessing the maturity of an organisation s Enterprise Architecture. The method uses standard
Traffic Signal Asset Management System (TSAMS)
BUREAU OF MAINTENANCE & OPERATIONS Traffic Signal Asset Management System (TSAMS) DATA COLLECTION PROJECT April 18, 2016 Why TSAMS? How many traffic signals exist in Pennsylvania? I don t know! How many
SUCCESSFUL INTERFACE RISK MANAGEMENT FROM BLAME CULTURE TO JOINT ACTION
SUCCESSFUL INTERFACE RISK MANAGEMENT FROM BLAME CULTURE TO JOINT ACTION SUMMARY Axel Kappeler, Principal James Catmur, Director Interfaces are important because they are everywhere. However, interfaces
Leveraging UX Insights to Influence Product Strategy
Leveraging UX Insights to Influence Product Strategy Frank Guo, PhD Many UX researchers and analysts aspire to influencing not only design implementation, but also product strategy. However, it is rather
CRO Forum Paper on the Own Risk and Solvency Assessment (ORSA): Leveraging regulatory requirements to generate value. May 2012.
CRO Forum Paper on the Own Risk and Solvency Assessment (ORSA): Leveraging regulatory requirements to generate value May 2012 May 2012 1 1. Introduction 1.1. Purpose of the paper In this discussion paper
POLISH DEFENSE AND SECURITY R&T SYSTEM
MINISTRY OF NATIONAL DEFENCE POLISH DEFENSE AND SECURITY RT SYSTEM STRUCTURES, FINANCING, PROJECTS, LESSONS LEARNED Col Marek KALBARCZYK NATIONAL RT POC Tallinn, 20 September 2010 MAIN TOPICS OF THE PRESENTATION
The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems
The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems Mathias Ekstedt, Associate Prof. KTH Royal Institute of Technology, Stockholm
The Role of Business Capabilities in Strategic Planning. Sneaking up on Quality Using Business Architecture in a learning corporation
The Role of Business Capabilities in Strategic Planning Sneaking up on Quality Using Business Architecture in a learning corporation 2 Credits The Open Management Group, Business Architecture Special Interest
Application Overhaul. Key Initiative Overview
Scott D. Nelson Research Managing Vice President This overview provides a high-level description of the Application Overhaul Key Initiative. IT leaders can use this guide to understand how to develop an
Major Project Governance Assessment Toolkit
Major Project Governance Assessment Toolkit Mark Ritchie, University of Edinburgh Pauline Woods-Wilson, Lancaster University Project and Change Management Group Project and Change Management Group Established
CAPABILITY FOR DEFENCE IN TURKEY
NETWORK ENABLED CAPABILITY FOR DEFENCE IN TURKEY Mr. Mete ARSLAN, [email protected] Presentation Plan Introduction of SSM SSM point of view for NEC concept and National motivation NEC Technical Feasibility
Journey of a Document CoE. History of a Document CoE At Unum Group September 2014
Journey of a Document CoE History of a Document CoE At Unum Group September 2014 1 Intro and Agenda Moderator: David Hines HP Exstream 2 Agenda Moderator: David Hines HP Exstream Introductions and overview
Presented by. Denis Darveau CISM, CISA, CRISC, CISSP
Presented by Denis Darveau CISM, CISA, CRISC, CISSP Las Vegas ISACA Chapter, February 19, 2013 2 COBIT Definition Control Objectives for Information and Related Technology (COBIT) is an IT governance framework
Safety Management Systems (SMS) guidance for organisations
Safety and Airspace Regulation Group Safety Management Systems (SMS) guidance for organisations CAP 795 Published by the Civil Aviation Authority, 2014 Civil Aviation Authority, CAA House, 45-59 Kingsway,
Requirements- based UAV Design Process Explained
Requirements- based UAV Design Process Explained A UAV manufacturer s guide By Howard Loewen Unmanned aerial vehicle (UAV) manufacturers depend on design processes, whether they are unstructured and ad-
Reflection Report International Semester
Reflection Report International Semester Studying abroad at KTH Royal Institute of Technology Stockholm 18-01-2011 Chapter 1: Personal Information Name and surname: Arts, Rick G. B. E-mail address: Department:
Enhancing Student Motivation: what factors are important and what actions can be taken
Enhancing Student Motivation: what factors are important and what actions can be taken Rima Afifi, PhD, MPH Faculty of Health Sciences American University of Beirut April 26/27 2010 Introductions and Expectations
Kirsten Sinclair SyntheSys Systems Engineers
Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Spicing-up IBM s Enterprise Architecture tools with Petri Nets On Today s Menu Appetiser: Background Starter: Use
Module 6 Essentials of Enterprise Architecture Tools
Process-Centric Service-Oriented Module 6 Essentials of Enterprise Architecture Tools Capability-Driven Understand the need and necessity for a EA Tool IASA Global - India Chapter Webinar by Vinu Jade
Auditdraw: Generating Audits the FAST Way
Auditdraw: Generating Audits the FAST Way Neeraj K. Gupta Lalita Jategaonkar Jagadeesan Eleftherios E. Koutsofios David M. Weiss January 1997 In Proceedings of the 3rd IEEE International Symposium on Requirements
A pragmatic approach to modeling large systems
Theodore Kahn Ian Sturken NASA Ames Research Center Moffett Field, CA NASA/Army Systems and Software Engineering Forum May 11 & 12, 2010 University of Alabama, Huntsville [email protected] [email protected]
TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization
TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization Negar Koochakzadeh Vahid Garousi Software Quality Engineering Research Group University of Calgary, Canada Acknowledging funding and
the role of the head of internal audit in public service organisations 2010
the role of the head of internal audit in public service organisations 2010 CIPFA Statement on the role of the Head of Internal Audit in public service organisations The Head of Internal Audit in a public
Board report for 31 May 06 Item 8
Board report for 31 May 06 Item 8 DRAFT Internal communications strategy Contents 1. Executive Summary 2. Introduction 3. Background 4. The vision for communications 5. Strategic objectives 6. Early priorities
Software development life cycle. Software Engineering - II ITNP92 - Object Oriented Software Design. Requirements. Requirements. Dr Andrea Bracciali
Software development life cycle Software life cycle: Software Engineering - II ITNP92 - Object Oriented Software Design Dr Andrea Bracciali Module Co-ordinator 4B86 [email protected] Spring 2014 (elicitation)
California Enterprise Architecture Framework
Version 2.0 August 01, 2013 This Page is Intentionally Left Blank Version 2.0 ii August 01, 2013 TABLE OF CONTENTS 1 Executive Summary... 1 1.1 What is Enterprise Architecture?... 1 1.2 Why do we need
Chap 1. Introduction to Software Architecture
Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)
ARB's overarching goals The Board has identified two objectives from the Act which underpin all of our work:
Architects Registration Board Communications Strategy Introduction Effective communication is key to the work of the Architects Registration Board (ARB), enabling the organisation to build and maintain
LEADERSHIP CULTURE SURVEY
LEADERSHIP CULTURE SURVEY THE LEADERSHIP CULTURE SURVEY TM See the whole picture and discover a compelling rationale for change The LEADERSHIP CULTURE SURVEY TM delivers a powerful litmus test of your
Models for Cyber Security Analysis
Enterprise Architecture t Models for Cyber Security Analysis Teodor Sommestad Royal Institute of Technology KTH Stockholm, Sweden 1 Consequences of Cyber Security Incidents (?) CIA senior analyst Tom Donahue:
THE FUNDAMENTALS OF PROJECT MANAGEMENT
THE FUNDAMENTALS OF PROJECT MANAGEMENT Learning the Essential Elements for Effective Management at UW-Stout WHAT IS A PROJECT? 1. Improve the efficiency of a specific production line. 2. Organize the annual
4. Multiagent Sys stems Design. Part 2: The PROMETHEUS methodology.
4. Multiagent Systems Design Part 2: Multiagent Syste ems (SMA-UPC) https://kemlg.upc.edu The PROMETHEUS methodology. Javier Vázquez-Salceda SMA-UPC Methodological Extensions to Object-Oriented Approaches
Reaching CMM Levels 2 and 3 with the Rational Unified Process
Reaching CMM Levels 2 and 3 with the Rational Unified Process Rational Software White Paper TP174 Table of Contents INTRODUCTION... 1 LEVEL-2, REPEATABLE... 3 Requirements Management... 3 Software Project
A Tool for Enterprise Architecture Analysis using the PRM formalism
A Tool for Enterprise Architecture Analysis using the PRM formalism Markus Buschle, Johan Ullberg, Ulrik Franke, Robert Lagerström, and Teodor Sommestad Industrial Information and Control Systems, KTH
Utilizing Domain-Specific Modelling for Software Testing
Utilizing Domain-Specific Modelling for Software Testing Olli-Pekka Puolitaival, Teemu Kanstrén VTT Technical Research Centre of Finland Oulu, Finland {olli-pekka.puolitaival, teemu.kanstren}@vtt.fi Abstract
An Integrated Quality Assurance Framework for Specifying Business Information Systems
An Integrated Quality Assurance Framework for Specifying Business Information Systems Frank Salger 1, Stefan Sauer 2, Gregor Engels 1,2 1 Capgemini sd&m AG, Carl-Wery-Str. 42, D-81739 München, Germany
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?
Enhancing Law Enforcement Response to Victims:
Enhancing Law Enforcement Response to Victims: Strategy Implementation Checklist Enhancing Law Enforcement Response to Victims is a new professional standard developed by the International Association
Resources for Implementing the WWF Project & Programme Standards. Step 2.3 Design Operational Plan
Resources for Implementing the WWF Project & Programme Standards Step 2.3 Design Operational Plan June 2007 Step 2.3 Design Operational Plan Contents What Is An Operational Plan?... 1 Why Is An Operational
BCS Specialist Certificate in Change Management Syllabus
BCS Specialist Certificate in Change Management Syllabus Version 1.9 March 2015 BCS Specialist Certificate in Change Management Syllabus Contents Change History... 2 Rationale... 3 Aims and Objectives...
Principles of IT Governance
Principles of IT Governance Governance of enterprise IT focuses on delivering services to support top line growth while moving operational savings to the bottom line. The management of IT services has
SUPERVISION GUIDELINE NO. 9 ISSUED UNDER THE AUTHORITY OF THE FINANCIAL INSTITUTIONS ACT 1995 (NO. 1 OF 1995) RISK MANAGEMENT
SUPERVISION GUIDELINE NO. 9 ISSUED UNDER THE AUTHORITY OF THE FINANCIAL INSTITUTIONS ACT 1995 (NO. 1 OF 1995) RISK MANAGEMENT Bank of Guyana July 1, 2009 TABLE OF CONTENTS 1.0 Introduction 2.0 Management
A Methodology for Safety Critical Software Systems Planning
A Methodology for Safety Critical Software Systems Planning EHAB SHAFEI 1, IBRAHIM F. MOAWAD 2, HANY SALLAM 1, ZAKI TAHA 3, MOSTAFA AREF 3 1 Operation Safety and Human Factors Department, 2 Information
An Open Framework for Reverse Engineering Graph Data Visualization. Alexandru C. Telea Eindhoven University of Technology The Netherlands.
An Open Framework for Reverse Engineering Graph Data Visualization Alexandru C. Telea Eindhoven University of Technology The Netherlands Overview Reverse engineering (RE) overview Limitations of current
Social-Sensed Multimedia Computing
Social-Sensed Multimedia Computing Wenwu Zhu Tsinghua University Multimedia Computing Search Recommend Multimedia Summarize Social Distribution... Sense from Social Preference Influence User behaviors
SWISS ORDINANCE ON MATERIALS AND ARTICLES IN CONTACT WITH FOOD (SR 817.023.21) Permitted Substances for Packaging Inks. Questions & Answers
SWISS ORDINANCE ON MATERIALS AND ARTICLES IN CONTACT WITH FOOD (SR 817.023.21) Permitted Substances for Packaging Inks Questions & Answers Page 1 of 5 The Swiss Federal Department of Home Affairs (FDHA)
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
STRENGTHENING DEPARTMENT OF DEFENSE LABORATORIES David Graham, Robert Leheny, and Susan Clark-Sestak
STRENGTHENING DEPARTMENT OF DEFENSE LABORATORIES David Graham, Robert Leheny, and Susan Clark-Sestak The Problem Department of Defense (DoD) laboratories primarily focus on sustaining innovation in known
An Artesian Whitepaper
An Artesian Whitepaper This short paper talks about the subject of the semantic web, providing a definition and context and outlining how this can be exploited to drive commercial productivity particularly
A Mock RFI for a SD-WAN
A Mock RFI for a SD-WAN Ashton, Metzler & Associates Background and Intended Use After a long period with little if any fundamental innovation, the WAN is now the focus of considerable innovation. The
Physical Security for Drinking Water Facilities
Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland
The Big Assurance Picture
The Big Assurance Picture Stuart Wooldridge, Partner in Internal Audit Services at PwC, spoke at the joint ACCA/IIA networking forum on 25 October 2011 on The Big Assurance Picture. This is an overview
A Remote Maintenance System with the use of Virtual Reality.
ICAT 2001 December 5-7, Tokyo, JAPAN A Remote Maintenance System with the use of Virtual Reality. Moez BELLAMINE 1), Norihiro ABE 1), Kazuaki TANAKA 1), Hirokazu TAKI 2) 1) Kyushu Institute of Technology,
SFJPE1.3 Evaluate the effectiveness of the operational delivery business process
Evaluate the effectiveness of the operational delivery business process Overview This standard concerns evaluating the effectiveness of new and adapted business processes. The scope of work needs to address
The Handbook of Program Management: How to Facilitate Project Success with Optimal Program Management. Dr. James T. Brown, McGraw Hill, 2008
The Handbook of Program Management: How to Facilitate Project Success with Optimal Program Management Dr. James T. Brown, McGraw Hill, 2008 I received this book unsolicited in the mail from Dr. Brown.
How to Create a Business Focused Data Quality Assessment. Dylan Jones, Editor/Community Manager [email protected]
How to Create a Business Focused Data Quality Assessment Dylan Jones, Editor/Community Manager [email protected] Why Do We Need a Data Quality Assessment? We need to perform a data quality assessment
SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government
SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond
Most CPA firms understand the importance of strategic
Accountability It s Just What the Doctor Ordered By August Aquila You may think that creating a culture of accountability in your firm is an impossible task. In reality, it may be one of the simplest things
Service Quality Management The next logical step by James Lochran
www.pipelinepub.com Volume 4, Issue 2 Service Quality Management The next logical step by James Lochran Service Quality Management (SQM) is the latest in the long list of buzz words floating around the
Intranet Case Study Cisco. March 2014
Intranet Case Study Cisco March 2014 Heather Gallegos Senior Manager, Internal Communication Channels Global Corporate Communications Strategic, Executive, Internal Communications Strategic Planning Business
Case Studies in Systems Engineering Central to the Success of Applied Systems Engineering Education Programs
Complexity Case Studies in Systems Engineering Central to the Success of Applied Systems Engineering Education Programs Carlee A. Bishop Principal Research Engineer, Georgia Tech Research Institute Georgia
Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci
1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks
STSG Methodologies and Support Structure
STSG Methodologies and Support Structure STSG Application Life Cycle Management STSG utilizes comprehensive lifecycle tools that are fully integrated and provide capabilities for most of the roles in its
Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010
1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue
Five Core Principles of Successful Business Architecture
Five Core Principles of Successful Business Architecture Authors: Greg Suddreth and Whynde Melaragno Strategic Technology Architects (STA Group, LLC) Sponsored by MEGA Presents a White Paper on: Five Core
UNITED KINGDOM HYDROGRAPHIC OFFICE STRUCTURAL AND OWNERSHIP OPTIONS STUDY EXECUTIVE SUMMARY. November 2007
UNITED KINGDOM HYDROGRAPHIC OFFICE STRUCTURAL AND OWNERSHIP OPTIONS STUDY EXECUTIVE SUMMARY November 2007 Laid in the library of the House 6 th December 2007 Ministry of Defence Directorate of Business
Project organisation and establishing a programme management office
PROJECT ADVISORY Project organisation and establishing a programme office Leadership Series 1 kpmg.com/nz About the Leadership Series KPMG s Leadership Series is targeted towards owners of major capital
Capacity building for Maritime Domain Awareness in East Africa
1 US Naval Forces Africa Capacity building for Maritime Domain Awareness in East Africa Kirsty McLean + 39 081 568 8104 +39 335 179 6404 [email protected] Overview 2 What is NAVAF and what do we
ASNE Intelligent Ships Symposium X. Navy Research @Villanova. Dr. Gary A. Gabriele Drosdick Endowed Dean of Engineering
ASNE Intelligent Ships Symposium X Navy Research @Villanova Dr. Gary A. Gabriele Drosdick Endowed Dean of Engineering Some numbers and highlights 930 Undergraduate Students 400 Graduate Students 61 Tenured
HP DevOps by Design. Your Readiness for Continuous Innovation Rony Van Hove/ April 2 nd, 2015. HP Software: Apps meet Ops 2015
HP Software: Apps meet Ops 2015 HP DevOps by Design Your Readiness for Continuous Innovation Rony Van Hove/ April 2 nd, 2015 HP Software: Apps meet Ops 2015 Build it, test it, and fix the things that go
Software Safety Strategy for US Navy Gun System Acquisition Programs
Software Safety Strategy for US Navy Gun System Acquisition Programs Joey Rivera, Paul Dailey Software Engineering Ph.D. Students, Naval Postgraduate School 1 Background US Navy weapon and combat system
IFS-8000 V2.0 INFORMATION FUSION SYSTEM
IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence
How does HR support the business?
Exercise How does HR support the business? Contact Details + 44 (0) 845 862 1767 or [email protected] www.courageoushr.com How does HR support the business strategy? Corporate (Level One) Define
SLAC Communications Strategy
SLAC Communications Strategy Farnaz Khadem Agenda Vision Where we stand today Key communications pillars Strategic Priorities Benchmarking/data gathering Measurement Timeline Vision To create a world-class
Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert
Int'l Conf. Software Eng. Research and Practice SERP'15 225 Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
Good Practice Guidelines for Indicator Development and Reporting
Good Practice Guidelines for Indicator Development and Reporting A contributed paper Third World Forum on Statistics, Knowledge and Policy Charting Progress, Building Visions, Improving Life 27-30 October
Assessment of IT Governance - A Prioritization of Cobit -
Paper #151 Assessment of IT Governance - A Prioritization of Cobit - Mårten Simonsson and Pontus Johnson KTH, Royal Institute of Technology Osquldas väg 12, 7 tr, S-100 44 Stockholm, Sweden [email protected],
Design of Network Educating Information System Based on Use Cases Driven Shenwei Wang 1 & Min Guo 2
International Symposium on Social Science (ISSS 2015) Design of Network Educating Information System Based on Use Cases Driven Shenwei Wang 1 & Min Guo 2 1 College of Electronic and Control Engineering,
