Quick message to the company
Aerospace and Defense Reports
Courses, Training and Workshops
Want a special report? Please send me a message.
Aerospace and Defense Reports
Wharton School's knowledge source on Aerospace and Defense industry.
DEFENSE DEPARTMENT IS NOW USING WIKIS FOR SENSITIVE INFORMATION
The National Cyber Security Center (NCSC), a division of the
Department of Homeland Security, will deploy a wiki to help federal
agencies better collaborate on cybersecurity,
according to an article in InformationWeek.
A wiki is a website that easily allows multiple users to add and edit content. The agencies collaborating on the wiki include the U.S. Computer Emergency Readiness Team, the FBI's National Cyber Investigative Joint Task Force and the Defense Department's Joint Task Force-Global Network Operations.
Want more? Click here.
The U.S. military's operations depend on the timely and efficient movement of supplies and equipment around the world, whether the country is at war or conducting peacetime operations. Radio frequency identification tags (RFID) -- basically wireless bar codes -- are quickly becoming the standard to track and manage the military supply chain.
The wars in Iraq and Afghanistan, and the pressure they place on the supply chain, have put the spotlight on RFID technology. The Pentagon just placed a $6.6 million order with Lockheed Martin's Savi unit for RFID tags to track and manage supplies on their way to the battlefield. Savi's RIFD technology can be embedded into supplies or equipment during production or attached externally.
Read more? Go here.
Just about 2% of the more than $3.5 billion in integrated circuits the Pentagon purchases annually to control its military gear is manufactured in facilities secured by American companies, according to an article in The New York Times.
That's a big concern for cybersecurity experts, and current and former military planners who worry that malicious code, called Trojan horses, can easily be embedded within the circuitry and triggered at will to render weapons and communications systems useless or uncontrollable at critical moments.
Get more? Go here.
The mission is to promote the widespread use of systems engineering (SE) in the Department of Defense (DoD) acquisition process in order to achieve affordable and supportable weapon systems that meet the needs of the military users. To provide a forum for the open exchange of ideas and concepts between government, industry and academia. To develop a new understanding of a streamlined SE process.
NDIA SYSTEM ENGINEERING DIVISION
|The SE Division is supported by Mr. Stephen P. Welby, Director, Systems Engineering, in the Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics. The Systems Engineering directorate is responsible for all matters relating to DoD
major program acquisition systems engineering, software engineering,
systems assurance, and systems of systems engineering.
The directorate includes the offices of Major Program Support, Mission Assurance, and System Analysis, with responsibilities in acquisition program support and oversight, systems engineering policy and guidance, human capital, software acquisition management and engineering, system integration, and government-industry collaboration.
|The directorate's 2010 focus area include workforce development, early systems engineering, simplifying defense acquisition guidance, and promoting best systems engineering practices to reduce risk.|
|Graphic representations of a system used to help visualize
complex functional and data requirements of the system engineering
Custom graphical representations can be developed to meet unique requirements of the system.
|Many executives are too busy to read
lengthy reports or to understand a highly technical short report.
They need briefs in plain English to help them to make timely
decisions in systems engineering or meeting compliance
requirements in a multi-priority environment. These briefs can come
in either as a hardcopy or PowerPoint slides. The trend shows
that more and more executives opt for the PowerPoint slides.
One example is the presentation I prepared for the DISA chief for system engineering discussion on vulnerabilities and Service Level Agreements. As a result, I contributed to the first and later versions of the NECC SLA Template.
I write, edit and speak on a wide range of IT technologies and networking topics geared to specific needs of enterprise stakeholders -- users, developers, engineers, business analysts and executives. They include:
Service Level Agreement
NECC Annex to SLA Template
|A DISA chief invited me to send him my
PowerPoint slides on performance metrics for system engineering discussion with his team
and then to contribute to the first and later versions of the NECC
Annex to the SLA Template.
He discovered my Web article on "Mitigate risks with vulnerabilities with a SLA guarantee" and thought it was a "great one!"
Want more? Read on.
The NECC is the Department of Defense’s (DoD’s) principal command and control (C2) capability focused on providing the Warfighter with the data and information needed to make timely, effective and informed decisions. Commanders use NECC to adapt rapidly to changing mission needs by defining and tailoring their information environment and drawing on capabilities that enable the efficient, timely and effective command of forces and control of engagements.
Three main RFID applications for military use are: Supply in the
Chain, Asset Tracking and Security. Each application must come with a
SLA guarantee to help the military to track supplies in the most
Integration of RFID data with key applications, such as those for IT infrastructure and help desk management, can help to bring significant increases in SLA compliance, IT infrastructure responsiveness, and unplanned downtime. For this reason, performance metrics and vulnerability mitigation are some important aspects of the SLA to ensure guaranteed high uptime availability.
Training and Workshops
RFID IN THE SUPPLY CHAIN
|As of January 1, 2007 DoD required RFID tagging for all manufacturers and supplier who have new contacts issued with the appropriate contract clause. We need to address what the issues of integrating with enterprise systems are, what the EPC classes are, what RFID security concerns we have other than privacy issues, how RFID technology would contribute to Defense in depth as it matures, what other RFID standards we should have and what the current status of the DoD mandate is.|
Details: Send a message
|This online course is available on the IEEE website. The professional engineers will learn how to apply the concept of Risk
Management to your business or your organization in order to prevent
your exposure to the risks of loss due to the various risk factors
that are involved in any engineering disciplines:
You will also learn how to use various controls in order to mitigate the severity of losses when they do occur. This course is grouped into six topics. They are professional liability, risk identification and evaluation, loss prevention (including quality management) and loss control, new business (adjusting to change), contracts, and documentation.To sign up for this course, Click here
In the Americas
Rest of the World
soup-to-nuts guide for painless RFID implementation in the supply chain
Giving organizations the ability to track,
secure, and manage items from the time they are raw materials through the
live-cycle of the product, radio frequency identification (RFID) makes
internal processes more efficient and improves overall supply chain
Helping you bring your organization into the future,
RFID in the Supply chain:
A Guide to Selection and Implementation
explains RFID technology, its applications in SCM, data storage and retrieval, business processes, operational and implementation problems, risks, security and privacy, facility layout, handling systems and methods, and transportation costs.
In short, with its soup-to-nuts coverage, the book ensures that your RFID implementation is successful and that you get the most from your investment.
Provides a comprehensive education about the hardware, software, and other aspects required to deploy RFID
Presents compelling reasons for transitioning to RFID technology and an overview of the RFID market
Reviews supply chain trends to provide a backdrop for the balance of the program
Discusses costs and selection guidelines to support assessment of the value proposition
|Learn more||How to buy|
DISA NECC Service Level Agreements (SLA) Template
√ Contributed to first and later versions
√ Subcomponent of the NECC Developer's Handbook
Mitigate risks for vulnerability with a SLA guarantee
√ Performance metrics beyond Application Vulnerability Description Language (ADVL)
√ Great Web article!
Cyber-guerilla networking: Recognizing and battling your enemy
√ Required reading for a graduate course
RFID in the Supply Chain: A Guide to Selection and Implementation
√ A soup-to-nuts guide for painless RFID implementation in the supply chain
√ Order book here
√ Read it in the Supply and Demand Executives magazine
Risk Management for Engineers
√ Widely-acclaimed online course coming soon!
|Home||Service Level Agreement Guarantees||Systems Engineering||Aerospace and Defense Reports||Training Workshops||Technical Documentation|