MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT
|
|
|
- Toby Rose
- 10 years ago
- Views:
Transcription
1 MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT DISSEMINATION AND STORAGE OF TACTICAL UNMANNED AERIAL VEHICLE DIGITAL VIDEO IMAGERY AT THE ARMY BRIGADE LEVEL Andreas K. Apostolopoulos-Major, Hellenic Army B.S., Hellenic Army Military Academy, 1982 Riley O. Tisdale-Captain, United States Army B.S., University of West Florida, 1989 Advisors: William J. Haga, Department of Systems Management LTC Brad R. Naegle, USA, Department of Systems Management The Department of Defense Joint Technical Architecture has mated a migration from analog to digital technology in the Comm, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance (C4ISR) community. The Tactical Unmanned Aerial Vehicle (TUAV) Tactical Control System (TCS) are two brigade imagery intelligence systems that the Army will field within the next three years to achieve information superiority on the modern digital battlefield. These two systems provide the brigade commer with an imagery collection processing capability never before deployed under brigade control. The deployment of the Warfighter Information Network (WIN), within three to five years, will ensure that a digital dissemination network is in place to hle the transmission bwidth requirements of large digital video files. This thesis examines the storage dissemination capabilities of this future brigade imagery system. It calculates a minimum digital storage capacity requirement for the TCS Imagery Product Library, analyzes available storage media based on performance, recommends a high-capacity storage architecture based on modern high technology fault tolerance performance. A video streaming technique is also recommended that utilizes the digital interconnectivity of the WIN for dissemination of video imagery throughout the brigade. DoD KEY TECHNOLOGY AREAS: Comm, Control, Communications, Computing Software, Sensors, Other (Information Technology) KEYWORDS: Tactical Unmanned Aerial Vehicle, Tactical Control System, Redundant Array of Independent Disks, Warfighter Information Network, Tactical Internet, Global Broadcast System 51
2 FIRE SUPPORT PLANNING SYSTEM (FSPS): A COMMERCIAL OFF THE SHELF (COTS), WINDOWS-BASED, WIRELESS APPROACH Michael J. Burke-Major, United States Marine Corps B.B.A., University of Michigan, 1987 M.B.A., Averett College, 1994 Richard C. Lykins-Captain, United States Marine Corps B.S., The Citadel, 1991 Advisors: LtCol Terrance C. Brady, USMC, Information Systems Academic Group Rudolph P. Darken, Department of Computer Science Given the rapid rate of today s technological changes in an environment of austere budgets, DoD faces a significant challenge relating to hardware software. This joint thesis explores two major issues. First, whether commercial off the shelf (COTS) software development tools in conjunction with the Rapid Application Development (RAD) software development methodology can be used to deliver meaningful applications for the warfighter. Second, this thesis describes an overview of the commercial wireless technologies available today whether these technologies could enhance the capabilities of the Marine Corps tactical communications architecture to transmit RAD/Win32 compliant software applications. As a specific demonstration case, the authors developed the Fire Support Planning System (FSPS) software which would ride on top of the Marine Corps Comm Control Personal Computer (C2PC) application. DoD KEY TECHNOLOGY AREAS: Comm, Control, Communications, Computing Software KEYWORDS: Fire Support Planning System (FSPS), Wireless Technology, C2PC, Rapid Application Development (RAD) COMPARING THE MOSAIC AND GTSIMS PROGRAMS IN THE INFRARED SIGNATURE REDUCTION AND COUNTERMEASURE ENVIRONMENT (U) Benjamin W. Copel-Major, United States Marine Corps B.A., University of South Carolina, 1988 MSHCA, Mercer University, 1997 Advisors: Ronald J. Pieper, Department of Electrical Computer Engineering R. Clark Robertson, Department of Electrical Computer Engineering LtCol Terrance C. Brady, USMC, Information Systems Academic Group It is well known through both simulation field tests that IR flare countermeasures can be effective in reducing the vulnerability of aircraft to incoming IR missile seekers. This thesis summarizes the results from two of the premier IR modeling simulation packages for one-on-one missile to aircraft engagements; Modeling System for Advanced Investigation of Countermeasures (MOSAIC) the Georgia Tech Simulations Integrated Modeling System (GTSIMS). The aircraft missiles chosen for this analysis were the F-15E MH-60G, the Stinger (Basic) SA-16, respectively. For each set of conditions, e.g. specified aircraft, aircraft altitude speed, missile, missile launch conditions, with without flares, the simulation was run with scaled IR signature ranging from (nominal) 100% down to 10%. For each 1:1 engagement the miss distance between missile aircraft was recorded observations of any trends in this miss distance are presented. Missile miss distances produced some unexpected, i.e. anomalous, results as the signature of the aircraft was reduced the aircraft is engaged by the Stinger missile in an IRCM environment. Also, there is a comparative look at MOSAIC GTSIMS with an accompanying discussion of the similarities differences between the two packages. 52
3 DoD KEY TECHNOLOGY AREAS: Air Vehicles, Modeling Simulation KEYWORDS: MOSAIC, GTSIMS, Infrared Countermeasures (IRCM), Modeling, Simulation, Stinger, SA-16, F-15E, MH-60G, Infrared (IR) Signature Reduction JPALS FEASIBILITY FOR THE USN/USMC Timothy C. Fawcett-Captain, United States Marine Corps B.S., Marquette University, 1990 Advisors: Rex A. Buddenberg, Information Systems Academic Group John S. Osmundson, Comm, Control, Communications, Computers, Intelligence Academic Group The Department of Defense (DoD) the Federal Aviation Administration (FAA) are committed to a satellite-based, differential Global Positioning System (DGPS) for precision approach ling. DGPS has proven successful in experimental operational tests by civilian operators the United States Air Force alike, will serve as the foundation for the FAA s Wide Area Augmentation System (WAAS) Local Area Augmentation System (LAAS). The DoD s DGPS Joint Precision Approach Ling System (JPALS) essentially mirrors the FAA s efforts, JPALS promises greater operability capability between among the services who currently use dissimilar, stovepiped systems. However, the Air Force-led DPGS program did not thoroughly review DGPS anti-jamming ability, does not offer a feasible solution. Furthermore, the JPALS Analysis of Alternatives (AOA) Operational Requirements Document (ORD) favored fixed-wing operations did not thoroughly consider the operations of the Marine Corps Navy. Even though JPALS represents a significant improvement over the present precision approach ling systems in use by the DoD, the Acquisition Category 1D program must review anti-jamming capabilities, shipboard operations, Marine Corps expeditionary missions. DoD KEY TECHNOLOGY AREAS: Comm, Control, Communications, Other (Computers, Intelligence, Surveillance Reconnaissance) KEYWORDS: GPS, LAAS, WAAS, JPALS, AOA, ORD WORLD WIDE WEB ADMINISTRATION AND DISTRIBUTION OF THE MAINTENANCE CLIMATE ASSESSMENT SURVEY (MCAS) Jeff W. Fenton-Lieutenant Commer, United States Navy B.S., Indiana University, 1983 Advisors: John K. Schmidt, School of Aviation Safety Douglas E. Brinkley, Information Systems Academic Group Second Reader: Robert R. Read, Department of Operations Research Naval Aviation has been tasked to reduce its 1996 human factors related Class A flight mishap rate in half by the year The Human Factors Quality Management Board (HFQMB) was established in 1996 to help Naval Aviation achieve its mishap reduction goals. Previous HFQMB mishap reduction initiatives focused on flight mishaps aircrew related issues, however a recent shift to broaden the scope now puts attention on aircraft maintenance consequently maintainers. Baker (1998) developed, from a Maintainer s perspective, a Climate Assessment Survey (MCAS). The purpose of the MCAS was to provide a diagnostic tool to identify potential intervention areas from the perspective of maintenancerelated mishaps. This thesis seeks to provide a vehicle fostering the proliferation of the MCAS throughout the fleet by adapting it for the World Wide Web (WWW), developing a prototype Web site. A usability analysis was conducted to form a basis for future modification to the online version of the MCAS, 53
4 with the ultimate goal being an effective tool to promote the reduction of human factors related mishaps in Naval Aviation maintenance. DoD KEY TECHNOLOGY AREA: Other (Aviation Safety) KEYWORDS: MCAS, Aviation Maintenance Safety GLOBAL BROADCAST SERVICE REACH BACK VIA SATELLITE TACTICAL DIGITAL LINK J (S-TADIL J) Sra J. Fenton-Lieutenant Commer, United States Navy B.G.S., University of Kansas, 1986 Advisors: Rasler W. Smith, Department of Electrical Computer Engineering Rex A. Buddenberg, Information Systems Academic Group To meet the increasing need for additional wideb satellite capability within the Department of Defense, the Global Broadcast Service (GBS) is being developed. GBS is an asymmetric network providing up to 24 Mbps from the Satellite Broadcast Manager (SBM) to deployed forces via UHF Follow On (UFO) satellites during GBS Phase Two. The concept of Smart Push provides for most of the users needs but cannot anticipate every need or emerging needs of the user. The user through User Pull requires the ability to request information products from the SBM through existing communication paths. This capability is termed reach back. Due to the nature of operations, not as much information is sent back from operating forces to headquarters comms; therefore, less bwidth is required from deployed forces to headquarters comms. Reach back channels do not require as much bwidth as GBS. This research explores the viability of using Satellite Tactical Digital Link J (S-TADIL J), also known as Satellite Link 16, as a reach back option for GBS. DoD KEY TECHNOLOGY AREA: Comm, Control, Communications KEYWORDS: Global Broadcast Service, GBS, Link 16, Reach Back, Smart Push, User Pull, Satellite Tactical Digital Link J, S-TADIL J A DATA WAREHOUSE ARCHITECTURE FOR DoD HEALTHCARE PERFORMANCE MEASUREMENTS Jimmy E. Francis-Lieutenant, United States Navy B.S., Troy State University, 1990 M.S., Webster University, 1994 Advisors: Daniel R. Dolk, Information Systems Academic Group Gregory Hildebrt, Department of Systems Management In order to improve business practices access to healthcare related information within the Department of Defense s Healthcare System, a Performance Metrics Driven Decision Support System (PMDSS) framework has been designed using Data Warehouse technology. As part of this performance metricsdriven framework, this thesis defines a methodology to design, develop, implement, apply statistical analysis data mining tools to a Data Warehouse of healthcare metrics. With the DoD healthcare system undergoing significant changes, the ability for senior healthcare officials to have access to a wide range of management information in one central data repository can greatly enhance their decision making capabilities. This framework can be used as the foundation for moving DoD healthcare into the 21 st century. The major challenges involved in designing a data warehouse using this methodology are to identify the critical data needed to generate the data warehouse schema. The relevant data suggested in this thesis are healthcare performance metrics. Therefore, a team should be assembled that represents each functional 54
5 business area to identify the critical performance metrics. Once the data has been identified collected, it is straightforward to build a DSS for tracking performance metrics. The DSS consists of decision metrics, Geographical Information System (GIS), World-Wide Web Online Analytical Process (OLAP) tools, Data Mining statistics forecasting components. Finally, it is very important to select the right people proper tools, technology, equipment to construct a corporate data warehouse architecture using a PMDSS. DoD KEY TECHNOLOGY AREAS: Computing Software, Other (Data Warehousing) KEYWORDS: Data Warehouse, Data Marts, Healthcare Data Warehouse, Healthcare Metrics, Performance Measures A PERFORMANCE MEASUREMENT-BASED COMPANY OFFICER MANAGEMENT INFORMATION SYSTEM PROTOTYPE FOR THE UNITED STATES NAVAL ACADEMY Terry D. Hagen-Captain, United States Marine Corps B.S., United States Naval Academy, 1993 William T. Utroska-Major, United States Army B.S., University of Puerto Rico, 1989 Michael J. Boone-Lieutenant, United States Navy B.S., United States Naval Academy, 1993 Master of Science in Leadership Human Resource Development-September 1999 Advisors: Douglas E. Brinkley, Department of Systems Management Walter E. Owen, Department of Systems Management Daniel R. Dolk, Information Systems Academic Group A company officer at the United States Naval Academy (USNA) is tasked with developing midshipmen morally, mentally, physically, to imbue them with the highest ideals of duty, honor, loyalty. This task requires increased knowledge on performance measurement the right tool that will enhance their ability to develop midshipmen into the 21 st century. A performance-measurement-based management information system will greatly enhance the company officer s ability to develop, maintain, use information technology for purposes of performance measurement. Based on user requirements, this research identifies the key result areas key indicators, designs, develops a prototype. The Company Officer Management Information System (COMIS) prototype is developed using Microsoft Access 97, an approved Department of the Navy IT-21 compliant software application. The findings in this research strongly support the use of the COMIS prototype at the USNA indicate that future research future application development will significantly enhance the development of midshipmen well into the 21 st century. DoD KEY TECHNOLOGY AREAS: Computing Software, Human Systems Interface, Manpower, Personnel, Training, Other (Information Technology) KEYWORDS: COMIS, Database, Management Information System, Microsoft Access 97, Performance Measurement, Prototype 55
6 RSLES: AN ARCHITECTURAL IMPLEMENTATION OF A DECISION SUPPORT SYSTEM FOR OPTIMAL RECRUIT STATION LOCATION Dale E. Houck-Major, United States Marine Corps B.S.B.A., Shippensburg State College, 1983 Mark V. Shigley-Major, United States Marine Corps B.S., United States Naval Academy, 1985 Advisor: Daniel R. Dolk, Department of Systems Management Second Reader: Kevin R. Gue, Department of Systems Management This thesis describes a component-based methodology for developing a decision support system (DSS) for optimal location of military recruiting stations in regional recruiting markets. The DSS is designed to ensure that stations are selected that minimize cost for a given level of production. The interface allows users to perform what if analysis to determine if there are better locations to meet desired objectives. The Recruit Station Location Evaluation System (RSLES) integrates a user interface, a database, a GAMS optimizer model a geographic information system (GIS) mapping engine to provide a flexible environment that leverages operational recruiting, market analysis, demographic information for decision-making. DoD KEY TECHNOLOGY AREAS: Computing Software, Manpower, Personnel, Training KEYWORDS: Decision Support Systems, Geographic Information Systems, Application Development, Recruiting, Site Location REDESIGN OF ADVANCED EDUCATION PROCESSES IN THE UNITED STATES COAST GUARD Lamar V. Johnson-Lieutenant, United States Coast Guard B.S., Prairie View A&M University, 1992 Marc F. Sers-Lieutenant, United States Coast Guard B.S., United States Coast Guard Academy, 1989 Advisor: Mark E. Nissen, Department of Systems Management Second Reader: John S. Osmundson, Comm, Control, Communications, Computers, Intelligence Academic Group The processes used in the operation of the Coast Guard Advanced Education Program have evolved as most business processes that were developed prior to the introduction of information technology. These processes include the selection, management, assignment tracking of advanced education student. These processes are still fully dependent on physical files the mail system. The Coast Guard has an information technology infrastructure that supports better processes, however it is not being utilized in an integrated fashion. The objective of this thesis is to document the present processes apply Business Process Re-engineering techniques to identify avenues of change to improve critical measures of performance. Key findings include the lack of critical performance measures, present system billet officer codes do not identify job billets that require advanced education or personnel with advanced education, electronic submission of information could reduce cycle time facilitate decision-making in these processes. DoD KEY TECHNOLOGY AREAS: Computing Software, Manpower, Personnel, Training, Modeling Simulation 56
7 KEYWORDS: Information Infrastructure, Decision Support System, Business Process Re-engineering, Simulation WILL THE LOGISTICS MANAGEMENT DECISION SUPPORT SYSTEM MEET THE INFORMATION AND DECISION PROCESS REQUIREMENTS OF ITS USERS? Mark W. Krause-Commer, United States Naval Reserve B.S., United States Naval Academy, 1981 M.Ed., University of North Florida, 1989 Ellen M. Evanoff-Lieutenant Commer, United States Navy A.B., University of Chicago, 1987 Advisors: Donald R. Eaton, Department of Systems Management William J. Haga, Department of Systems Management The development of the Logistics Management Decision Support System (LMDSS) by the Naval Air Systems Comm (NAVAIR) has been on going since Originally conceived as a strategic Decision Support System (DSS), LMDSS has instead evolved into a Web portal for data analysts to access NAVAIR's Aviation Maintenance Material Management (AV-3M) data. LMDSS is more accurately described as a Web-based, Management Information System (MIS) than as a DSS. This research examines the information needs decision process requirements of LMDSS users. Focus groups, interviews, a Web-based survey were conducted to collect decision support data requirements from Fleet customers. User perceptions, feedback, recommendations to improve LMDSS are described analyzed. Historical insights into the development history of LMDSS are introduced as a lessons learned for future NAVAIR software teams. Problems identified by users are presented followed by specific recommendations for solutions. A prototype model developed for this thesis is found in the appendices as an example of how a modeling capability could enhance the ability of LMDSS to better support strategic, unstructured decisions. Recommendations are provided for future research. DoD KEY TECHNOLOGY AREAS: Computing Software, Modeling Simulation KEYWORDS: Logistics Management Decision Support System, LMDSS, NALDA, Decision Support Systems, Software Development UNITED STATES NAVY IMPLEMENTATION OF DEPARTMENT OF DEFENSE (DOD) PUBLIC KEY INFRASTRUCTURE (PKI) Christopher J. Michelsen-Major, United States Marine Corps B.A., Eastern Kentucky University, 1988 Advisor: Rex A. Buddenberg, Information Systems Academic Group Second Reader: John S. Osmundson, Comm, Control, Communications, Computers, Intelligence Academic Group Information assurance (IA) within DoD is becoming an increasingly difficult task as information resources are moving toward a web-based environment. To counter this problem, DoD is mating that all services implement DoD Public Key Infrastructure (PKI). DoD PKI is part of DoD s defense in depth strategy. It leverages the power of public key cryptography digital certificates to improve IA. The thesis begins with a presentation of background information on public/private key cryptography the elements of a PKI. The thesis then discusses those PKI management issues, i.e., CRLs directories, that an IT manager should consider when implementing a PKI. The thesis then outlines the three areas the Navy should focus on as it implements DoD PKI; specifically PKI implementation strategies, key distribution 57
8 alternatives, how to manage change. In response to the first two areas, the author recommends regionalization, based upon the NMCI architecture, smart cards, biometrics as answers. In response to the third area, the reader is provided with a discussion on managing change as it relates to the implementation of DoD PKI. The thesis is concluded with a discussion of what the Navy DoD needs to do in order to implement the ideas presented in this thesis. DoD KEY TECHNOLOGY AREA: Computing Software KEYWORDS: Public Key Infrastructure, Public Key Cryptography, Computer Security, Biometrics DIGITAL VIDEO IMAGERY AND WIRELESS COMMUNICATIONS FOR LAND-BASED RECONNAISSANCE MISSIONS James E. Munroe II-Captain, United States Marine Corps B.S., Cornell University, 1990 Arthur J. Pasagian-Captain, United States Marine Corps B.A., City University of New York, 1990 Advisors: Rudolph P. Darken, Department of Computer Science LtCol Terrance C. Brady, USMC, Department of Systems Management Information superiority is a critical element of warfare. The commer who makes good decisions executes these decisions at a superior tempo in the face of uncertainty constrained time, most often leads his forces to victory. The research presented in this thesis seeks to provide superior information to the Commer in a visual form. This thesis explores, analyzes, performs a proof-of-concept implementation for a real-time digital video reconnaissance system from forward locations to the rear using wireless communication. This thesis defines the requirements behind the implementation of the system identifies a prototype suite of equipment. It investigates emergent Commercial-Off-the-Shelf components to identify the equipment that satisfies the system requirements takes full advantage of current technological advances. Design selection is based on an evaluation of each component against criteria of minimum requirements selects the most compatible device. It performs an analysis of the prototype by evaluating system throughput used to transmit audio real-time video imagery. Results of this analysis suggest implementation of the prototype is feasible that it satisfies the information gathering process. DoD KEY TECHNOLOGY AREA: Comm, Control, Communications KEYWORDS: Reconnaissance, Wearable Computers, Digital Video Imagery, Real-Time Video, Wireless Communications Proof-of-Concept 58
9 PRELIMINARY ROADMAP FOR THE UNITED STATES MARINE CORPS PUBLIC KEY INFRASTRUCTURE Dan E. Morris-Major, United States Marine Corps B.S., Oklahoma State University, 1989 David W. Rowe-Captain, United States Marine Corps B.A., Northwestern University, 1990 Advisors: Cynthia E. Irvine, Department of Computer Science Daniel F. Warren, Department of Computer Science LtCol Terrance C. Brady, USMC, Department of Systems Management Over the last decade, the Marine Corps has capitalized on the advantages of the Internet by increasingly using the NIPRNET for electronic operations communications. The Marine Corps wants to further leverage the capabilities of the Internet by moving more applications to the NIPRNET, however, security threats have restricted the type of information that can be exchanged across public networks. The Internet s open design enables message interception, monitoring forgery; therefore, the Marine Corps is reluctant to use the Internet for transmitting sensitive information. Public key cryptography is becoming the foundation for electronic operations that require security authentication in open networks. The use of public key cryptography requires a Public Key Infrastructure (PKI) to publish manage public key values. The objective of a PKI is to provide authentication, confidentiality, integrity non-repudiation of data. In conjunction with DoD PKI development efforts, the Marine Corps will develop implement PKI services to protected information currently exchanged across the Internet to enable the use of automated applications. This thesis begins by describing public key cryptography, the requirements for a PKI, the components necessary to operate a PKI. Next, a preliminary USMC PKI roadmap is developed, including objectives strategies for Marine Corps implementation efforts. Supporting material describes design issues, such as scalability interoperability, technical challenges, such as directories, key escrow, smart cards. Finally, change management approaches are discussed, emphasizing unique cultural organizational requirements for mitigating resistance to a Marine Corps PKI implementation. DoD KEY TECHNOLOGY AREA: Computing Software KEYWORDS: PKI, Public Key Infrastructures, Computer Security, MCEN, Marine Corps Enterprise Network CAN THE MILITARY BENEFIT FROM CORPORATE USE OF STRATEGIC INFORMATION SYSTEM PLANNING? Stanley A. Mullen-Lieutenant Commer, United States Navy B.S., Savannah State University, 1987 Advisor: Kishore Sengupta, Information Systems Academic Group Second Reader: John S. Osmundson, Comm, Control, Communications, Computers, Intelligence Academic Group The Naval Construction Force, much like the Department of Defense, is adrift without a formal strategic plan for building an integrated information system. The purpose of this study is to explore discuss how Strategic Information System Planning (SISP) is used by corporate business to plan integrated information systems. The paper examines how SISP is used as a means of gaining competitive advantages by corporate business in the marketplace with a view of how it can benefit the military. In addition, this paper will examine business process improvement as a means of making processes more efficient prior to the development of an information system. This research targets the development of information systems by the Naval Construction Force. An ancillary objective of this thesis is to provide the Naval Construction 59
10 Force with a framework for developing integrated information systems. Throughout this research, the SISP methodology of Information Engineering will be used to make comparisons to corporate business that use this strategy applications within the Naval Construction Force. This methodology will also be used to determine if this strategy can be tailored to suite the needs of the Naval Construction Force in information system planning. DoD KEY TECHNOLOGY AREA: Other (Information System Planning) KEYWORDS: Strategic Information System Planning, Information Engineering, Business Process Improvement, Management Information Systems RESPONDING TO THE THREAT OF CYBERTERRORISM THROUGH INFORMATION ASSURANCE Joel G. Ogren-Major, United States Marine Corps B.S., Southwest State University, 1986 James R. Langevin-Lieutenant, United States Coast Guard Advisors: John S. Osmundson, Comm, Control, Communications, Computers, Intelligence Academic Group Timothy J. Shimeall, Department of Computer Science The number of people connecting to the Internet is growing at an astounding rate: estimates range from 100% to 400% annually over the next five years. This unprecedented level of interconnectedness has brought with it the specter of a new threat: cyberterrorism. This thesis examines the impact of this threat on the critical infrastructure of the United States, specifically focusing on Department of Defense issues the National Information Infrastructure (NII). A working of possible measures for countering the threat of cyberterrorism are discussed, infrastructure is provided. A number of possible measures for countering the threat of cyberterrorism are discussed, with particular attention given to the concept of information assurance. Information assurance dems that trustworthy systems be developed from untrustworthy components within power-generation systems, banking, transportation, emergency services, telecommunications. The importance of vulnerability testing (or red teaming) is emphasized as part of the concept of information assurance. To support this, a cyberterrorist red team was formed to participate in the Marine Corps Urban Warrior Experiment. The objective of this thesis is to address the impact of these issues from a Systems Management perspective. This includes taking into account the changes that must occur in order to improve the U.S. ability to detect, protect against, contain, neutralize, mitigate the effects of, recover from attacks on the Nation s Critical Infrastructure. DoD KEY TECHNOLOGY AREAS: Comm, Control, Communications, Computing Software, Electronics Warfare, Manpower, Personnel, Training, Other (Terrorism) KEYWORDS: Terrorism, Information Terrorism, Cyberterrorism, Information Infrastructure, Critical Infrastructure, Information Assurance, Information Warfare, Vulnerability Testing 60
11 A FUNCTIONAL ANALYSIS OF DOD IMPLEMENTATION OF SEAT MANAGEMENT David N. Rasmussen-Lieutenant, United States Navy B.A., University of New Mexico, 1992 Masters of Science in Information Technology Management-September 1999 Keith L. Ruegger-Lieutenant, United States Navy B.S., United States Naval Academy, 1991 Masters of Science in Information Technology Management-September 1999 Advisors: William J. Haga, Department of Systems Management Matthew S. Feely, Information Systems Academic Group This study explores the use of seat management as a method of overcoming the difficulty of procuring, managing maintaining information technology. Seat management, also known as desktop outsourcing, involves the acquisition management of all hardware software, desktop network management, operations management, support services technology refreshment into one concise contract managed by a vendor who specializes in IT. The findings of this functional analysis, focusing on seat management, total cost of ownership asset management, are reported. These findings show that seat management is not a panacea. But, when used in conjunction with sound management practices it can provide benefits to an organization. DoD KEY TECHNOLOGY AREA: Other (Information Systems) KEYWORDS: Seat Management, Desktop Outsourcing, Total Cost of Ownership A SIMULATION BASED STUDY YIELDING A FULL CHARACTERIZATION OF THE MISS- DISTANCE TOPOLOGICAL MANIFOLD FOR THE F/A-18 C/D, VARYING RANGE, ANGLE, WET VERSUS DRY CONDITIONS AND IR SIGNATURE (U) Alejro Rodriguez-Major, United States Marine Corps B.A., Golden Gate University, 1988 Advisors: Ronald J. Pieper, Department of Electrical Computer Engineering R. Clark Robertson, Department of Electrical Computer Engineering LtCol Terrance C. Brady, USMC, Department of Systems Management In today's technologically sophisticated battlefield, smart infrared (IR) missiles successfully employ sophisticated counter-countermeasure tracking algorithms to reduce the effectiveness of countermeasure flares expelled by target aircraft. Another countermeasure option available to aircraft designers is the employment of designs, which reduce the IR signature to make the aircraft less vulnerable. This thesis is a study of results from simulated engagements conducted with a preeminent IR modeling simulation package for one-on-one missile to aircraft engagements, the Modeling System for Advanced Investigation of Countermeasures (MOSAIC). The aircraft missiles chosen for this analysis were the F/A-18 C/D the Stinger (Basic), the SA-16, the AA-7D, respectively. For each set of conditions, e.g. aircraft altitude speed, missile, missile launch parameters, with or without flares, the simulation was run with a scaled IR signature in 10% increments from 100% down to 10%. For each engagement the miss distance between missile aircraft was recorded observations of any trends in this miss distance are presented. Additionally, a comparison of engagement results obtained with a simplistic IR signature model, the circular source model, a high definition model, the SPIRITS model, is conducted. DoD KEY TECHNOLOGY AREAS: Air Vehicles, Modeling Simulation KEYWORDS: MOSAIC, SPIRITS, Infrared Countermeasures (IRCM), Modeling, Simulation, Stinger, SA-16, AA-7D, F/A-18 C/D, Infrared (IR) Signature Reduction, Engine Thrust Reduction 61
12 DATABASE DESIGN AND IMPLEMENTATION FOR USMC MANPOWER RETENTION SURVEY Horace W. Smith-Major, United States Marine Corps B.A., University of the South, 1986 Advisors: Daniel R. Dolk, Information Systems Academic Group William J. Haga, Department of Systems Management MCERC is a database design implementation to support the survey instruments for the USMC Exit Retention Censuses, which are administered over the Internet. The Retention Census is a longitudinal survey administered annually to all Marines. A review of commercially available survey software revealed a lack of support for longitudinal surveys. A semantic object model for survey instruments is developed that relates them to the response data they collect. The resultant database schema facilitates version management of survey instruments over their lifecycle. The design supports the longitudinal aspect of the USMC Censuses by allowing the tracking of the instruments response data over time. A relational model of the database design is prepared implemented in Access. A user interface is designed using Visual Basic, which integrates Cognos Powerplay into the system for analysis of the data. The interface includes the capability to convert raw data into a matrix for analysis. Issues of database administration are discussed as they relate to scaling the system from a st-alone to a multiple-user environment. DoD KEY TECHNOLOGY AREA: Computing Software KEYWORDS: Database, Manpower Survey, Data Model, Longitudinal A CRITICAL EXAMINATION OF IT-21: THINKING BEYOND VENDOR-BASED STANDARDS Travis J. Trupp-Lieutenant, United States Navy B.S., Oregon State University, 1991 Advisors: Hemant K. Bhargava, Information Systems Academic Group Theodore G. Lewis, Department of Computer Science The Information Technology for the 21 st Century (IT-21) policy endorses the use of a Microsoft Windows NT-based PC in a client-server environment for all Navy computing needs. The rationale given for taking this vendor-based approach towards stards is that it will lower costs increase fleet-wide interoperability. This thesis takes a critical look at the IT-21 policy from an economic, security, availability, procurement, practical level, explores the role of vendor-based stards in the Navy computing architecture. It identifies the concerns or deficiencies of an architecture based on products or vendors, offers an alternative architecture that attempts to mitigate these concerns. It finds that a vendor-based stard will not necessarily increase interoperability, the selection of Microsoft as that stard could end up costing the Navy much more than anticipated. On first inspection, vendor-based stards make sense for the reduction of costs the increase in interoperability. However, this ignores the power that diversity gives the end user it ignores the pending disaster of single points of failure in Navy information systems. This thesis recommends a web-based, 3/n-tier client/server computing architecture such as one using Common Object Request Broker Architecture middleware the Extensible Markup Language for data presentation. This architecture should make it easier cheaper to maintain deploy applications, allow for the dynamic nature of IT, permit computer applications to communicate with one another no matter what operating system they are using. DoD KEY TECHNOLOGY AREA: Computing Software KEYWORDS: IT-21(Information Technology for the 21 st Century), Information Systems, Information Technology, Availability 62
13 NETWORK POLICY MANAGEMENT Paul A. Wetzel-Lieutenant Commer, United States Navy B.S., Texas A&M University, 1986 Advisors: Geoffrey G. Xie, Department of Computer Science Gilbert M. Lundy, Department of Computer Science Effective military commercial use of the Internet to conduct mission critical commerce-oriented transactions over shared networks is increasingly inhibited by the shortcomings of the very enabling technology of the Internet - the TCP/IP protocol. Without network performance, security other management controls, TCP/IP networks can't meet the overall requirements of a network. To complicate the network policy management issues, new applications are exchanging increasingly larger amounts of digital data (image, audio, video, etc.), some of them require stringent Quality-of-Service (QoS) measured by delay loss from the network. This places very diverse but deming requirements on the network in terms of bwidth, security data delivery. Research needs to be conducted that will assist network managers in identifying defining network policy resources. Network prioritization policy options, usage, advantages disadvantages have not been researched to the point where they are useful to the manager. There is a growing need for knowledge of management tools capable of running a new generation of applications over existing infrastructure. Policy-based network management can be broken into three areas: Security (strategies policies), QoS (differential integrated services, mechanisms implementation) Cost (multi, hybrid primary vendor strategies). Future networking initiatives will be developed based on these three policy areas. DoD KEY TECHNOLOGY AREA: Comm, Control, Communications KEYWORDS: Network, Policy, Management IMPROVEMENT OF THE U.S. MARINE CORPS COMBAT DEVELOPMENT SYSTEM Stephen M. Wilson-Major, United States Marine Corps B.S., University of Washington, 1988 Advisors: Barry Frew, Department of Systems Management Carl R. Jones, Information Systems Academic Group In this thesis, possible methods for improving the U.S. Marine Corps Combat Development System are introduced. The Combat Development System (CDS) is a system designed to produce integrated capabilities for the U.S. Marine Corps. A review of the CDS doctrinal implementation, such as orders as directives, actual implementation, through organizational visits personal interviews, highlight several possible methods for improving the CDS. Recommendations for improving the CDS include commercial government management techniques performance measurement models. A knowledge management (KM) study of British Petroleum a study of Microsoft are introduced as examples of how KM can improve CDS. Merging the two main information systems that support CDS is recommended to provide cost effort savings within Marine Corps Systems Comm Marine Corps Combat Development Comm. DoD KEY TECHNOLOGY AREAS: Comm, Control, Communications, Manpower, Personnel, Training, Materials, Processes, Structures KEYWORDS: Information Management, Change Management 63
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT AUTOMATING SUBMARINE TRAINING AND READINESS USING WEB-ENABLED APPLICATIONS Kevin S. Anderson-Lieutenant, United States Navy B.S., Jacksonville University,
Simulation and Training Solutions
Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,
Director of Intelligence Proposed Research Topics
Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
Technical Management Strategic Capabilities Statement. Business Solutions for the Future
Technical Management Strategic Capabilities Statement Business Solutions for the Future When your business survival is at stake, you can t afford chances. So Don t. Think partnership think MTT Associates.
COMBATSS-21 Scalable combat management system for the world s navies
COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,
Coordinated Operation Capability Using Scalable C2
Coordinated Operation Capability Using Scalable C2 Authors: Hüseyin KUTLUCA, İbrahim AKSU, Arda ÜNAL MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06800 ODTU Ankara / TURKEY [email protected] [email protected]
Providing On-Demand Situational Awareness
ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or
INTELLIGENCE AND HOMELAND DEFENSE INSIGHT
I N D U S T R Y INTELLIGENCE AND HOMELAND DEFENSE INSIGHT INTELLIGENCE AND HOMELAND DEFENSE CHALLENGES The Intelligence Community (IC) needs the right information, in real time, to make critical decisions.
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
ReMilNet Service Experience Overview
ReMilNet Service Experience Overview ReMilNet s knowledge across all functional service areas enables us to provide qualified personnel with knowledge across the spectrum of support services. This well
Department of Defense Fiscal Year (FY) 2016 President's Budget Submission
Department of Defense Fiscal Year (FY) 2016 President's Budget Submission February 2015 Defense Contract Management Agency Defense Wide Justification Book Volume 5 of 5 Research,, Test & Evaluation, Defense-Wide
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
Supply Chain Transformation Through AIT Convergent Technologies
Supply Chain Transformation Through AIT Convergent Technologies Dr. Kenneth A. Gabriel Senior Research Scholar And Director, Center for Integrated Security Logistics University of Maryland College Park,
SAIC Corporate and Small Business Introduction
SAIC Corporate and Small Business Introduction April 2016 Michael A. Townsend, Sr. Director, SBLO SAIC Small Business Development and Utilization Office SAIC. All rights reserved. SAIC Overview Leading
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
Space and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Business and Force Support Portfolio Industry Opportunities SSC Atlantic Small Business and Industry Outreach Initiative Gulf Coast Government Contractor
AeroVironment, Inc. Unmanned Aircraft Systems Overview Background
AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment is a technology solutions provider with a more than 40-year history of practical innovation in the fields of unmanned aircraft
Flexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
TechNet Land Forces South Small Business Opportunities. Carey Webster Director, Federal Information Solutions Deltek
TechNet Land Forces South Small Business Opportunities Carey Webster Director, Federal Information Solutions Deltek Agenda Review of Upcoming Opportunities for Small Businesses Army 8 Small Business Navy
Solve your toughest challenges with data mining
IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT INFORMATION SYSTEMS STRATEGIC PLANNING FOR KOSOVO PEACEKEEPING FORCE Nuh Altinsoy-First Lieutenant, Turkish Army B.S., Turkish Military Academy, 1996
Meeting Cyber Security Challenges
Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Business Intelligence Solutions for Gaming and Hospitality
Business Intelligence Solutions for Gaming and Hospitality Prepared by: Mario Perkins Qualex Consulting Services, Inc. Suzanne Fiero SAS Objective Summary 2 Objective Summary The rise in popularity and
Operation IMPACT (Injured Military Pursuing Assisted Career Transition)
Operation IMPACT (Injured Military Pursuing Assisted Career Transition) January 2013 Operation IMPACT Program Management Office Northrop Grumman Today Leading global security company providing innovative
Industry models for insurance. The IBM Insurance Application Architecture: A blueprint for success
Industry models for insurance The IBM Insurance Application Architecture: A blueprint for success Executive summary An ongoing transfer of financial responsibility to end customers has created a whole
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Health Solutions. Mission-Critical Support Across the Health Spectrum
Health Solutions Mission-Critical Support Across the Health Spectrum IT Experts Who Know Health, Health Experts Who Know IT Today s healthcare challenges are formidable: an aging population, lack of interoperability
Building Secure Cloud Applications. On the Microsoft Windows Azure platform
Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside
Solve Your Toughest Challenges with Data Mining
IBM Software Business Analytics IBM SPSS Modeler Solve Your Toughest Challenges with Data Mining Use predictive intelligence to make good decisions faster Solve Your Toughest Challenges with Data Mining
Information Technology Asset Management
Information Technology Asset Management HARDWARE SOFTWARE AND SERVICES AUBREY P. JONES, PMP DATA SYSTEMS ANALYSTS, INC SUMMARY Management of government/defense IT assets is an increasing target for cost
Data Management Practices for Intelligent Asset Management in a Public Water Utility
Data Management Practices for Intelligent Asset Management in a Public Water Utility Author: Rod van Buskirk, Ph.D. Introduction Concerned about potential failure of aging infrastructure, water and wastewater
Northrop Grumman White Paper
Northrop Grumman White Paper Business Analytics for Better Government Authors: Patrick Elder and Thomas Naphor April 18, 2012 Northrop Grumman Corporation Information Systems Sector 7575 Colshire Drive
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
Solving Agencies Big Data Challenges: PED for On-the-Fly Decisions
White Paper Solving Agencies Big Data Challenges: PED for On-the-Fly Decisions Carina Veksler, NetApp March 2012 WP-7158 ABSTRACT With the growing volumes of rich sensor data and imagery used today to
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Designing and Developing Portals
Designing and Developing Portals December, 2011 Larry Kunz Systems Documentation Inc. 1005 Slater Road Durham, NC 27703 USA [email protected] +1-919-354-1104 Contents Designing and Developing Portals...
The Challenge. Shipboard crew members need training because cadres are not expected to provide a long-term ConOps for UUV employment.
Enabling Effective & Efficient Fleet UMV Operational Training through Distributed USW Test & Training Technology Michael Kelf Senior Systems Engineer Maritime System Solutions Division SAIC G. Michael
Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength
Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
The State of DoD Biometrics
The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E [email protected] 1 Agenda What We ve Done Biometrics
NIST Cloud Computing Program Activities
NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing
Enterprise Capabilities Descriptions
1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC
Supply Chain Management and Value Creation
Supply Chain Management and Value Creation YAN Xi 1, KANG Canhua 2 School of Economics, Wuhan University of Technology, Wuhan 430070, China 1. [email protected], [email protected] Abstract: In recent
STRATEGIC SOURCING. Opportunities Exist to Better Manage Information Technology Services Spending
United States Government Accountability Office Report to Congressional Requesters September 2015 STRATEGIC SOURCING Opportunities Exist to Better Manage Information Technology Services Spending GAO-15-549
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:[email protected]
Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and
Ahead of the Curve with Intelligent. Transportation
Ahead of the Curve with Intelligent Transportation Advanced technologies to ensure the safe, efficient, and secure movement of passengers and freight. Intelligent transportation is changing the way America
Applying Business Architecture to the Cloud
Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support
The Information Technology Program Manager s Dilemma
The Information Technology Program Manager s Dilemma Rapidly Evolving Technology and Stagnant Processes Kathy Peake 26 Since inception, the Department of Defense s development of acquisition policies and
FACT SHEET. General Information about the Defense Contract Management Agency
FACT SHEET General Information about the Defense Contract Management Agency Mission: We are the independent eyes and ears of DoD and its partners, delivering actionable acquisition insight from the factory
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Delivering Business Intelligence with Open Source Software
Delivering Business Intelligence with Open Source Software WHITE PAPER by Chip Nickolett, Ingres Corporation Ingres Business Intelligence Series Table of Contents Preface...3 Balanced Scorecards...4 Business
OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations
DECISION SUPPORT SYSTEMS OR BUSINESS INTELLIGENCE. WHICH IS THE BEST DECISION MAKER?
DECISION SUPPORT SYSTEMS OR BUSINESS INTELLIGENCE. WHICH IS THE BEST DECISION MAKER? [1] Sachin Kashyap Research Scholar Singhania University Rajasthan (India) [2] Dr. Pardeep Goel, Asso. Professor Dean
Corporate Overview A
Corporate Overview A WHO WE ARE ManTech International Corporation uses advanced technology to help government and industry meet some of their greatest challenges and succeed in their most important endeavors.
Energy Management Solutions for a Better and Greener Government
Energy Management Solutions for a Better and Greener Government Better Facilities. Better Environments. Better Performance. From energy efficient buildings and green technology to new procurement processes
The Future of Census Bureau Operations
The Future of Census Bureau Operations Version 1.0 April 25, 2013 The Future of Census Bureau Operations Page ii [This page intentionally left blank] The Future of Census Bureau Operations Page iii Document
Forecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
NAS Fallon - A Top Gun Solution. Automated Fuels Management System - Naval Air Station Fallon, Nevada, U.S.A.
NAS Fallon - A Top Gun Solution Automated Fuels Management System - Naval Air Station Fallon, Nevada, U.S.A. Naval Air Station (NAS) Fallon is located in the high desert about 65 miles east of Reno, Nevada.
Enabling the SmartGrid through Cloud Computing
Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from
Industry models for financial markets. The IBM Financial Markets Industry Models: Greater insight for greater value
Industry models for financial markets The IBM Financial Markets Industry Models: Greater insight for greater value Executive summary Changes in market mechanisms have led to a rapid increase in the number
T a c k l i ng Big Data w i th High-Performance
Worldwide Headquarters: 211 North Union Street, Suite 105, Alexandria, VA 22314, USA P.571.296.8060 F.508.988.7881 www.idc-gi.com T a c k l i ng Big Data w i th High-Performance Computing W H I T E P A
THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION
THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION Joan Fowler and Robert C. Seate III Data Systems Analysts, Inc. 10400 Eaton Place, Suite 400 Fairfax, VA
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T I D C M a r k e t S c a p e : U. S. B u s i n e s s C o n s u l t i n g S e r v i c
Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare
CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is
White Paper Assured PNT Inside Military Ground Vehicles Using D3
White Paper Assured PNT Inside Military Ground Vehicles Using D3 Brian Paul December 2013 Introduction Global Positioning System (GPS) technology has become an integral part of Mission Command systems
Information Technology in Transportation Key Issues and a Look Forward
A5003: Committee on Information Systems and Technology Chairman: Jeffrey L. Western Information Technology in Transportation Key Issues and a Look Forward JEFFREY L. WESTERN, Wisconsin Department of Transportation
The IBM Cognos Platform
The IBM Cognos Platform Deliver complete, consistent, timely information to all your users, with cost-effective scale Highlights Reach all your information reliably and quickly Deliver a complete, consistent
Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
WHITEPAPER. Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk
WHITEPAPER Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk Overview Angoss is helping its clients achieve significant revenue growth and measurable return
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Management Information Systems (MIS)
Management Information Systems (MIS) 1 Management Information Systems (MIS) Courses MIS 0855. Data Science. 3 Credit Hours. We are all drowning in data, and so is your future employer. Data pour in from
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and
The future of range instrumentation.
ROCKWELL COLLINS Common Range Integrated Instrumentation System (CRIIS) The future of range instrumentation. A proven solution for accurately testing next-generation weapon systems. The speed and accuracy
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track
MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track In recent years Microsoft s MCSE programs has established itself as the premier computer and networking industry certification. For the Windows 2003
Advanced Integrated Technologies, LLC
Advanced Integrated Technologies, LLC Anchor Innovation, Inc. BAE Systems Technology Solutions & Services Barbaricum LLC Bowie State University Camber Corporation Installation, Shipboard Systems and Equipment,
MASTER OF SCIENCE IN OPERATIONS RESEARCH
MASTER OF SCIENCE IN OPERATIONS RESEARCH AN EXPLORATORY ANALYSIS OF WATER FRONT FORCE PROTECTION MEASURES USING SIMULATION Matthew D. Childs-Lieutenant Commander, United States Naval Reserve B.S., United
M2M transforms an industry: evolution of heavy equipment and dispersed assets
M2M transforms an industry: evolution of heavy equipment and dispersed assets Whitepaper April 2013 Steve Hilton Executive summary Enterprises with heavy equipment and dispersed assets are competing in
IAI/Malat Solutions for the Maritime Arena
IAI/Malat Solutions for the Maritime Arena Any country with a proximity to the sea has an important operational need to positively and unambiguously identify, in time, threats that originate in the maritime
Tactical Targeting Network Technology and Connectivity. Provided by Rockwell Collins
Tactical Targeting Network Technology and Connectivity Provided by Rockwell Collins Tactical Targeting Network Technology (TTNT) is a waveform technology based on the Joint Airborne Network-Tactical Edge
Developing Fleet and Asset Tracking Solutions with Web Maps
Developing Fleet and Asset Tracking Solutions with Web Maps Introduction Many organizations have mobile field staff that perform business processes away from the office which include sales, service, maintenance,
Big Data Challenges and Success Factors. Deloitte Analytics Your data, inside out
Big Data Challenges and Success Factors Deloitte Analytics Your data, inside out Big Data refers to the set of problems and subsequent technologies developed to solve them that are hard or expensive to
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
AUDIT REPORT. Follow-up on the Department of Energy's Acquisition and Maintenance of Software Licenses
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Follow-up on the Department of Energy's Acquisition and Maintenance of Software Licenses DOE/IG-0920
Development, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
