Mime-Version:
1.0
Date:
Mon, 24 Mar 1997 07:05:03 -0500
X-cc:
[log in to unmask], [log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], [log in to unmask],
[log in to unmask], [log in to unmask], #SSIT < [log in to unmask]>,
Jorge Alvarez < [log in to unmask]>,
Elizabeth Gramoy < [log in to unmask]>, Joe Grant < [log in to unmask]>,
Jackie Hall < [log in to unmask]>, Susan Howell < [log in to unmask]>,
Ed Hutmire < [log in to unmask]>, Lyn Jackson < [log in to unmask]>,
Sherwin Jacobson < [log in to unmask]>, Jiausen Jih < [log in to unmask]>,
Neal Pollock < [log in to unmask]>, LT Dan Rieken < [log in to unmask]>,
CDR Shaun Taylor < [log in to unmask]>,
DoD Software Roundtable < [log in to unmask]>,
Alexander Lewin < [log in to unmask]>,
Phil Andrews < [log in to unmask]>,
Carl Andriani < [log in to unmask]>, Clyde Roby < [log in to unmask]>
Content-Transfer-Encoding:
quoted-printable
Content-Type:
text/plain; charset=US-ASCII
|
Dear Mr. Paige and Colleagues,
My email of Friday, 21 March titled: "Re[2]: Reason for Mr. Paige's Decision
Unclear" regrettably contains a virus. I have been notified by about 10 people
that the Microsoft Word attachment to this email titled "forpaige.doc" contains
a variation of the Wazzu virus.
The IBM AntiVirus checker we use here did not detect any problems with the
forpaige.doc file. However, our checker is 7 months old and the WM.Wazzu.gen
virus apparently is newer. The reported virus is the "WM.Wazzu.gen." I found out
the following from a search of "WM.Wazzu" on AltaVista ["WM.Wazzu.gen" had no
matches]:
> WM.Wazzu.a - This curious virus contains a macro that, like the
> concept virus, attaches to Word documents. When activated, wazzu
> randomly inserts the word > "wazzu" in your document. (Go figure!) Dr.
> Solomon's does NOT detect this virus. It was discovered on a Student
> Lab PC while running the FINDVIRU virus checker. If you encounter this
> virus, please contact the Helpdesk as soon as possible. 727-5536 or
> e-mail: [log in to unmask]
You will want to delete the original transmitted file called "forpaige.doc". I
have attached a copy of the file in ASCII text. If you have not opened the
forpaige.doc, please do not. If you have opened the file, I am told there
probably is not a problem unless you also evoke other Word files, in which case
you will infect them as well. To be safe, you should have your system analyzed
using a virus checker capable of detecting and correcting the WM.Wazzu.gen
virus.
I apologize for any inconvenience I have caused.
v/r
Currie
P.S. I will be out of the office on travel until 31 March.
ASCII Version of forpaige.doc =>
------------------------------------------------------------------------
Strawman for
Software Acquisition Manager
Training Needs
Purpose: This Strawman addresses the knowledge and skills needed by a software
acquisition manager to support the acquisition of a software dependent system.
This knowledge and skills may also be desirable for other acquisition personnel
such as the program manager.
Context: The knowledge and skills for a software acquisition manager must be
driven by systems engineering of which software engineering is a significant
part. Also the knowledge and skills for a software acquisition manager are
driven by acquisition policy. The current thrust in the DoD is to use
performance specifications which focus on what to build and not how to build.
Knowledge and Skills: The knowledge and skills necessary for the software
acquisition manager are categorized in 3 general areas: People, Process, and
Technology:
1. People: People make the acquisition happen through the effective use of
technology and processes. People with the right skills are necessary on both the
acquisition side and on the development side. Effective use of people will
impact the cost, schedule, and quality of a project. Knowledge necessary for
software acquisition personnel would help answer the following questions:
· What are the useful organizational approaches that make sense in developing
software?
· What should one look for in a proposal in evaluating the effectiveness of the
organization for developing software?
· What are the dangerous organizational approaches that result in poor quality
software?
2. Process: Processes allow a software acquisition manager with the
necessary tools to manage the acquisition from the perspective of Cost,
Schedule, and Quality. When plans fail managers sacrifice quality to achieve
cost and schedule. Projects that are late have typically (but not always)
seriously compromised quality. This results in a poorer product delivered to the
fleet as well as significantly higher life-cycle costs. Important knowledge
include Mil-Std 498, ISO/IEC 12207, CMM, SPICE, SA CMM, Best Practices (SPMN),
Software development strategies (e.g., evolutionary, incremental, build,
waterfall), Documentation methodologies, Software metrics, Configuration
Management, Cleanroom, Inspections, Planning strategies, Testing strategies,
Software Quality (SA) strategies, Independent Verification and Validation (IV&V)
strategies, things to put into an RFP, things to look for in a proposal, and the
evolving acquisition environment. Software acquisition personnel must be aware
of the tradeoff of COTS and proprietary software within an acquisition to commit
the government into future contracts.
3. Technology: Knowledge of software technology can be critical in the
current acquisition environment of knowing what to ask for in the performance
specification. Technology provides feasible engineering solutions to meet the
systems requirements. Knowledge of the technology options available will have an
impact on what we can ask in the RFP. Later, knowledge of these technologies is
important for evaluating the approaches of alternative technology proposed by a
vendor. Technologies can seriously impact the cost, schedule, quality, and
long-term life-cycle support of a project so the benefits and tradeoffs
associated with their use must be well understood. Examples of key technologies
software acquisition personnel should know include:
· Benefits/Tradeoffs in using WWW and Java technologies within C4ISR;
· Benefits/Tradeoffs of Ada versus C++ within C4ISR;
· Benefits/Tradeoffs of Interface technology within C4ISR;
· Benefits/Tradeoff of using Open Systems approaches within C4ISR;
· Benefits/Tradeoffs of using the TAFIM for C4ISR systems;
· Benefits/Tradeoffs of using the Joint Tactical Architecture for C4ISR;
· Benefits/Tradeoffs of using UNIX/POSIX versus Run-time Executives within
C4ISR;
· Benefits/Tradeoffs of using different scheduling algorithms within a single
processor and within the distributed C4ISR software environment;
· Benefits/Tradeoffs in using Expert System technology within C4ISR;
· Benefits/Tradeoffs in using Artificial Technology within C4ISR;
· Benefits/Tradeoffs in using Virtual Reality within C4ISR;
· Benefits/Tradeoffs in using Safety-Critical technologies within C4ISR;
· Benefits/Tradeoffs in using modeling and Simulation technologies with C4ISR;
· Benefits/Tradeoffs of using Object Oriented Technologies versus conventional
technologies for developing C4ISR; OOA???, OOD???, OBP???, OOP???
· Benefits/Tradeoffs in using Client/Server technology within C4ISR;
· Benefits/Tradeoffs in using CORBA technology within C4ISR;
· Benefits/Tradeoffs is the use of different Software Engineering Environments
for developing C4ISR systems;
· Benefits/Tradeoffs in using CASE tools within C4ISR;
· Benefits/Tradeoffs in using various software development methodologies within
C4ISR;
· Benefits/Tradeoffs in using formal methods for analyzing requirements and
specifications in C4ISR environments;
· Benefits/Tradeoffs in using Encryption/Security technologies within C4ISR;
· Benefits/Tradeoffs in using Domain Modeling and reuse technologies within
C4ISR;
· Benefits/Tradeoffs in different architectural approaches within C4ISR;
· Benefits/Tradeoffs of different networking approaches within C4ISR;
· Benefits/Tradeoffs of automatic testing approaches within C4ISR;
· Benefits/Tradeoffs of Information Warfare technologies within C4ISR;
· Benefits/Tradeoffs of using COTS within C4ISR and if COTS is used, the
appropriate mechanisms to integrate the COTS into the system;
· Benefits/Tradeoffs of integration technology for evolving legacy systems
within the C4ISR environment.
One initial observation is that software technologies encompass many diverse
areas. It is not likely to find a single individual knowledgeable in each of
these technologies. It should be noted that the benefit/tradeoff knowledge level
for a technology is significantly less than a working knowledge of that
technology. Program Directorates may want to foster a working knowledge for
certain software technologies critical to their mission domain.
The new acquisition rules mean we have to be smarter in what we can ask for and
smarter in our approach for evaluating proposals. Lack of knowledge of the
benefits & tradeoffs of these technologies is a serious problem not only for the
software acquisition manager, but also for general program manager types. For
example, the first item on the list is Benefits/Tradeoffs in using WWW and Java
technologies within C4ISR; a software acquisition manager should know how the
technology could be applied to a procurement, both from the perspective of
knowing what capabilities to ask for in an RFP and from the perspective of
analyzing proposal approaches. Not understanding the power of this important
technology might, for example:
· Cause the RFP to be written in such a way that WWW and Java
technologies are precluded in the vendor's solution space;
· Cause proposals advocating the use of WWW and Java technologies
to be poorly evaluated as the evaluator might not understand how
the technology is an appropriate solution to the C4ISR domain.
It should be noted that each of the above technologies has risks for using and
risks for not using the technology. These risks frequently have a serious cost
impact on program maintenance, for example, current acquisition policy on the
use of COTS can result in a very effective system delivered to the Fleet. An
excellent example of an effective system using COTS was recently demonstrated on
the Theodore Roosevelt for the Scaleable High Performance LAN (SHPL) & Advanced
Power Projection Planning & Execution (APPEX) programs. However, common sense
must be applied as COTS poorly selected and poorly integrated could result in
requirements not being satisfied or life-cycle costs an order of magnitude
higher than alternative approaches. For example, the BSY-2 program found no COTS
product that could support the real-time database requirements, despite working
with database vendors for years. A real-time database engine had to be
developed. Then again, had SHPL & APPEX been custom built, such technology as
the WWW would neither be easily integrated into the aircraft carrier nor
inexpensively evolveable as the WWW technology evolves. Systems/software
acquisition personnel must understand the technologies involved to understand
the risks of using or not using each technology.
Summary: Education and training in these people, process, and technology areas
are desirable to improve expertise and knowledge of software acquisition
personnel. This education and training must be done in the context of software
engineering partnered with systems engineering to acquire a system under the DoD
acquisition rules.
|
|