Showing posts with label Department of Defense. Show all posts
Showing posts with label Department of Defense. Show all posts

November 5, 2015

Thank You To Our Warfighters

I took a photo of this wonderful sign on this construction truck. 

It says:

"To All The Men And Women Of Our Armed Forces

Thank You!

United We Stand."

Next week on Wednesday is Veterans Day, but feeling gratitude to those who stand and fight for our freedom is not just a one day a year message. 

Let's always remember that freedom is not free! ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

September 30, 2013

Saving Iraq's Jewish Scrolls


What a beautiful job by the National Archives and Records Administration (NARA). 

In Operation Iraqi Freedom in 2003, our Special Forces looking for WMD instead discoverd thousands of ancient Jewish texts.

The texts dating from 1540 to 1970 taken from the Iraqi Jewish Community were sitting defiled in the basement of Saddam Hussein's Intelligence HQS molding and decomposing under 4 feet of water. 

The U.S. military and NARA rescued these texts and have painstakingly restored and preserved them through freezing, categorizing, condition assessment, stabilization, mold remediation, mending pages, washing, binding, and more. 

Pictures of the collection of texts from Iraq before and after preservation can be found here.

The collection includes:

- A Hebrew Bible from 1568

- A Babylonian Talmud from 1793

- A Zohar/Kabbalah from 1815

- A Haggadah from 1902

- 48 Torah scroll fragments

- And much more.

On October 11, NARA will unveil an exhibit in Washington, DC featuring 24 of the recovered items and the preservation effort.  

Hopefully, the collection of Jewish religious texts will ultimately be returned to the Jewish community from which it came, so that it can be held dear and sacred once again, and used properly in religious worship and never again held hostage or profaned. 

Thank you so much to both the Department of Defense and to the National Archives for saving and preserving these ancient, sacred Jewish religious texts. 

You did a beautiful mitzvah! ;-)
Share/Save/Bookmark

February 21, 2010

Common Language for Enterprise Architecture

What happens when one set of enterprise architects can’t read another’s enterprise architecture “artifacts”?

This may sound ridiculous, but this is a very real problem at the Department of Defense (DoD) and at many other agencies.

Government Computer News, 1 February 2010, has an article on “Primitives and the Future of SOA” about how “DoD looks to develop a common vocabulary to improve system design.”

Dennis Wisnosky, the chief technical officer at the DoD Business Transformation Agency came face-to-face with this problem:

“We were building a business enterprise architecture when the whole team changed because the contract [that the work was being performed under] was won by different people…The new company came in and, all of a sudden, their people had different ideas for how the architecture should be built…Their way might have been a good way, but we had already invested hundreds of millions of dollars in another way, and it seemed to be a wiser course of business action to get these new people to learn the old way.”

Mr. Wisnosky tackled the problem head-on:

Like the periodic table of 117 core elements that make up everything in our world, Mr. Wisnosky set out to build the DoD architecture using a set of primitives or basic building blocks. “Primitives are a standard set of viewing elements and associated symbols” based in DoD’s case on the Business Process Modeling Notation (BPMN)”—a graphical representation for processes in a workflow. Armed with the set of primitives, DoD was able to get “the business process architecture, so that they are described in a way that the meaning of this architecture…is absolutely clear to everyone.”

Wisnosky aptly compared using a common language (or set of primitives) for EA, so everyone could read and understand it, regardless of their particular EA methodology to how musicians anywhere in the world can read standard music notation and similarly how electrical engineers can read electrical diagrams based on standards symbols.

This is a big step for EA, where traditional architecture artifacts are not as user-centric as they should be and often leave their readers/audience questioning the purpose and message intended. In contrast, the use of a common EA vocabulary and set of symbols is right in line with developing a user-centric enterprise architecture that is easy for users to understand and apply, because once you know the standard set of primitives you can read and understand the architecture better than an architecture based on a proprietary or ever changing vocabulary.

As Wisnosky points out, primitives are also a nice fit with Service Oriented Architecture, because you can use primitives or patterns of primitives to represent standard business processes and these can be used over and over again for the same services that are needed throughout the business.

This use of primitives for business process notation is consistent with the use of the National Information Exchange Model (NIEM) for information notation. “NIEM enables information sharing, focusing on information exchanged among organizations as part of their current or intended business practices. The NIEM exchange development methodology results in a common semantic understanding among participating organizations and data formatted in a semantically consistent manner. NIEM will standardize content (actual data exchange standards), provide tools, and managed processes.”

While, we need to leave a certain amount of flexibility in EA for architects to apply their trade to meet specific agency requirements, there is a huge benefit to standardizing on a common vocabulary, so architects can speak the same language. This concept is all the better when the language and design methodology selected for EA is simple and clear so that even non-EA’s (our regular business and IT people) can read and understand the architecture.

Building EA with primitives and clear and simple vocabulary and design represents a user-centric EA moment that I for one, applaud loudly. Another way to say this is that an EA without primitives is a primitive EA.


Share/Save/Bookmark

October 19, 2008

Net-centricity and Enterprise Architecture

See video on Department of Defense (DoD) vision for Net-Centricity:



Source: Department of Defense
Share/Save/Bookmark

July 18, 2008

Learning from the Private Sector and Enterprise Architecture

There is a terrific article in ComputerWorld, 17 July 2008, called “Pentagon’s IT unit seeks to borrow tech ideas from Google, Amazon, other companies.”

Defense Information Systems Agency (DISA) provides IT solutions to the Department of Defense. So what DISA does has to be state-of-the- art and best practice 24x7x365. Their mission depends on it!

To keep ahead of the curve, John Garing, DISA’s CIO and a retired Air Force colonel has been visiting with top tier private sector companies like Google, Amazon, UPS, Sabre, and FedEx to identify their best practices and incorporate them.

What has DISA learned from the private sector?

1. Cloud Computing

According to Garing, cloud computing is “going to be the way—it has to be. We have to get to this standard environment that is provisionable and scalable.”

To this end, “DISA has begin deploying a system [Rapid Access Computing Environment (RACE)] that is similar architecturally to Amazon’s Elastic Compute Cloud (EC2) technology, a web-based computing service that enables users to quickly scale up their processing capabilities.”

Using RACE, a soldier in the field will be able to use a client device (like a PDA) with web support and “dynamically access a wide range of information sources and meld together data,” such as blue force tracking, mapping of combatant locations, identification of aid stations, fuel and ammunition supplies, and so forth.

2. Elastic and flexible

DISA has to be prepared to handle the unexpected and this means they need to be able to flexible to meet a mission need or fight a war or two. Garing has found that companies like Amazon and Sabre have built their IT infrastructures to enable “elasticity and flexibility.”

3. Competing for business

Like the private sector that competes for market share, DISA sees itself and operates “like a business and produce[s] an attractive offering of IT services at a competitive price. They recognize that they “compete for the business it gets from other military agencies, which in some cases have options to use private-sector IT service providers.”

4. Process-driven and Speedy

Like enterprise architecture, which looks at both business processes and technology enablement, Garing is “interested in the processes that companies use to deploy technology, not just their technology itself.” DISA wants to learn how to speed an idea to a service in just a few months as opposed to the years it often takes in DoD.

DISA is learning that cloud computing will enable increased standardization through a “standard suite of operating platforms” as well as increased “deployment speed and agility.”

By being open to learning from the private sector, Garing is leading an enterprise architecture that is making for a better and more capable DoD.

Job well done DISA and a shining example for the rest of the federal space!

Finally, learning is not a one-way street and surely the interchange between the public and private sector can lead to improvements for all.


Share/Save/Bookmark

March 28, 2008

Lean Six Sigma and Enterprise Architecture

Enterprise architecture is one way for an organization to drive business process improvement and technology enablement. Another way is through Lean Six Sigma.

Federal Computer Week, 3 March 2008, reports that “DoD rallies around Lean Six Sigma: The methodology has become the Defense Department’s ‘tool of choice’ for business transformation.”

“Lean Six Sigma is simply a process-improvement method for reducing variability and eliminating waste.” With Six Sigma (developed by Motorola), the idea is to make processes efficient and repeatable, so that there are fewer than 3.4 defects per 1 million. The Lean (developed by Toyota) concept refers to “eliminating any steps that don’t add value.”

In Lean Six Sigma, process improvement is enabled through the following steps:

  1. Define—identify problem and measures
  2. Measure—capture data points
  3. Analyze—discover areas for process improvement
  4. Improve—implement process changes
  5. Control—verify and validate that improvement is attained and sustained

In 2000, Deputy Defense Secretary Gordon England made Lean Six Sigma the foundation for DoD’s continuous process improvement program.

Currently, “about two-thirds of DoD organizations by some estimates are committed to Lean Six Sigma.”

DoD is training their people in Lean Six Sigma and intends to have 5% of its employees attain Green Belt (involves typically a week of training) and 1% reach Black Belt (typically involves approximately two years of training in math and statistics and several years experience working on projects as Green Belts).

However, DoD has been criticized by some for focusing more on the training, than on translating that training into practical on the job know-how to transform the Department.

Yet, by some measures DoD has made improvement. The Army claims to have “completed 770 Lean Six Sigma projects, from which it estimated savings of $1.2 billion in 2007.”

To me it seems like enterprise architects would do well to work in partnership with Lean Six Sigma professionals in order to understand the business processes, improve them, and identify requirements to technology enable those. In User-centric Enterprise Architecture, business drives technology rather than doing technology for technology’s sake. Lean Six Sigma can help business led the way for truly useable and usable technology solutions.


Share/Save/Bookmark

March 26, 2008

The Enterprise is Unwieldy and Enterprise Architecture

Enterprise architecture develops the architecture for the enterprise, right? You’d think that’s a no-brainer. Except what happens when the enterprise is so large and complex that it defies the efforts to architect it?

Federal Computer Week (FCW), 24 March 2008 reports that Dennis Wisnosky, the chief architect and chief technical officer for DoD’s Business Mission Areas states that “the Department [of Defense (DoD)] is too large an organization to attempt to encompass all of its activities in a single enterprise architecture.”

Similarly, FCW, 26 November 2007, reported that “the size of the Navy Department and the diversity of its missions make it impossible to describe the service in a single integrated architecture.”

Dennis Wisnosky goes on to say that “DoD must achieve business transformation by breaking off manageable components of an enterprise architecture rather than trying to cover everything at once…[this is how we will achieve] the goal of an enterprise architecture [which] is to guide future acquisition and implementation.”

Richard Burk, former chief architect of the Federal EA (FEA) at OMB states: “there is no practical way to create a useful architecture for a large organization. You can get an overall picture of an agency using an [enterprise architecture] of everything the agency does, but when you get down to making it operational, at that point you really need to break it down into segments, into the lines of business.”

The Navy is using the concept of segment architecture, but is calling it “architecture federation.”

Michael Jacob, the Navy’s chief technology officer, “compared the architecture effort to the development of a city plan, in which multiple buildings are built separately, but to the same set of standards and inspection criteria.”

Mr. Jacob continues that “our effort will allow common core architecture elements [technical standards, mission areas, business processes, and data taxonomies] to be identified so that architecture efforts can be aligned to those same standards.”

I believe that every level of an organization, including the highest level, can have a architecture, no matter what the size, and that we should tailor that architecture to the scope of the organization involved. So for an organization the mega-size of DoD, you would have very little detail in at the highest level, EA (like the FEA Practice Guidance demonstrates), but that the detail would build as you decompose to subsequent layers.

For any organization, no matter its size, every level of the architecture is important.

Within the enterprise architecture itself we need multiple views of detail. For example, from an executive view, we want and need to be able to roll up organizational information into summary “profiles” that executives can quickly digest and use to hit core decision points. At the same, time, from a mid-level manager or analyst view, we want and need to be able to drill down on information—to decompose it into models and inventory views--so that we can analyze it and get the details we need to make a rational decision.

Similarly, within the overall architecture, we need the various views of enterprise, segment, and solutions architecture. The enterprise view is looking at strategic outcomes for the overall enterprise; the segment view decomposes this into actionable architectures for the lines of business; and the solutions architecture “brings it all home” and operationalizes the architectures into actual solutions.

Just like with the profiles, models, and inventories of enterprise architecture where we can roll-up or down, the key with these various architectural levels is that there is line-of-sight from the enterprise to the segment and to the solution. The lower levels must align to and comply with the levels above. This is how we achieve integration, interoperability, standardization, and modernization.


Share/Save/Bookmark

February 17, 2008

DoD Enterprise Architecture

In a world where information superiority can mean battlefield victory, enterprise architecture is critical to military transformation and execution.

Military Information Technology, 11 February 2008, reports “Enterprise Architecture: Key to Netcentricity.”

http://www.military-information-technology.com/article.cfm?DocID=2328

Why is EA important in general:

“An actionable EA provides organizational leaders information sufficient to make enterprise plans, investment resource and management decisions, and to optimize key operational and support processes.”

Why is EA important to The Department of Defense?

The warfighter relies on information superiority to sense a threat, decide on a course of action, and execute faster than the enemy. This is not much different than survival in America’s Wild West years ago, by those who had the fastest [gun] draw.

Today, “The OODA [observe, orient, decide, act] loop is a 'sense and respond' cycle driven by actionable data and information for superior information management, battlespace awareness, and operational decision-making...when organizational components use rich and timely information, dramatically improved battlespace operations effectiveness can be realized…the single unifying approach that delivers the needed information and insight is enterprise architecture."

What is netcentricity?

Netcentricity or “network-centric operations (NCO) enables military forces to anticipate and adapt rapidly to changes in the environment such as enemy warfare tactics. NCO touches all aspects of department operations and, by integrating organizational networks and information, enables enhanced warfare operations effectiveness. NCO is enabled through dramatic changes in mindsets, processes, IT and access to information and networks.”

“An actionable EA is critical to the DoD realizing netcentric capabilities.”

Unfortunately DoD is struggling to implement actionable EA. The General Accountability Office (GAO)…in 2006 found that the EA programs of the departments of the Air Force, Navy, and Army were among the four most immature EA programs within the government.

What does DoD need to advance their EA?

GAO found that “strong executive leadership could resolve all the challenges organizations experienced in developing and using actionable EA capabilities.”

Transformational leaders in DoD will provide the “vision, integrity, communication, inspiration, and empowerment.” And they “empower organizational members with human, material, and financial resources to accomplish the vision.”

EA cannot be achieved without management commitment and adequate resources!

What about the DoD leaders who say that EA cannot be implemented “because the organization is too complex”?

This thinking is sort of ironic, because EA is what captures information, analyzes and catalogues it, and serves it up to the end-users to enable better decision-making. EA is what simplifies information and makes it transparent enabling strategic transformation and the realization of netcentric capabilities.

EA is exactly what DoD needs for evaluating itself, planning its future state, and transitioning itself to achieve its goals of battlespace superiority through information superiority.

"Implementing an actionable EA capability can take up to five years and requires...[DoD leaders need to] focus on long-term performance improvements," through enterprise architecture implementation.


Share/Save/Bookmark

September 7, 2007

Information Sharing Best Practices

There are currently two major federal best practices for information sharing: Netcentricity and the Information Sharing Environment.

The Department of Defense (DoD) adopted a Netcentric Strategy in May 2003.

  • Netcentricity—Netcentricity seeks to ensure data visibility, availability, and usability to accelerate decision-making. This includes data tagging (metadata), posting data to shared spaces, and enabling the many-to-many exchange of data (i.e. many users and applications can access the same data instead of point-to-point interfaces). Netcentricity is the realization of a networked environment.
  • Global Information Grid (GIG)—The GIG is a globally interconnected, end-to-end set of information capabilities, associated processes and personnel for collecting, processing, storing, disseminating and managing information on demand to warfighters, policy makers, and support personnel. The GIG includes all owned and leased communications and computing systems and services, software, data, security services and other associated services necessary to achieve information superiority.
Netcentricity is a strategy for sharing information. As the DoD strategy states: The data strategy is to “shift from private data to community or Enterprise data as a result of increased data “sharing” in the netcentric environment. Tagging, posting, and sharing of data are encouraged through the use of incentives and metrics.” (adapted from DoD Net-Centric Strategy from defense.link.mil, public site)

In 2004, the concept of Netcentricity was extended to the Director of National Intelligence (DNI)’s Information Sharing Environment with the passing of the Intelligence Reform and Terrorism Prevention Act (IRTPA).

  • Information Sharing Environment (ISE)The IRTPA requires the President to establish an ISE “for the sharing of terrorism information in a manner consistent with national security and with applicable legal standards relating to privacy and civil liberties” and the IRTPA defines the ISE to mean “an approach that facilitates the sharing of terrorism information.”

The ISE seeks to “facilitate trusted partnerships among all levels of government, the private sector, and foreign partners…[and to] promote an information sharing culture among partners by facilitating the improved sharing of timely, validated, protected, and actionable terrorism information.” (adapted from Information Sharing Environment Implementation Plan from ISE.gov, public site)

Both Net-centricity and ISE are best practices at increasing information sharing to improve and speed up decision-making and protect our nation and its citizens!

  • As the DoD Net-Centric Strategy states: “the core of the net-centric environment is the data that enables effective decisions.”
  • And similarly, in the ISE Implementation Plan, we read, “the highest priority in creating the ISE must be on facilitating, coordinating and expediting access to protected terrorism information.”

In User-centric EA, information sharing, as appropriate, is one of the primary goals of the architecture. Information is one of the six perspectives (performance, business, information, services, technology, and security, and a seventh to be added is human capital) of the EA. The primary principal of the Information perspective is information sharing and accessibility. Further, the Federal Enterprise Architecture (FEA) Data Reference Model (DRM) is driven by the enablement of sharing information across the federal government and to its partners. The methodology is as follows:

  • Consistently describe data (via metadata)
  • Register the data (to make it discoverable)
  • Develop standards for the exchange of data (to enable interoperability and accessibility)
  • Provide sound governance (including data policy and stewardship).

User-centric EA is driven to fulfill the vision of Net-centricity and ISE.


Share/Save/Bookmark