Achieving Effective Acquisition Of Information Technology In The Department Of Defense PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download Achieving Effective Acquisition Of Information Technology In The Department Of Defense PDF full book. Access full book title Achieving Effective Acquisition Of Information Technology In The Department Of Defense.

Achieving Effective Acquisition of Information Technology in the Department of Defense

Achieving Effective Acquisition of Information Technology in the Department of Defense
Author: National Research Council
Publisher: National Academies Press
Total Pages: 164
Release: 2010-07-01
Genre: Technology & Engineering
ISBN: 0309148286

Download Achieving Effective Acquisition of Information Technology in the Department of Defense Book in PDF, ePub and Kindle

In the military, information technology (IT) has enabled profound advances in weapons systems and the management and operation of the defense enterprise. A significant portion of the Department of Defense (DOD) budget is spent on capabilities acquired as commercial IT commodities, developmental IT systems that support a broad range of warfighting and functional applications, and IT components embedded in weapons systems. The ability of the DOD and its industrial partners to harness and apply IT for warfighting, command and control and communications, logistics, and transportation has contributed enormously to fielding the world's best defense force. However, despite the DOD's decades of success in leveraging IT across the defense enterprise, the acquisition of IT systems continues to be burdened with serious problems. To address these issues, the National Research Council assembled a group of IT systems acquisition and T&E experts, commercial software developers, software engineers, computer scientists and other academic researchers. The group evaluated applicable legislative requirements, examined the processes and capabilities of the commercial IT sector, analyzed DOD's concepts for systems engineering and testing in virtual environments, and examined the DOD acquisition environment. The present volume summarizes this analysis and also includes recommendations on how to improve the acquisition, systems engineering, and T&E processes to achieve the DOD's network-centric goals.


Achieving Effective Acquisition of Information Technology in the Department of Defense

Achieving Effective Acquisition of Information Technology in the Department of Defense
Author: National Research Council
Publisher: National Academies Press
Total Pages: 164
Release: 2010-06-01
Genre: Technology & Engineering
ISBN: 0309156467

Download Achieving Effective Acquisition of Information Technology in the Department of Defense Book in PDF, ePub and Kindle

In the military, information technology (IT) has enabled profound advances in weapons systems and the management and operation of the defense enterprise. A significant portion of the Department of Defense (DOD) budget is spent on capabilities acquired as commercial IT commodities, developmental IT systems that support a broad range of warfighting and functional applications, and IT components embedded in weapons systems. The ability of the DOD and its industrial partners to harness and apply IT for warfighting, command and control and communications, logistics, and transportation has contributed enormously to fielding the world's best defense force. However, despite the DOD's decades of success in leveraging IT across the defense enterprise, the acquisition of IT systems continues to be burdened with serious problems. To address these issues, the National Research Council assembled a group of IT systems acquisition and T&E experts, commercial software developers, software engineers, computer scientists and other academic researchers. The group evaluated applicable legislative requirements, examined the processes and capabilities of the commercial IT sector, analyzed DOD's concepts for systems engineering and testing in virtual environments, and examined the DOD acquisition environment. The present volume summarizes this analysis and also includes recommendations on how to improve the acquisition, systems engineering, and T&E processes to achieve the DOD's network-centric goals.


Department of Defense Policies and Procedures for the Acquisition of Information Technology

Department of Defense Policies and Procedures for the Acquisition of Information Technology
Author:
Publisher: DIANE Publishing
Total Pages: 109
Release: 2009-11
Genre: Technology & Engineering
ISBN: 1437917151

Download Department of Defense Policies and Procedures for the Acquisition of Information Technology Book in PDF, ePub and Kindle

This report examines the challenges facing the DoD in acquiring information technology (IT) and offers recommendations to improve current circumstances. The fundamental problem DoD faces is that the deliberate process through which weapon systems and IT are acquired does not match the speed at which new IT capabilities are being introduced in today¿s information age. Consequently, the principal recommendation of the study is that DoD needs a new acquisition system for IT. Roles and responsibilities for those involved in the acquisition process must be clarified and strengthened and the IT system acquisition skills required in the workforce must also be strengthened. Illustrations.


Information Technology

Information Technology
Author: Randolph C. Hite
Publisher: DIANE Publishing
Total Pages: 43
Release: 2010
Genre: Computers
ISBN: 1437923925

Download Information Technology Book in PDF, ePub and Kindle

The DoD¿s acquisition of weapon systems and modernization of business systems have both been on a list of high-risk areas since 1995. To assist DoD in managing software-intensive systems, Section 804 of the Bob Stump Nat. Defense Authorization Act for FY 2003 required the Office of the Sec. of Defense and DoD component organizations, including the military departments, to undertake certain software and systems process improvement actions. This report assessed: (1) the extent to which DoD has implemented the process improvement provisions of the act; and (2) the impact of DoD's process improvement efforts. Includes recommendations. Charts and tables.


Creating a DoD Strategic Acquisition Platform

Creating a DoD Strategic Acquisition Platform
Author: Ronald Kerber
Publisher: DIANE Publishing
Total Pages: 47
Release: 2009-11
Genre: Technology & Engineering
ISBN: 1437917186

Download Creating a DoD Strategic Acquisition Platform Book in PDF, ePub and Kindle

The U.S. must be prepared to respond to a broad set of national security missions, both at home and abroad. Yet many deficiencies exist in defense capabilities need to support these missions -- systems are aging and technologies are becoming obsolete. Fixing the DoD acquisition process is a critical national security issue -- requiring the attention of the Sec. of Defense. DoD needs a strategic acquisition platform to guide the process of equipping its forces with the right materiel to support mission needs in an expeditious, cost-effective manner. The incoming leadership must address this concern among its top priorities, as the nation¿s military prowess depends on it. This report offers recommendations for rebuilding the defense acquisition process.


Industrial Methods for the Effective Development and Testing of Defense Systems

Industrial Methods for the Effective Development and Testing of Defense Systems
Author: National Research Council
Publisher: National Academies Press
Total Pages: 102
Release: 2012-01-27
Genre: Technology & Engineering
ISBN: 0309222737

Download Industrial Methods for the Effective Development and Testing of Defense Systems Book in PDF, ePub and Kindle

During the past decade and a half, the National Research Council, through its Committee on National Statistics, has carried out a number of studies on the application of statistical methods to improve the testing and development of defense systems. These studies were intended to provide advice to the Department of Defense (DOD), which sponsored these studies. The previous studies have been concerned with the role of statistical methods in testing and evaluation, reliability practices, software methods, combining information, and evolutionary acquisition. Industrial Methods for the Effective Testing and Development of Defense Systems is the latest in a series of studies, and unlike earlier studies, this report identifies current engineering practices that have proved successful in industrial applications for system development and testing. This report explores how developmental and operational testing, modeling and simulation, and related techniques can improve the development and performance of defense systems, particularly techniques that have been shown to be effective in industrial applications and are likely to be useful in defense system development. In addition to the broad issues, the report identifies three specific topics for its focus: finding failure modes earlier, technology maturity, and use of all relevant information for operational assessments.


Department of Defense's Information Technology Capabilities

Department of Defense's Information Technology Capabilities
Author: Nicholas B. Hudson
Publisher: Nova Science Publishers
Total Pages: 0
Release: 2012
Genre: Information technology
ISBN: 9781613243046

Download Department of Defense's Information Technology Capabilities Book in PDF, ePub and Kindle

This book provides an update on the Department of Defense's (DODs) progress toward developing a new acquisition process for information capabilities and discusses the time frame for implementation. Also discussed are the legislative changes that will be required to fully implement the new acquisition process. As a first step, initial phases will focus on DoD business systems and will leverage provisions within existing statutory authorities to accelerate information capability delivery. Future phases will incorporate lessons learned and may require new legislation in a number of areas, including changes to the requirements process, the Planning, Programming, Budgeting and Execution process, as well as the processes used to conduct acquisition and contracting as they relate to information technology.


Arguments that Count

Arguments that Count
Author: Rebecca Slayton
Publisher: MIT Press
Total Pages: 338
Release: 2013-08-16
Genre: Technology & Engineering
ISBN: 0262316544

Download Arguments that Count Book in PDF, ePub and Kindle

How differing assessments of risk by physicists and computer scientists have influenced public debate over nuclear defense. In a rapidly changing world, we rely upon experts to assess the promise and risks of new technology. But how do these experts make sense of a highly uncertain future? In Arguments that Count, Rebecca Slayton offers an important new perspective. Drawing on new historical documents and interviews as well as perspectives in science and technology studies, she provides an original account of how scientists came to terms with the unprecedented threat of nuclear-armed intercontinental ballistic missiles (ICBMs). She compares how two different professional communities—physicists and computer scientists—constructed arguments about the risks of missile defense, and how these arguments changed over time. Slayton shows that our understanding of technological risks is shaped by disciplinary repertoires—the codified knowledge and mathematical rules that experts use to frame new challenges. And, significantly, a new repertoire can bring long-neglected risks into clear view. In the 1950s, scientists recognized that high-speed computers would be needed to cope with the unprecedented speed of ICBMs. But the nation's elite science advisors had no way to analyze the risks of computers so used physics to assess what they could: radar and missile performance. Only decades later, after establishing computing as a science, were advisors able to analyze authoritatively the risks associated with complex software—most notably, the risk of a catastrophic failure. As we continue to confront new threats, including that of cyber attack, Slayton offers valuable insight into how different kinds of expertise can limit or expand our capacity to address novel technological risks.