SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
IT Acquisition Advisory Council
                       Solution Architecture Innovation Lab




Acquisition Roadmap for Cloud Computing and
Consolidated IT Infrastructure
Assuring IT Program Outcomes through Decision Analytics; measuring the
business value of emerging technologies, innovations, and lessons learned.


“Weapons systems depend on stable requirements, but with IT, technology changes faster than the
requirements process can keep up," he said. "It changes faster than the budget process and it changes
faster than the acquisition milestone process. For all these reasons, the normal acquisition process does
not work for information technology.” DepSec Bill Lynn statement at the IT-AAC Defense IT
Acquisition Summit




                                                                                                           John Weiler
                                                                                                     IT-AAC, Vice Chair
                                                                                     A not-for-profit research institute
                                                                                             John.Weiler@IT-AAC.org
                                                                                                       www.IT-AAC.org
                                                                                                          703 768 0400
IT-AAC Knowledge Network


                 “A knowledgeable & conflict free Community of
                      Practice bring forward proven methods,
                     expertise and innovations to empower the
                        Federal IT Acquisition Ecosystem”
                 Honorable Mike Wynne, 21st AFSEC, Co-Founder and Chairman
                                      Emeritus, IT-AAC




“Together, these steps will help to catalyze a fundamental reform of Federal IT, which is essential to improving
          the effectiveness and efficiency of the Federal Government” White House, OMB Director

                                             ICHnet.org Company Confidential
Cloud Acquisition Challenge
                                                  We are delivering yesterdays technology tomorrow

                                        We are in early stages of Wave 3 information technology
                                        Mainframe and Client-Server waves remain in place                    3. Internet - Cloud
       Information Driven Capability




                                        Waves represent many co-dependent technologies,                            • Virtualized compute; global
                                                                                                                      network enabled, plug & play
                                         matured over time
                                                                                                                    • IT Infrastructure decoupled from
                                        Adding functional capability has                                             Applications
                                         become easier with each new wave                                           • COTS & OSS Integration,
                                                                                                                      Software as a Service
                                        But enterprise infrastructure     2. Client/Server - Decentralized
                                         gaps & vulnerabilities have               • PC enabled and network
                                         become more critical                      • Software distributed in both server and client
                                                                                     computers
                                                                                   • Heavy focus on software development and point to
                                                                                     point integration
                                                    1. Centralized - Mainframe
                                                          • Central computer center, slow turn around
                                                          • One size fits all
                                                          • Limited reuse of application modules
                                          1950     1960       1970       1980       1990         2000        2010       2020
                                                                  Information Technology Evolution

Innovations of the market and benchmarked best practices are invisible to the Defense Industrial Complex
                                                                           ICHnet.org Company Confidential
Overcoming the Acquisition Challenges
                                     We are buying yesterdays technology …. tomorrow
1.   Good laws, poor enforcement: Clinger Cohen Act, Public Law 104-113, and FAR FFRDC use restrictions have prevented
     adoption of innovative solutions and IT standards of practices which should drive establishment of shared IT infrastructure
     (SOA);
        A robust set of Acquisition Processes are available but not visible to Defense Industrial Complex, requiring a true public/private
         partnership like IT-AAC that is not vested in the status quo. Title 10 and lack of strong governance impede long term funding of
         infrastructure and drive “Big Bang” stove pipes. New rules needed for SOA ConOps.

2.   CULTURE: 15 years of IT reform efforts have fallen short, with only minor changes to current MilSpec methods. (DODAF,
     JCIDS, NESI, LISI) compete with standards and orthogonal to Benchmarked Industry Best Practices.
        IT-AAC communities are uniquely dedicated streamlining IT Architecture and Acquisition Processes, structured to establish
         standards of practices. ICH’s “clearinghouse” of proven methods and decision tools represent the CMMi of IT Acquisition.

3.   INCENTIVES: Traditional SIs and FFRDCs are insulated from commercial IT innovations and vested in status quo. DoD needs an
     organic, conflict free mechanisms for tapping innovations of the market, commercial expertise, and real world lessons learned.
        IT-AAC brings a world of innovation, expertise and knowledge that has proven to drive successful outcomes. IT-AAC membership
         are CONFLICT FREE & inclusive of innovative businesses, universities, SDOs, think tanks and research institutes.

4.   PROCESS: Both CCA and Sec804 will require revamping of IT Requirements, Architecture, Tech Assessment and Decision
     Support Processes. Any new process should have both govt/industry buyin, conform to OMB A119 and reflect a proven vs new
     MilSpec.
        IT-AAC partnership brings to market a collaborative structure for the IT Acquisition community. Its 2 year effort has already created
         agency proven methods based on commercial best practices.

5.   PEOPLE: IT Acquisition Ecosystem untrained and lack IT knowledge to make sound decisions; Lack of clear metrics and
     incentives put focus on compliance vs outcomes
        ICH’s structured to establish standardized IT performance metrics (MOEs) and Service Level Agreements (SLAs) across the
         acquisition lifecycle and validated by benchmarked best practices. Partnership with SDOs and large corporate users provide
         needed expertise to enable sound decision making.

                                                                ICHnet.org Company Confidential
OMB’s CSFs For Cloud Acquisition
 Efficiency: assess to what degree existing infrastructure services, technologies and platforms that can be
  reconfigured into a new Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and/or Software as a
  Service (SaaS)

 Agility: Streamlined Acquisition Strategy should conform to CCA, and establish a common set of services that are
  assessable via an open interface.

 Innovation: Establish a shared innovation lab that enables rapid assessment of emerging technologies. Break
  down acquisitions into small modules of that can be rapidly configured and deployed. Leveraging existing sources of
  evidence, testing and implementation results.

 Security: The cloud solution must be sufficiently secure A SaaS solution is flexible and could be configured to
  securely manage access, sovereignty, and data retention requirements

 Market availability: A IaaS solution is able to meet all of the requirements including the ability to standardize core
  data model, compatibility with handheld devices, and real-time integration with legacy systems

 Government readiness: The PM must have experienced IT Acquisition Professionals and means of implementing
  new technologies, have a culture that supported experimentation and improvement, and possessed the skills and
  capacity to manage the transition well

 Technology lifecycle: must align with the acquisition process to accommodate the fast paced market. IT-AAC
  provides a clearinghouse of innovative solutions and sources of past performance



                                                   ICHnet.org Company Confidential
Acquisition Assurance Method (AAM)
     mitigates risk while taping innovations of the market


Cloud Investments must Align the Acquisition Process with
 the Technology Cycle.

Point 13. Design and develop a cadre of specialized IT acquisition
 professionals .

Point 14. Identify IT acquisition best practices and adopt government-wide.

Point 15. Issue contracting guidance and templates to support modular
 development

Point 16. Reduce barriers to entry for small innovative technology
 companies



                                ICHnet.org Company Confidential
IT-AAC Accelerates & Assures Acquisition Decisions
                          leveraging innovations and benchmarked best practices
IT-AAC Partnership brings forth wide range of IT expertise need to mentor PMs:
 Governance and Oversight: how an enterprise supports, oversees and manages IT programs and on-going portfolio. SOA as
   defined in the commercial market is governance tool not technology. DoD5000 and BCL represent the current approaches.

 Decision Analytics: enables effective Program Management and Value Stream Analysis execution. As most of these sub-
   processes are designed to improve decision making, a relative new discipline has evolved (since 86), that addresses the human and
   cultural challenges in decision making. Decision Analytics is the discipline of framing the essence and success criteria of each gate in
   the acquisition lifecycle. It brings focus to the high risk areas of a program, and reduces analysis/paralysis.

 Capability Specification: Actionable requirements must be constrained by the realm of the possible. With pressures to do more
   with less, we must embrace mechanisms that force a relative valuation/impact of the gap/capability, with clearly defined outcomes

 Solution Architecture: This is one of the most critical elements of the acquisition lifecycle, as it should represent all stake holder
   agreements. The market embrace of SOA is not about technology, but a refocusing of the EA on service level management and data.
   A good architecture is a lexicon that links requirements, technologies and acquisition strategy.

 Technology Assessment: Understanding the limitation of technology early in the process is key. Without a clear view of the “realm
   of the possible” validated by real world results, we often find ourselves in high risk areas and over specification. Market research must
   be done early to help users constrain requirements and embrace the inherent business practices that codify . Recognizing that 70% make
   up of every IT application is vested in IT infrastructure (netcentric, cloud, SOA), it is critical to establish a common
   infrastructure/infrastructure standard by which all applications can share. The most prolific is ITIL to date.

 Business Case Analysis: Demonstrating the business value of technology investments, based on evidenced based research and
   lifecycle cost. This is a core requirement of Clinger Cohen Act.

 Procurement and Contracting: Software as a Service and SOA portent a new dynamic for acquisition of IT (health IT, cyber,
   business systems), that brings focus to Service Level Agreements (SLAs), Software as a Service (SaaS) and SL Management. If the
   previous activities do not directly feed the acquisition strategy or provide mechanisms for contractor accountability, all is lost.



                                                           ICHnet.org Company Confidential
AAM Aligns and Validates Architectures
                                 Business & Infrastructure Needs with Innovative Solutions
                                                                          Reference Models                Associated Metrics

                  Business Driven Top Down   BRM
                                             Business     Core Business
                                                                                                          Performance Metrics
                                             Drivers &    Mission Objectives
User/Integrator                              Metrics
Best Practices                               (BRM/OV)     Business
                                                          Processes &
                                                          Infrastructure                                     Security Profiles




                                                                                                                                     Aligns with business needs
                                                                                                                                     SAIL Solution Frameworks
                                                                                                          Effectiveness/Efficiency
                                             Service
                                             BRM        Appl Service
  AAM                                        Components Components
                                                        Layer 1
 Service                                     & Metrics
                                             (SRM/SV) Infrastructure
Component
                                                        Service Components
                                                          Layer N                                           Common Criteria



                                             Technical
                                             BRM          Application
                                                                                                             Interoperability,
                                                                                                                Fit, Finish
   Vendor                                    Solution &   Layer 1
   Solution
  Templates                                  Metrics
                                                          Common
                                             (TV, TRM)    Infrastructure
                                                          Layer M                                         Secure Solutions
                                                                        ICHnet.org Company Confidential
IT-AAC Capabilities Accelerate Success
                                           leveraging what works

 1. Non-profit free think tank composed of the worlds most respected public service institutes and domain experts not
    available through traditional contracting mechanisms

 2. Innovation Clearinghouse and Knowledge Exchange that captures proven market innovations in an acquisition
    ready context (canonical form)

 3. Benchmarked Best Practices and Lessons Learned (SOA, Cloud, IaaS, PaaS, SaaS, Web Services) provided
    by customers who share business value from real world implementation and testing results

 4. Acquisition Decision Framework that pools and normalizes infrastructure requirements, architectures, tech
    assessments, performance metrics (SLAs) business case analysis, and evaluation criteria.

 5. Leadership Roundtables and Educational Forums that provides a hype free interchange with government and
    industry leaders

 6. Virtual Solution Architecture Integration Lab (SAIL) and Solution Architecture Working Groups (SAWG), that
    detail realm of the possible and pre-validate fit and finish of commercial solutions.

 7. Acquisition Advisory Contract Vehicles that reduce time to market and accelerate acquisition outcomes


"It is not a great mystery what needs to change, what it takes is the political will and willingness, as Eisenhower possessed,
to make hard choices -- choices that will displease powerful people both inside the Pentagon and out” Defense Secretary
                                                       Robert Gates
                                                    ICHnet.org Company Confidential
Building on Patterns of Success
                     Open IT Methods and Standards of Practice outside the reach
                                 of the Defense Industrial Complex!

 Navy: Assessment of AFLOAT Program –     USAF: Streamlined COTS Acquisition              USAF: Procurement of E-FOIA
    CANES SOA & Security Strategy        Process. Applied to Server Virtualization.            System using AAM

 Eliminated hi-risk Requirements by     Established optimal arch with ROI of          Completed AoA, BCA, AQ Selection
  23%, $100Ms in potential savings          450% & $458 million savings                       in just 4 months.


  USMC: AoA and BusCase for Cross       GSA: Financial Mgt System consolidation          BTA: Assessment of External DoD
    Domain, Thin Client Solutions                    using AAM.                             Hosting Options using AAM

Greatly Exceeded Forecasted Saving        Moved FMS from OMB “red” to                 $300 million in potential savings with
  in both analysis and acquisition        “green”. Eliminated duplicative                     minimal investment
                                           investments that saved $200M


 BTA: Apply AAM to complete AoA and     GPO: Developed Acquisition Strategy for        JFCOM: MNIS Evaluation of Alternatives
      BCA for DoD SOA Project                  Future Digital System                        for Cross Domain Solutions

Reduced pre-acquisition cycle time       Led to successful acquisition and            Evaluated 100’s of Options in 90 days,
   and cost of Analysis by 80%          implementation on time, on budget               enabling stake holder buy in and
        (4 months vs 18)                and 80% cheaper than NARA RMS                           source selection.




                                                ICHnet.org Company Confidential
Experience + Innovation = IT-AAC
                     empowered by Evidenced Base Research

To provide the PMs and Decision Makers with an alternative resources
and expertise needed to maximizes innovations of the market and
mitigate risk.

  PMs will need access to proven IT expertise and commercial innovations to achieve
  OMB and OSD Efficiency and IT Reform objectives:

  Speed -- achieve 6-12 month cycle times vice 7-8 years (early pilots prove this is possible)

  Incremental development, testing, and fielding -- vice one "big bang"

  Actionable Requirements -- Sacrifice or defer customization for speed and COTS/OS utilization -
  Leverage established standards of practice and open modular platforms

  Meet DoD's wide-range IT needs -- from modernizing C2 to updating word processing software

  Focused on Outcomes and Operational Effectiveness - Health IT, InfoSharing, Cyber Security,
  Consolidated IT Infrastructure, Business Systems



                                           ICHnet.org Company Confidential
How IT-AAC Advisory, armed with
   the Acquisition Assurance Method (AAM)
Aligns Cloud/IT Infrastructure Lifecycle with the
          Federal Acquisition Process
           at the Speed of Innovation




                    ICHnet.org Company Confidential
AAM Decision Analytics
                       Project          Capability         Capability       Capability          Feasibility    Economic
                       Strategy         Analysis          Determination    Prioritization      Assessment       Analysis


           Activities                                                           Artifacts/Deliverables
               Determine Sponsor and Stake Holder                                    Clear Problem Statement, Capability
                representatives                                                        Gaps
               Codify Business Problem statement                                     RFI Assessment
               Validate Project Scope, Timeline, Outcomes                            Realm of the Possible
               Collect and evaluate existing data from RFI                           Measures of Effectiveness
                responses and other sources
               Deliver Project POAM                                                  Other data as Price lists
               Establish Stake Holder Agreement and Success
                Criteria
               Establish Measures of Effectiveness
                                                     Critical Success Factors

            Entry Criteria                                                Exit Criteria - Outcomes
                Initial Data collection                                       Approval of Project Plan
                Initial identification of Capabilities                        Approval of Business Problem and Outcome
                Business Needs & Gaps                                         Criteria: Adequacy of Capabilities or Plan for
                                                                                correction


0 months                    1 month                          2 months                            3 months                        4 months
                                                                                                                                            12
                                                             ICHnet.org Company Confidential
AAM Decision Analytics
                        Project       Capability      Capability       Capability          Feasibility   Economic
                        Strategy      Analysis       Determination    Prioritization      Assessment      Analysis


           Activities                                                      Artifacts/Deliverables
               Capture Problem Statement w/Sponsor                              Publish Capability Analysis Report (CAR)
               Establish Performance Measurements                                (Requirements and their Justification)
               Document Agency Services Baseline                                Work papers on:
               Determine industry capabilities and metrics                        – Justification of Requirements, & Capabilities
               Capture Function Capabilities
               Determine level of granularity needed                              – Problem Statement Validation
               Hold Requirements WGs w/Sponsor's Key
                Stakeholders




                                                   Critical Success Factors
               Entry Criteria                                        Exit Criteria
                  Approved Project Plan and POAM                         Approval of the CAR by the Functional Sponsor
                                                                           Criteria: Adequacy of Capabilities or Plan for
                                                                           correction

0 months                    1 month                     2 months                            3 months                        4 months
                                                                                                                                       13

                                                        ICHnet.org Company Confidential
AAM Decision Analytics
                     Project        Capability      Capability         Capability          Feasibility   Economic
                     Strategy       Analysis       Determination      Prioritization      Assessment      Analysis


           Activities                                                      Artifacts/Deliverables
           Refine Capabilities into Service Component solution               Analysis Group; Service Components reference
            models (per OMB FEA-PMO)                                           model mapping to capabilities/requirements
           Conduct Market Survey                                             Work papers on:
           Establish Service Component & Groupings                             – Results of the Market Survey
           Review RFQ for adequacy of detail
                                                                                – Standards of Practice
           If RFI responses lack depth or breadth, ICH will
            conduct Industry Outreach and Benchmarking                          – Industry Benchmarking Data
           Construct Service Component Analysis Groups                         – Standardized Vocabulary for describing service
           PMO review                                                              components and basis for establishing SLAs
                                                                                    (not in scope)


                                                 Critical Success Factors
            Entry Criteria                                           Exit Criteria
               Approved CAR (Validated Capabilities)                     Approval of Service Component by the PM
                                                                           Criteria: Adequate industry metrics or plan for
                                                                           correction

0 months                 1 month                        2 months                            3 months                         4 months
                                                                                                                                        14

                                                        ICHnet.org Company Confidential
AAM Decision Analytics
                     Project       Capability      Capability       Capability          Feasibility   Economic
                     Strategy      Analysis       Determination    Prioritization      Assessment      Analysis


           Activities                                                   Artifacts/Deliverables
               Hold Functional WG w/Sponsor's Key                            Capability Prioritization Matrix
                Stakeholders                                                  Work papers on:
               Develop Prioritization Weighting Scale                          – Service Component Prioritization Scale
               Team Normalized weighting of the Service
                Components                                                      – Rationale for each weight given (traceability)
               Document each weights rationale




                                                Critical Success Factors
            Entry Criteria                                        Exit Criteria
               Approved Analysis Groups, Service                      Approved Capability Prioritization Matrix
                Components and Standards of Practice
                                                                        Criteria: Functional Sponsor Approval


0 months                 1 month                     2 months                            3 months                   4 months
                                                                                                                               15

                                                     ICHnet.org Company Confidential
AAM Decision Analytics
                     Project         Capability      Capability       Capability          Feasibility   Economic
                     Strategy        Analysis       Determination    Prioritization      Assessment      Analysis


           Activities                                                     Artifacts/Deliverables
               Evaluate RFI Responses                                          Analysis of Alternative (Compare New/Existing
               Establish alternatives for the assessment                        Solutions against Prioritized Capability)
               Establish Scoring WG team                                       Work papers on:
               Develop Scoring Plan                                              – Scoring Plan
               Score Alternatives + +
               Perform Sensitivity Analysis on Scoring Results                   – Scoring Rationale
               Analyze results                                                   – Sensitivity analyses performed
               Review AoA date points                                            – Technology Maturity Assessment
               Present Results to Functional Sponsor - May
                included Functional WG team


                                                  Critical Success Factors
            Entry Criteria                                          Exit Criteria
               Approved Capability Prioritization Matrix                Approval of Feasibility Assessment Report by DBSAE/ PMO
                                                                          Criteria: (1) Assessment Team agreement on the scores.
                                                                                    (2) Reference material justifying scores

0 months                  1 month                      2 months                            3 months                   4 months
                                                                                                                                    16

                                                       ICHnet.org Company Confidential
AAM Decision Analytics
                        Project       Capability      Capability         Capability          Feasibility   Economic
           3
                        Strategy      Analysis       Determination      Prioritization      Assessment      Analysis


           Activities                                                        Artifacts/Deliverables
                 Setup Main Cost Model                                            Economic Analysis Report
                 Determine the quantities and time frame to be                    Solution Architecture
                  Evaluate
                                                                                   Documented CCA compliance
                "Setup Sub-Models for direct, indirect &
                  migration cost + savings"                                        Work papers on:
                Determine Model's elements related to ROI                           – Model Documentation
                Determine the models for each alternative                           – Documentation of each Alternative
                Collect Data industry data and assumptions                          – Documentation on costs developed for the
                Conduct TCO                                                              Mode;
                Review of Economic Analysis Results
               Present Results to Functional Sponsor - May
                                                                                     – Documentation of Industry Metric
                                                                                          determined
                  included Functional WG team
                Develop Economic Analysis Report
                                                   Critical Success Factors
            Entry Criteria                                              Exit Criteria
                                                                             Approval of Economic Analysis Report by Functional Sponsor
                  Approved Feasibility Assessment, AoA
                                                                              Criteria: (1) Functional Sponsor Agreement
                                                                                        (2) Reference material justifying cost models

0 months                    1 month                       2 months                            3 months                    4 months
                                                                                                                           DBSAE
                                                                                                                         Assessment
                                                          ICHnet.org Company Confidential
Enabling the Innovation In the IT
                              Acquisition Ecosystem




“. the concept of the Interoperability Clearinghouse is sound and vital. Its developing role as an honest broker of all interoperability technologies, no
matter what the source, is especially needed. Such efforts should be supported by any organization that wants to stop putting all of its money into
maintaining archaic software and obtuse data formats, and instead start focusing on bottom-line issues of productivity and cost-effective use of information
technology.” OSD Commissioned Assessment of Interop. Clearinghouse (Mitre 2000)




                                                                                                                                                         18
Board of Director:
           Agency Leadership, Congress, GAO & OMB
                      Assuring compliance to law




                              Provides view into agency IT planning process
                              Establishes metrics for mission fulfillment
                              Aligns IT Capital investment with Agency Mission
      Policies                Leverages industry best practices/lessons learned
                              Gain access to industry expertise outside of
                               lobbying/marketing arena.
                              Catalyst for advancing President’s Management Agenda




Congress, Agency     Compliance
Leadership: COO’s, CFO’s
Auditors


                             ICHnet.org Company Confidential
Voice of the Customer:
                 Enterprise Users (CIO, CTO, Architects, PMs)
             Validating Requirements into Measurable Capabilities


                  IT Management:
                   CIO/CTO/CAO:

                            Real World
                           Requirements
                                    Validate and Prioritize Requirements w/ business driven metrics
                                    Identifies viable COTS/Open Source solutions, including
           Best Practices,           small/innovative offerings
          Proven Solutions          Establish Open Architectures and market readiness
                                    Model/leverage relevant industry best practices, lessons learned
                                    Assist in “what if” Modeling and Analysis of Alternatives
                                    Provides In-Context, Just-In-Time Research Data via many
                                     communities of practice
                                    Acquisition Strategies that have proven to deliver value and hold
Congress, Agency                     suppliers accountable
Leadership: COO’s, CFO’s
Auditors


                                      ICHnet.org Company Confidential
SI Stake Holder:
                   Solution Integrator & Consultants
               Validating competing solution architectures



               IT Management:
                CIO/CTO/CAO:


                                                       Integrators
                            Re-usable                     Integration
                            BluePrints                   Best Practices
                            Provides Solid Evidence for making COTS decisions
                            Shares Integration Success Record with Agency Planning process w/out
                             OCI concerns
                            Finds Potential COTS Component Matches Based on Prior Similar Context
                             Successes. ID small/innovative solution providers
                            Provides “What If” Modeling and Analysis for component composition
                            Provides Design Differentiation to Enhance Value Proposition to
                             Customers
                            Outsource market research to conflict free entity
Congress, Agency
Leadership: COO’s, CFO’s
Auditors

                                        ICHnet.org Company Confidential
Open System Community:
             Standards Bodies, Academia and Industry Groups
                Aligning the theory of standards w/ market realities



                   IT Management:
                    CIO/CTO/CAO:


                                                             Integrators                 SDOs, Academia &
                                                                              Solution    Industry Groups
                                                                              Metrics
                  Captures Use-Cases that Support and Justify Standards             Research
                  Use of standards/Engineering Spec in vetting of COTS solutions
                  Links Pertinent Standards to Products Features/functions          Projects
                  Provides Dynamic, but Solid Compliance Record (A119)
                  Enable collaboration between disparate industry groups
                  Provide IP and resources for framing complex issues.



Congress, Agency
Leadership: COO’s, CFO’s
Auditors

                                            ICHnet.org Company Confidential
Innovators and ISVs: VARs, COTS vendors,
               Component Builders, Innovative Businesses
           Defining the realm of the possible and innovations


              IT Management:
               CIO/CTO/CAO:


                                                                          SDOs, Academia &
                                                     Integrators           Industry Groups

               Provide Buyers with the Contextualized Product Information in
                terms of business fit, interoperability and security.
               Certifies Vendor Past Performance Based on 3rd-Party        Normalized Spec &
                Validation/History in an architecture context             Customer References
               Increased Buyer’s Chances for Successful Use of Vendor
                Product --> Successful implementation!
               Generates normalized COTS solution blue prints


                                                                            VARs, COTS Vendors,
Congress, Agency                             Open Market Place              Component Builders
                                                                             Small Businesses
Leadership: COO’s, CFO’s                    Integration Partners
Auditors                                    Reduced cost of sale

                                    ICHnet.org Company Confidential
IT-AAC: Accelerating Innovation through Collaboration
                reduces time, cost and risk of redundant IT research and
                                    validation efforts

                                                                         Cost/time
                           S.A.I.L.                                        Delta
                                                                                               Acceptable Risk Level
Low
                         Acceleration
                                                                          Risk
  Risk Level




                                                                          Delta
                                                                      Project A   Project B

                                                                                              Project C    Inconclusive
                                                                                                             findings



High

               Strategy Architecture Research Validation Acquisition Execution
               Acquisition Lifecycle Stages (cost & time line)



                Redundant Market Research and Testing
                SAIL Collaborative Research and Validation


                                            ICHnet.org Company Confidential

Contenu connexe

Tendances

I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008pwcom.co.uk Ltd
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarErin Banks
 
Bb3061 bess systems of record sv
Bb3061 bess systems of record svBb3061 bess systems of record sv
Bb3061 bess systems of record svCharlie Bess
 
Benno Zollner - Reshaping IT
Benno Zollner - Reshaping ITBenno Zollner - Reshaping IT
Benno Zollner - Reshaping ITFujitsu France
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2contrastcbt
 
Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime Uni Systems S.M.S.A.
 
Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011Agora Group
 
IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012Uni Systems S.M.S.A.
 
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...HKISPA
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...BIOVIA
 
"Hosted IP Services: Fleeting Fad or Evolving Environment?"
"Hosted IP Services: Fleeting Fad or Evolving Environment?""Hosted IP Services: Fleeting Fad or Evolving Environment?"
"Hosted IP Services: Fleeting Fad or Evolving Environment?"John Turner
 
Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006Meru Networks
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution BriefJuniper Networks
 
Asigra Product Marketing Strategy
Asigra Product Marketing StrategyAsigra Product Marketing Strategy
Asigra Product Marketing StrategyJas Mann
 
PDF Transforming Your Infrastructure into a Utility-Grade Network
PDF Transforming Your Infrastructure into a Utility-Grade NetworkPDF Transforming Your Infrastructure into a Utility-Grade Network
PDF Transforming Your Infrastructure into a Utility-Grade NetworkGraybar
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Enterprise
 
Iia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalIia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalDanny Miller
 

Tendances (20)

I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey Webinar
 
Bb3061 bess systems of record sv
Bb3061 bess systems of record svBb3061 bess systems of record sv
Bb3061 bess systems of record sv
 
Benno Zollner - Reshaping IT
Benno Zollner - Reshaping ITBenno Zollner - Reshaping IT
Benno Zollner - Reshaping IT
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
The SDN Opportunity
The SDN OpportunityThe SDN Opportunity
The SDN Opportunity
 
Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2
 
Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime
 
Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011
 
IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012
 
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
"Hosted IP Services: Fleeting Fad or Evolving Environment?"
"Hosted IP Services: Fleeting Fad or Evolving Environment?""Hosted IP Services: Fleeting Fad or Evolving Environment?"
"Hosted IP Services: Fleeting Fad or Evolving Environment?"
 
Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
Asigra Product Marketing Strategy
Asigra Product Marketing StrategyAsigra Product Marketing Strategy
Asigra Product Marketing Strategy
 
PDF Transforming Your Infrastructure into a Utility-Grade Network
PDF Transforming Your Infrastructure into a Utility-Grade NetworkPDF Transforming Your Infrastructure into a Utility-Grade Network
PDF Transforming Your Infrastructure into a Utility-Grade Network
 
Cloud computing 2012
Cloud computing 2012Cloud computing 2012
Cloud computing 2012
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
 
Iia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalIia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V Final
 

En vedette

IDC - Infrastructure Consolidation
IDC - Infrastructure ConsolidationIDC - Infrastructure Consolidation
IDC - Infrastructure Consolidationpaps1
 
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld
 
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case StudyChoosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study3Sixty Insights
 
Office 365 Groups - Roadmap & Overview
Office 365 Groups - Roadmap & OverviewOffice 365 Groups - Roadmap & Overview
Office 365 Groups - Roadmap & OverviewJasper Oosterveld
 
Company presentation
Company presentationCompany presentation
Company presentationarunkuri
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachRapidValue
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution OverviewProyet Kft
 
Data Center 3.0 Infrastructure Transformation
Data Center 3.0 Infrastructure TransformationData Center 3.0 Infrastructure Transformation
Data Center 3.0 Infrastructure Transformationdigitallibrary
 
Next Generation Data Center - IT Transformation
Next Generation Data Center - IT TransformationNext Generation Data Center - IT Transformation
Next Generation Data Center - IT TransformationDamian Hamilton
 

En vedette (12)

IDC - Infrastructure Consolidation
IDC - Infrastructure ConsolidationIDC - Infrastructure Consolidation
IDC - Infrastructure Consolidation
 
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud Era
 
Mobile Strategy (Which one may be right for U)
Mobile Strategy (Which one may be right for U)Mobile Strategy (Which one may be right for U)
Mobile Strategy (Which one may be right for U)
 
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case StudyChoosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
 
Enterprise mobility management
Enterprise mobility managementEnterprise mobility management
Enterprise mobility management
 
Office 365 Groups - Roadmap & Overview
Office 365 Groups - Roadmap & OverviewOffice 365 Groups - Roadmap & Overview
Office 365 Groups - Roadmap & Overview
 
Company presentation
Company presentationCompany presentation
Company presentation
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approach
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 
Data Center 3.0 Infrastructure Transformation
Data Center 3.0 Infrastructure TransformationData Center 3.0 Infrastructure Transformation
Data Center 3.0 Infrastructure Transformation
 
Next Generation Data Center - IT Transformation
Next Generation Data Center - IT TransformationNext Generation Data Center - IT Transformation
Next Generation Data Center - IT Transformation
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 

Similaire à IT-AAC Cloud Acquisition Roadmap

It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012John Weiler
 
Weiler slideshow
Weiler slideshowWeiler slideshow
Weiler slideshowvjairam
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxBLACKSPAROW
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
 
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...Enterprise Wired
 
Nist leaf pressclub_032911
Nist leaf pressclub_032911Nist leaf pressclub_032911
Nist leaf pressclub_032911GovCloud Network
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure ElasticityNTT Innovation Institute Inc.
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA AutomationCisco Canada
 
Cloud computing
Cloud computingCloud computing
Cloud computingRazib M
 
Aitp presentation ed holub - october 23 2010
Aitp presentation   ed holub - october 23 2010Aitp presentation   ed holub - october 23 2010
Aitp presentation ed holub - october 23 2010AITPHouston
 
Plant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IPPlant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IPPanduit
 
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...IRJET Journal
 
Juniper Networks MetaFabric Architecture
Juniper Networks MetaFabric ArchitectureJuniper Networks MetaFabric Architecture
Juniper Networks MetaFabric ArchitectureGCC Computers
 
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and SoftwareInternet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and SoftwareReal-Time Innovations (RTI)
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 

Similaire à IT-AAC Cloud Acquisition Roadmap (20)

It aac
It aacIt aac
It aac
 
It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012It aac cloud-acquisition_roadmap2012
It aac cloud-acquisition_roadmap2012
 
Weiler slideshow
Weiler slideshowWeiler slideshow
Weiler slideshow
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...
 
Nist leaf pressclub_032911
Nist leaf pressclub_032911Nist leaf pressclub_032911
Nist leaf pressclub_032911
 
FINAL VER - 2015_09
FINAL VER - 2015_09FINAL VER - 2015_09
FINAL VER - 2015_09
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure Elasticity
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA Automation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Aitp presentation ed holub - october 23 2010
Aitp presentation   ed holub - october 23 2010Aitp presentation   ed holub - october 23 2010
Aitp presentation ed holub - october 23 2010
 
Plant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IPPlant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IP
 
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Digital Transformation of LAN Infrastructure
Digital Transformation of  LAN InfrastructureDigital Transformation of  LAN Infrastructure
Digital Transformation of LAN Infrastructure
 
Juniper Networks MetaFabric Architecture
Juniper Networks MetaFabric ArchitectureJuniper Networks MetaFabric Architecture
Juniper Networks MetaFabric Architecture
 
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and SoftwareInternet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and Software
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 

Plus de GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmarkGovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for meGovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeGovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in CyberspaceGovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessGovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture GovCloud Network
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin JacksonGovCloud Network
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanGovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefGovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 

Plus de GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

IT-AAC Cloud Acquisition Roadmap

  • 1. IT Acquisition Advisory Council Solution Architecture Innovation Lab Acquisition Roadmap for Cloud Computing and Consolidated IT Infrastructure Assuring IT Program Outcomes through Decision Analytics; measuring the business value of emerging technologies, innovations, and lessons learned. “Weapons systems depend on stable requirements, but with IT, technology changes faster than the requirements process can keep up," he said. "It changes faster than the budget process and it changes faster than the acquisition milestone process. For all these reasons, the normal acquisition process does not work for information technology.” DepSec Bill Lynn statement at the IT-AAC Defense IT Acquisition Summit John Weiler IT-AAC, Vice Chair A not-for-profit research institute John.Weiler@IT-AAC.org www.IT-AAC.org 703 768 0400
  • 2. IT-AAC Knowledge Network “A knowledgeable & conflict free Community of Practice bring forward proven methods, expertise and innovations to empower the Federal IT Acquisition Ecosystem” Honorable Mike Wynne, 21st AFSEC, Co-Founder and Chairman Emeritus, IT-AAC “Together, these steps will help to catalyze a fundamental reform of Federal IT, which is essential to improving the effectiveness and efficiency of the Federal Government” White House, OMB Director ICHnet.org Company Confidential
  • 3. Cloud Acquisition Challenge We are delivering yesterdays technology tomorrow  We are in early stages of Wave 3 information technology  Mainframe and Client-Server waves remain in place 3. Internet - Cloud Information Driven Capability  Waves represent many co-dependent technologies, • Virtualized compute; global network enabled, plug & play matured over time • IT Infrastructure decoupled from  Adding functional capability has Applications become easier with each new wave • COTS & OSS Integration, Software as a Service  But enterprise infrastructure 2. Client/Server - Decentralized gaps & vulnerabilities have • PC enabled and network become more critical • Software distributed in both server and client computers • Heavy focus on software development and point to point integration 1. Centralized - Mainframe • Central computer center, slow turn around • One size fits all • Limited reuse of application modules 1950 1960 1970 1980 1990 2000 2010 2020 Information Technology Evolution Innovations of the market and benchmarked best practices are invisible to the Defense Industrial Complex ICHnet.org Company Confidential
  • 4. Overcoming the Acquisition Challenges We are buying yesterdays technology …. tomorrow 1. Good laws, poor enforcement: Clinger Cohen Act, Public Law 104-113, and FAR FFRDC use restrictions have prevented adoption of innovative solutions and IT standards of practices which should drive establishment of shared IT infrastructure (SOA);  A robust set of Acquisition Processes are available but not visible to Defense Industrial Complex, requiring a true public/private partnership like IT-AAC that is not vested in the status quo. Title 10 and lack of strong governance impede long term funding of infrastructure and drive “Big Bang” stove pipes. New rules needed for SOA ConOps. 2. CULTURE: 15 years of IT reform efforts have fallen short, with only minor changes to current MilSpec methods. (DODAF, JCIDS, NESI, LISI) compete with standards and orthogonal to Benchmarked Industry Best Practices.  IT-AAC communities are uniquely dedicated streamlining IT Architecture and Acquisition Processes, structured to establish standards of practices. ICH’s “clearinghouse” of proven methods and decision tools represent the CMMi of IT Acquisition. 3. INCENTIVES: Traditional SIs and FFRDCs are insulated from commercial IT innovations and vested in status quo. DoD needs an organic, conflict free mechanisms for tapping innovations of the market, commercial expertise, and real world lessons learned.  IT-AAC brings a world of innovation, expertise and knowledge that has proven to drive successful outcomes. IT-AAC membership are CONFLICT FREE & inclusive of innovative businesses, universities, SDOs, think tanks and research institutes. 4. PROCESS: Both CCA and Sec804 will require revamping of IT Requirements, Architecture, Tech Assessment and Decision Support Processes. Any new process should have both govt/industry buyin, conform to OMB A119 and reflect a proven vs new MilSpec.  IT-AAC partnership brings to market a collaborative structure for the IT Acquisition community. Its 2 year effort has already created agency proven methods based on commercial best practices. 5. PEOPLE: IT Acquisition Ecosystem untrained and lack IT knowledge to make sound decisions; Lack of clear metrics and incentives put focus on compliance vs outcomes  ICH’s structured to establish standardized IT performance metrics (MOEs) and Service Level Agreements (SLAs) across the acquisition lifecycle and validated by benchmarked best practices. Partnership with SDOs and large corporate users provide needed expertise to enable sound decision making. ICHnet.org Company Confidential
  • 5. OMB’s CSFs For Cloud Acquisition  Efficiency: assess to what degree existing infrastructure services, technologies and platforms that can be reconfigured into a new Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and/or Software as a Service (SaaS)  Agility: Streamlined Acquisition Strategy should conform to CCA, and establish a common set of services that are assessable via an open interface.  Innovation: Establish a shared innovation lab that enables rapid assessment of emerging technologies. Break down acquisitions into small modules of that can be rapidly configured and deployed. Leveraging existing sources of evidence, testing and implementation results.  Security: The cloud solution must be sufficiently secure A SaaS solution is flexible and could be configured to securely manage access, sovereignty, and data retention requirements  Market availability: A IaaS solution is able to meet all of the requirements including the ability to standardize core data model, compatibility with handheld devices, and real-time integration with legacy systems  Government readiness: The PM must have experienced IT Acquisition Professionals and means of implementing new technologies, have a culture that supported experimentation and improvement, and possessed the skills and capacity to manage the transition well  Technology lifecycle: must align with the acquisition process to accommodate the fast paced market. IT-AAC provides a clearinghouse of innovative solutions and sources of past performance ICHnet.org Company Confidential
  • 6. Acquisition Assurance Method (AAM) mitigates risk while taping innovations of the market Cloud Investments must Align the Acquisition Process with the Technology Cycle. Point 13. Design and develop a cadre of specialized IT acquisition professionals . Point 14. Identify IT acquisition best practices and adopt government-wide. Point 15. Issue contracting guidance and templates to support modular development Point 16. Reduce barriers to entry for small innovative technology companies ICHnet.org Company Confidential
  • 7. IT-AAC Accelerates & Assures Acquisition Decisions leveraging innovations and benchmarked best practices IT-AAC Partnership brings forth wide range of IT expertise need to mentor PMs:  Governance and Oversight: how an enterprise supports, oversees and manages IT programs and on-going portfolio. SOA as defined in the commercial market is governance tool not technology. DoD5000 and BCL represent the current approaches.  Decision Analytics: enables effective Program Management and Value Stream Analysis execution. As most of these sub- processes are designed to improve decision making, a relative new discipline has evolved (since 86), that addresses the human and cultural challenges in decision making. Decision Analytics is the discipline of framing the essence and success criteria of each gate in the acquisition lifecycle. It brings focus to the high risk areas of a program, and reduces analysis/paralysis.  Capability Specification: Actionable requirements must be constrained by the realm of the possible. With pressures to do more with less, we must embrace mechanisms that force a relative valuation/impact of the gap/capability, with clearly defined outcomes  Solution Architecture: This is one of the most critical elements of the acquisition lifecycle, as it should represent all stake holder agreements. The market embrace of SOA is not about technology, but a refocusing of the EA on service level management and data. A good architecture is a lexicon that links requirements, technologies and acquisition strategy.  Technology Assessment: Understanding the limitation of technology early in the process is key. Without a clear view of the “realm of the possible” validated by real world results, we often find ourselves in high risk areas and over specification. Market research must be done early to help users constrain requirements and embrace the inherent business practices that codify . Recognizing that 70% make up of every IT application is vested in IT infrastructure (netcentric, cloud, SOA), it is critical to establish a common infrastructure/infrastructure standard by which all applications can share. The most prolific is ITIL to date.  Business Case Analysis: Demonstrating the business value of technology investments, based on evidenced based research and lifecycle cost. This is a core requirement of Clinger Cohen Act.  Procurement and Contracting: Software as a Service and SOA portent a new dynamic for acquisition of IT (health IT, cyber, business systems), that brings focus to Service Level Agreements (SLAs), Software as a Service (SaaS) and SL Management. If the previous activities do not directly feed the acquisition strategy or provide mechanisms for contractor accountability, all is lost. ICHnet.org Company Confidential
  • 8. AAM Aligns and Validates Architectures Business & Infrastructure Needs with Innovative Solutions Reference Models Associated Metrics Business Driven Top Down BRM Business Core Business Performance Metrics Drivers & Mission Objectives User/Integrator Metrics Best Practices (BRM/OV) Business Processes & Infrastructure Security Profiles Aligns with business needs SAIL Solution Frameworks Effectiveness/Efficiency Service BRM Appl Service AAM Components Components Layer 1 Service & Metrics (SRM/SV) Infrastructure Component Service Components Layer N Common Criteria Technical BRM Application Interoperability, Fit, Finish Vendor Solution & Layer 1 Solution Templates Metrics Common (TV, TRM) Infrastructure Layer M Secure Solutions ICHnet.org Company Confidential
  • 9. IT-AAC Capabilities Accelerate Success leveraging what works 1. Non-profit free think tank composed of the worlds most respected public service institutes and domain experts not available through traditional contracting mechanisms 2. Innovation Clearinghouse and Knowledge Exchange that captures proven market innovations in an acquisition ready context (canonical form) 3. Benchmarked Best Practices and Lessons Learned (SOA, Cloud, IaaS, PaaS, SaaS, Web Services) provided by customers who share business value from real world implementation and testing results 4. Acquisition Decision Framework that pools and normalizes infrastructure requirements, architectures, tech assessments, performance metrics (SLAs) business case analysis, and evaluation criteria. 5. Leadership Roundtables and Educational Forums that provides a hype free interchange with government and industry leaders 6. Virtual Solution Architecture Integration Lab (SAIL) and Solution Architecture Working Groups (SAWG), that detail realm of the possible and pre-validate fit and finish of commercial solutions. 7. Acquisition Advisory Contract Vehicles that reduce time to market and accelerate acquisition outcomes "It is not a great mystery what needs to change, what it takes is the political will and willingness, as Eisenhower possessed, to make hard choices -- choices that will displease powerful people both inside the Pentagon and out” Defense Secretary Robert Gates ICHnet.org Company Confidential
  • 10. Building on Patterns of Success Open IT Methods and Standards of Practice outside the reach of the Defense Industrial Complex! Navy: Assessment of AFLOAT Program – USAF: Streamlined COTS Acquisition USAF: Procurement of E-FOIA CANES SOA & Security Strategy Process. Applied to Server Virtualization. System using AAM Eliminated hi-risk Requirements by Established optimal arch with ROI of Completed AoA, BCA, AQ Selection 23%, $100Ms in potential savings 450% & $458 million savings in just 4 months. USMC: AoA and BusCase for Cross GSA: Financial Mgt System consolidation BTA: Assessment of External DoD Domain, Thin Client Solutions using AAM. Hosting Options using AAM Greatly Exceeded Forecasted Saving Moved FMS from OMB “red” to $300 million in potential savings with in both analysis and acquisition “green”. Eliminated duplicative minimal investment investments that saved $200M BTA: Apply AAM to complete AoA and GPO: Developed Acquisition Strategy for JFCOM: MNIS Evaluation of Alternatives BCA for DoD SOA Project Future Digital System for Cross Domain Solutions Reduced pre-acquisition cycle time Led to successful acquisition and Evaluated 100’s of Options in 90 days, and cost of Analysis by 80% implementation on time, on budget enabling stake holder buy in and (4 months vs 18) and 80% cheaper than NARA RMS source selection. ICHnet.org Company Confidential
  • 11. Experience + Innovation = IT-AAC empowered by Evidenced Base Research To provide the PMs and Decision Makers with an alternative resources and expertise needed to maximizes innovations of the market and mitigate risk. PMs will need access to proven IT expertise and commercial innovations to achieve OMB and OSD Efficiency and IT Reform objectives: Speed -- achieve 6-12 month cycle times vice 7-8 years (early pilots prove this is possible) Incremental development, testing, and fielding -- vice one "big bang" Actionable Requirements -- Sacrifice or defer customization for speed and COTS/OS utilization - Leverage established standards of practice and open modular platforms Meet DoD's wide-range IT needs -- from modernizing C2 to updating word processing software Focused on Outcomes and Operational Effectiveness - Health IT, InfoSharing, Cyber Security, Consolidated IT Infrastructure, Business Systems ICHnet.org Company Confidential
  • 12. How IT-AAC Advisory, armed with the Acquisition Assurance Method (AAM) Aligns Cloud/IT Infrastructure Lifecycle with the Federal Acquisition Process at the Speed of Innovation ICHnet.org Company Confidential
  • 13. AAM Decision Analytics Project Capability Capability Capability Feasibility Economic Strategy Analysis Determination Prioritization Assessment Analysis Activities Artifacts/Deliverables  Determine Sponsor and Stake Holder  Clear Problem Statement, Capability representatives Gaps  Codify Business Problem statement  RFI Assessment  Validate Project Scope, Timeline, Outcomes  Realm of the Possible  Collect and evaluate existing data from RFI  Measures of Effectiveness responses and other sources  Deliver Project POAM  Other data as Price lists  Establish Stake Holder Agreement and Success Criteria  Establish Measures of Effectiveness Critical Success Factors Entry Criteria Exit Criteria - Outcomes  Initial Data collection  Approval of Project Plan  Initial identification of Capabilities  Approval of Business Problem and Outcome  Business Needs & Gaps  Criteria: Adequacy of Capabilities or Plan for correction 0 months 1 month 2 months 3 months 4 months 12 ICHnet.org Company Confidential
  • 14. AAM Decision Analytics Project Capability Capability Capability Feasibility Economic Strategy Analysis Determination Prioritization Assessment Analysis Activities Artifacts/Deliverables  Capture Problem Statement w/Sponsor  Publish Capability Analysis Report (CAR)  Establish Performance Measurements (Requirements and their Justification)  Document Agency Services Baseline  Work papers on:  Determine industry capabilities and metrics – Justification of Requirements, & Capabilities  Capture Function Capabilities  Determine level of granularity needed – Problem Statement Validation  Hold Requirements WGs w/Sponsor's Key Stakeholders Critical Success Factors Entry Criteria Exit Criteria  Approved Project Plan and POAM  Approval of the CAR by the Functional Sponsor Criteria: Adequacy of Capabilities or Plan for correction 0 months 1 month 2 months 3 months 4 months 13 ICHnet.org Company Confidential
  • 15. AAM Decision Analytics Project Capability Capability Capability Feasibility Economic Strategy Analysis Determination Prioritization Assessment Analysis Activities Artifacts/Deliverables  Refine Capabilities into Service Component solution  Analysis Group; Service Components reference models (per OMB FEA-PMO) model mapping to capabilities/requirements  Conduct Market Survey  Work papers on:  Establish Service Component & Groupings – Results of the Market Survey  Review RFQ for adequacy of detail – Standards of Practice  If RFI responses lack depth or breadth, ICH will conduct Industry Outreach and Benchmarking – Industry Benchmarking Data  Construct Service Component Analysis Groups – Standardized Vocabulary for describing service  PMO review components and basis for establishing SLAs (not in scope) Critical Success Factors Entry Criteria Exit Criteria  Approved CAR (Validated Capabilities)  Approval of Service Component by the PM Criteria: Adequate industry metrics or plan for correction 0 months 1 month 2 months 3 months 4 months 14 ICHnet.org Company Confidential
  • 16. AAM Decision Analytics Project Capability Capability Capability Feasibility Economic Strategy Analysis Determination Prioritization Assessment Analysis Activities Artifacts/Deliverables  Hold Functional WG w/Sponsor's Key  Capability Prioritization Matrix Stakeholders  Work papers on:  Develop Prioritization Weighting Scale – Service Component Prioritization Scale  Team Normalized weighting of the Service Components – Rationale for each weight given (traceability)  Document each weights rationale Critical Success Factors Entry Criteria Exit Criteria  Approved Analysis Groups, Service  Approved Capability Prioritization Matrix Components and Standards of Practice Criteria: Functional Sponsor Approval 0 months 1 month 2 months 3 months 4 months 15 ICHnet.org Company Confidential
  • 17. AAM Decision Analytics Project Capability Capability Capability Feasibility Economic Strategy Analysis Determination Prioritization Assessment Analysis Activities Artifacts/Deliverables  Evaluate RFI Responses  Analysis of Alternative (Compare New/Existing  Establish alternatives for the assessment Solutions against Prioritized Capability)  Establish Scoring WG team  Work papers on:  Develop Scoring Plan – Scoring Plan  Score Alternatives + +  Perform Sensitivity Analysis on Scoring Results – Scoring Rationale  Analyze results – Sensitivity analyses performed  Review AoA date points – Technology Maturity Assessment  Present Results to Functional Sponsor - May included Functional WG team Critical Success Factors Entry Criteria Exit Criteria  Approved Capability Prioritization Matrix  Approval of Feasibility Assessment Report by DBSAE/ PMO Criteria: (1) Assessment Team agreement on the scores. (2) Reference material justifying scores 0 months 1 month 2 months 3 months 4 months 16 ICHnet.org Company Confidential
  • 18. AAM Decision Analytics Project Capability Capability Capability Feasibility Economic 3 Strategy Analysis Determination Prioritization Assessment Analysis Activities Artifacts/Deliverables  Setup Main Cost Model  Economic Analysis Report  Determine the quantities and time frame to be  Solution Architecture Evaluate  Documented CCA compliance  "Setup Sub-Models for direct, indirect & migration cost + savings"  Work papers on:  Determine Model's elements related to ROI – Model Documentation  Determine the models for each alternative – Documentation of each Alternative  Collect Data industry data and assumptions – Documentation on costs developed for the  Conduct TCO Mode;  Review of Economic Analysis Results Present Results to Functional Sponsor - May – Documentation of Industry Metric determined included Functional WG team  Develop Economic Analysis Report Critical Success Factors Entry Criteria Exit Criteria  Approval of Economic Analysis Report by Functional Sponsor  Approved Feasibility Assessment, AoA Criteria: (1) Functional Sponsor Agreement (2) Reference material justifying cost models 0 months 1 month 2 months 3 months 4 months DBSAE Assessment ICHnet.org Company Confidential
  • 19. Enabling the Innovation In the IT Acquisition Ecosystem “. the concept of the Interoperability Clearinghouse is sound and vital. Its developing role as an honest broker of all interoperability technologies, no matter what the source, is especially needed. Such efforts should be supported by any organization that wants to stop putting all of its money into maintaining archaic software and obtuse data formats, and instead start focusing on bottom-line issues of productivity and cost-effective use of information technology.” OSD Commissioned Assessment of Interop. Clearinghouse (Mitre 2000) 18
  • 20. Board of Director: Agency Leadership, Congress, GAO & OMB Assuring compliance to law  Provides view into agency IT planning process  Establishes metrics for mission fulfillment  Aligns IT Capital investment with Agency Mission Policies  Leverages industry best practices/lessons learned  Gain access to industry expertise outside of lobbying/marketing arena.  Catalyst for advancing President’s Management Agenda Congress, Agency Compliance Leadership: COO’s, CFO’s Auditors ICHnet.org Company Confidential
  • 21. Voice of the Customer: Enterprise Users (CIO, CTO, Architects, PMs) Validating Requirements into Measurable Capabilities IT Management: CIO/CTO/CAO: Real World Requirements  Validate and Prioritize Requirements w/ business driven metrics  Identifies viable COTS/Open Source solutions, including Best Practices, small/innovative offerings Proven Solutions  Establish Open Architectures and market readiness  Model/leverage relevant industry best practices, lessons learned  Assist in “what if” Modeling and Analysis of Alternatives  Provides In-Context, Just-In-Time Research Data via many communities of practice  Acquisition Strategies that have proven to deliver value and hold Congress, Agency suppliers accountable Leadership: COO’s, CFO’s Auditors ICHnet.org Company Confidential
  • 22. SI Stake Holder: Solution Integrator & Consultants Validating competing solution architectures IT Management: CIO/CTO/CAO: Integrators Re-usable Integration BluePrints Best Practices  Provides Solid Evidence for making COTS decisions  Shares Integration Success Record with Agency Planning process w/out OCI concerns  Finds Potential COTS Component Matches Based on Prior Similar Context Successes. ID small/innovative solution providers  Provides “What If” Modeling and Analysis for component composition  Provides Design Differentiation to Enhance Value Proposition to Customers  Outsource market research to conflict free entity Congress, Agency Leadership: COO’s, CFO’s Auditors ICHnet.org Company Confidential
  • 23. Open System Community: Standards Bodies, Academia and Industry Groups Aligning the theory of standards w/ market realities IT Management: CIO/CTO/CAO: Integrators SDOs, Academia & Solution Industry Groups Metrics  Captures Use-Cases that Support and Justify Standards Research  Use of standards/Engineering Spec in vetting of COTS solutions  Links Pertinent Standards to Products Features/functions Projects  Provides Dynamic, but Solid Compliance Record (A119)  Enable collaboration between disparate industry groups  Provide IP and resources for framing complex issues. Congress, Agency Leadership: COO’s, CFO’s Auditors ICHnet.org Company Confidential
  • 24. Innovators and ISVs: VARs, COTS vendors, Component Builders, Innovative Businesses Defining the realm of the possible and innovations IT Management: CIO/CTO/CAO: SDOs, Academia & Integrators Industry Groups  Provide Buyers with the Contextualized Product Information in terms of business fit, interoperability and security.  Certifies Vendor Past Performance Based on 3rd-Party Normalized Spec & Validation/History in an architecture context Customer References  Increased Buyer’s Chances for Successful Use of Vendor Product --> Successful implementation!  Generates normalized COTS solution blue prints VARs, COTS Vendors, Congress, Agency Open Market Place Component Builders Small Businesses Leadership: COO’s, CFO’s Integration Partners Auditors Reduced cost of sale ICHnet.org Company Confidential
  • 25. IT-AAC: Accelerating Innovation through Collaboration reduces time, cost and risk of redundant IT research and validation efforts Cost/time S.A.I.L. Delta Acceptable Risk Level Low Acceleration Risk Risk Level Delta Project A Project B Project C Inconclusive findings High Strategy Architecture Research Validation Acquisition Execution Acquisition Lifecycle Stages (cost & time line) Redundant Market Research and Testing SAIL Collaborative Research and Validation ICHnet.org Company Confidential