Enviar pesquisa
Carregar
Agile and the DoD
•
3 gostaram
•
3,894 visualizações
John Goodpasture
Seguir
A whitepaper on agile methods applied to the U.S. Department of Defense
Leia menos
Leia mais
Negócios
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 14
Baixar agora
Baixar para ler offline
Recomendados
Military Command Post of the Future
Military Command Post of the Future
AFRIKASOURCES
Future Naval Plans & Requirements Summit
Future Naval Plans & Requirements Summit
Alexa Deaton
Odum.t.averbeck.r
Odum.t.averbeck.r
NASAPMC
Seftas.george
Seftas.george
NASAPMC
Future Naval Plans & Requirements Summit.Pd
Future Naval Plans & Requirements Summit.Pd
AndrewDrummond
LTTT Week 2 H4D Stanford 2016
LTTT Week 2 H4D Stanford 2016
Stanford University
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
Mikko Jakonen
Blue and Gray Berets H4D Final Presentation
Blue and Gray Berets H4D Final Presentation
H4Diadmin
Recomendados
Military Command Post of the Future
Military Command Post of the Future
AFRIKASOURCES
Future Naval Plans & Requirements Summit
Future Naval Plans & Requirements Summit
Alexa Deaton
Odum.t.averbeck.r
Odum.t.averbeck.r
NASAPMC
Seftas.george
Seftas.george
NASAPMC
Future Naval Plans & Requirements Summit.Pd
Future Naval Plans & Requirements Summit.Pd
AndrewDrummond
LTTT Week 2 H4D Stanford 2016
LTTT Week 2 H4D Stanford 2016
Stanford University
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
Mikko Jakonen
Blue and Gray Berets H4D Final Presentation
Blue and Gray Berets H4D Final Presentation
H4Diadmin
Forward Operating Bases 2012
Forward Operating Bases 2012
Sharmin Ahammad
M 6 (Progeny)
M 6 (Progeny)
mcd202dc
Air Launched Weapons
Air Launched Weapons
eduardo becerra
Fuller.david
Fuller.david
NASAPMC
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
Government
IDGA Irregular Warfare COTS Deck
IDGA Irregular Warfare COTS Deck
rgiuntini
Fmc close out repot hse dept. rev.000
Fmc close out repot hse dept. rev.000
Fitri Ifony
Managing improvement v4
Managing improvement v4
Rob England
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Pedram Danesh-Mand
IBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue Box
Daniele Bolletta
Pharma project risk management
Pharma project risk management
Megha Kotak, PMP
Project Risk Management
Project Risk Management
Oleksa Stelmakh
Project risk management - Methodology and application
Project risk management - Methodology and application
Marco De Santis, PMP, CFPP
PMP_Project Risk Management
PMP_Project Risk Management
Hisham Haridy MBA, PMP®, RMP®, SP®
Health and safety plan generic
Health and safety plan generic
firstpick
Risk Management Framework
Risk Management Framework
Anand Subramaniam
Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier Management
Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier Management
Infosys
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
James Rutt
CTLR 2010 Issue 7 Waterfall Contract
CTLR 2010 Issue 7 Waterfall Contract
susanatkinson
24 Feb 2016, Soldiers Five Presentation and Photos
24 Feb 2016, Soldiers Five Presentation and Photos
Blake Barrett CSC
Doug maughan ppt
Doug maughan ppt
gbass12
DoDi 5000.02 And Resource Informed Army Modernization
DoDi 5000.02 And Resource Informed Army Modernization
William Bajusz
Mais conteúdo relacionado
Mais procurados
Forward Operating Bases 2012
Forward Operating Bases 2012
Sharmin Ahammad
M 6 (Progeny)
M 6 (Progeny)
mcd202dc
Air Launched Weapons
Air Launched Weapons
eduardo becerra
Fuller.david
Fuller.david
NASAPMC
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
Government
IDGA Irregular Warfare COTS Deck
IDGA Irregular Warfare COTS Deck
rgiuntini
Mais procurados
(6)
Forward Operating Bases 2012
Forward Operating Bases 2012
M 6 (Progeny)
M 6 (Progeny)
Air Launched Weapons
Air Launched Weapons
Fuller.david
Fuller.david
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
IDGA Irregular Warfare COTS Deck
IDGA Irregular Warfare COTS Deck
Destaque
Fmc close out repot hse dept. rev.000
Fmc close out repot hse dept. rev.000
Fitri Ifony
Managing improvement v4
Managing improvement v4
Rob England
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Pedram Danesh-Mand
IBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue Box
Daniele Bolletta
Pharma project risk management
Pharma project risk management
Megha Kotak, PMP
Project Risk Management
Project Risk Management
Oleksa Stelmakh
Project risk management - Methodology and application
Project risk management - Methodology and application
Marco De Santis, PMP, CFPP
PMP_Project Risk Management
PMP_Project Risk Management
Hisham Haridy MBA, PMP®, RMP®, SP®
Health and safety plan generic
Health and safety plan generic
firstpick
Risk Management Framework
Risk Management Framework
Anand Subramaniam
Destaque
(10)
Fmc close out repot hse dept. rev.000
Fmc close out repot hse dept. rev.000
Managing improvement v4
Managing improvement v4
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
IBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue Box
Pharma project risk management
Pharma project risk management
Project Risk Management
Project Risk Management
Project risk management - Methodology and application
Project risk management - Methodology and application
PMP_Project Risk Management
PMP_Project Risk Management
Health and safety plan generic
Health and safety plan generic
Risk Management Framework
Risk Management Framework
Semelhante a Agile and the DoD
Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier Management
Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier Management
Infosys
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
James Rutt
CTLR 2010 Issue 7 Waterfall Contract
CTLR 2010 Issue 7 Waterfall Contract
susanatkinson
24 Feb 2016, Soldiers Five Presentation and Photos
24 Feb 2016, Soldiers Five Presentation and Photos
Blake Barrett CSC
Doug maughan ppt
Doug maughan ppt
gbass12
DoDi 5000.02 And Resource Informed Army Modernization
DoDi 5000.02 And Resource Informed Army Modernization
William Bajusz
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
jenkinsmandie
Agile Project Management Methods of IT Projects
Agile Project Management Methods of IT Projects
Glen Alleman
Agile and earned value management
Agile and earned value management
Dr Ezzat Mansour
Hacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) View
Government Contract Pricing Summit
Session Three: Defence Authority for C4ISR
Session Three: Defence Authority for C4ISR
Royal United Services Institute for Defence and Security Studies
Trends in Cloud Computing
Trends in Cloud Computing
awais mushtaq
Implementing security
Implementing security
Dhani Ahmad
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
The value of agility
The value of agility
Boxer Research Ltd
7 Myths of Agile Development
7 Myths of Agile Development
Intelliware Development Inc.
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Livingstone Advisory
Wendy Nather - Building a Rube Goldberg Application Security Program
Wendy Nather - Building a Rube Goldberg Application Security Program
Source Conference
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologies
Livingstone Advisory
Semelhante a Agile and the DoD
(20)
Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier Management
Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier Management
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
CTLR 2010 Issue 7 Waterfall Contract
CTLR 2010 Issue 7 Waterfall Contract
24 Feb 2016, Soldiers Five Presentation and Photos
24 Feb 2016, Soldiers Five Presentation and Photos
Doug maughan ppt
Doug maughan ppt
DoDi 5000.02 And Resource Informed Army Modernization
DoDi 5000.02 And Resource Informed Army Modernization
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
Agile Project Management Methods of IT Projects
Agile Project Management Methods of IT Projects
Agile and earned value management
Agile and earned value management
Hacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) View
Session Three: Defence Authority for C4ISR
Session Three: Defence Authority for C4ISR
Trends in Cloud Computing
Trends in Cloud Computing
Implementing security
Implementing security
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
The value of agility
The value of agility
7 Myths of Agile Development
7 Myths of Agile Development
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Wendy Nather - Building a Rube Goldberg Application Security Program
Wendy Nather - Building a Rube Goldberg Application Security Program
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologies
Mais de John Goodpasture
Five tools for managing projects
Five tools for managing projects
John Goodpasture
Risk management short course
Risk management short course
John Goodpasture
Agile in the waterfall
Agile in the waterfall
John Goodpasture
RFP template
RFP template
John Goodpasture
Agile earned value exercise
Agile earned value exercise
John Goodpasture
Agile 103 - the three big questions
Agile 103 - the three big questions
John Goodpasture
Agile for project managers - a sailing analogy-UPDATE
Agile for project managers - a sailing analogy-UPDATE
John Goodpasture
Feature driven design FDD
Feature driven design FDD
John Goodpasture
Dynamic Systems Development, DSDM
Dynamic Systems Development, DSDM
John Goodpasture
Agile for project managers - A presentation for PMI
Agile for project managers - A presentation for PMI
John Goodpasture
Five risk management rules for the project manager
Five risk management rules for the project manager
John Goodpasture
Building Your Personal Brand
Building Your Personal Brand
John Goodpasture
Portfolio management and agile: a look at risk and value
Portfolio management and agile: a look at risk and value
John Goodpasture
Project examples for sampling and the law of large numbers
Project examples for sampling and the law of large numbers
John Goodpasture
Agile for project managers - a sailing analogy
Agile for project managers - a sailing analogy
John Goodpasture
Risk management with virtual teams
Risk management with virtual teams
John Goodpasture
Bayes Theorem and Inference Reasoning for Project Managers
Bayes Theorem and Inference Reasoning for Project Managers
John Goodpasture
Adding quantitative risk analysis your Swiss Army Knife
Adding quantitative risk analysis your Swiss Army Knife
John Goodpasture
Business value and kano chart
Business value and kano chart
John Goodpasture
Agile for Business Analysts
Agile for Business Analysts
John Goodpasture
Mais de John Goodpasture
(20)
Five tools for managing projects
Five tools for managing projects
Risk management short course
Risk management short course
Agile in the waterfall
Agile in the waterfall
RFP template
RFP template
Agile earned value exercise
Agile earned value exercise
Agile 103 - the three big questions
Agile 103 - the three big questions
Agile for project managers - a sailing analogy-UPDATE
Agile for project managers - a sailing analogy-UPDATE
Feature driven design FDD
Feature driven design FDD
Dynamic Systems Development, DSDM
Dynamic Systems Development, DSDM
Agile for project managers - A presentation for PMI
Agile for project managers - A presentation for PMI
Five risk management rules for the project manager
Five risk management rules for the project manager
Building Your Personal Brand
Building Your Personal Brand
Portfolio management and agile: a look at risk and value
Portfolio management and agile: a look at risk and value
Project examples for sampling and the law of large numbers
Project examples for sampling and the law of large numbers
Agile for project managers - a sailing analogy
Agile for project managers - a sailing analogy
Risk management with virtual teams
Risk management with virtual teams
Bayes Theorem and Inference Reasoning for Project Managers
Bayes Theorem and Inference Reasoning for Project Managers
Adding quantitative risk analysis your Swiss Army Knife
Adding quantitative risk analysis your Swiss Army Knife
Business value and kano chart
Business value and kano chart
Agile for Business Analysts
Agile for Business Analysts
Último
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
ShrutiBose4
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
ashishs7044
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
DallasHaselhorst
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
Kirill Klimov
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
Riya Pathan
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
ictsugar
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
Data Analytics Company - 47Billion Inc.
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
Olivia Kresic
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
ashishs7044
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
Call girls in Goa, +91 9319373153 Escort Service in North Goa
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
ashishs7044
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
callgirls2057
PSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
Anamaria Contreras
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
dollysharma2066
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory: summary 2024
Matteo Carbone
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
ashishs7044
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
Seta Wicaksana
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
ictsugar
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
richard876048
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
ssuserf63bd7
Último
(20)
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
PSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory: summary 2024
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
Agile and the DoD
1.
Agile and the
U.S. Department of Defense A whitepaper by John C Goodpasture, PMP November, 2009 © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 1 of 14
2.
Agile and the
U.S. Department of Defense Agile methods have a useful but limited role in Defense programs, providing quick-reaction capability, effective methodology for many Web applications, and a source of potential innovation for Defense needs. The primary objective of Defense acquisition is to acquire quality products that satisfy user needs with measurable improvements to mission capability and operational support, in a timely manner, and at a fair and reasonable price. “Introduction to Defense Acquisition Management”1 There is certainly no conflict between agile methods and the primary objective of Defense acquisition, as given in the opening quotation. Customer value, timeliness, and investor satisfaction, albeit in a government context, are all there. There is no lack of adoption: just search the Large scale acquisition programs5 for the archives at the Air Force Software Technical U.S. Department of Defense, DoD are Support Center’s publication “Crosstalk – perhaps the pinnacle of formal process and The Journal of Defense Software high ceremony. To be sure, DoD is not Engineering” for any number of ‘agile’ alone with programs of grand scale, leading words and you will find well more than a edge technology, and complexity that hundred articles in the return, many citing stretches the imagination. successful case studies.2 Look for examples in the space programs of In fact, within the strictures for Defense the various space-faring nations; acquisition, there is an acquisition process construction projects of complex buildings called ‘evolutionary acquisition’ that and infrastructure world-wide; nuclear, embraces many agile values and principles.3 conventional, and alternative energy projects And like all large enterprises, software of all kinds; advanced physics and material intensive projects in the Department of sciences; bio-engineering; and many others. Defense range from relatively simple Web However, the long-standing and well functionalities for the agencies and services documented methodologies and practices of all the way to mission critical and life the DoD are an excellent example of critical applications and systems for the formality and doctrine applied to programs warfighter. Consequently, a range of project and projects. Therefore, for the purposes of capabilities is applicable, including agile, this book, we will use the DoD as our according to needs and requirements.4 surrogate for high-ceremony methodology on an enterprise scale. © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 2 of 14
3.
—Directive
5000.01, “The Defense Free information on DoD values, principles, Acquisition System”, that establishes the and practices is available from the Defense Defense acquisition system, and Acquisition University6, and various Defense documents in the public domain, —Instruction 5000.02, “Operation of the starting with these two: Defense Acquisition System” that gives operating instructions and guidance. Agile and the military • XP depends on discipline, something the military is quite good at. • SCRUM envisions a product master, a role provided by the acquisition agencies • EVO envisions incremental and evolutionary A project management tip deliveries from a string of short waterfalls, almost identical in description to the ‘evolutionary development’ in the DoD instructions • Crystal envisions harnessing the ingenuity of individuals adapting to situations; small units in DoD are trained to act on their on recognizance. Slicing and dicing finds the agile spot As in most businesses, projects in DoD come in all sizes. The business case for a defense acquisition determines the Acquisition Category, ACAT, within which the program lies. ACATs number I to IV, and are largely defined by dollars and milestone decision authority with ACAT I being the category for the largest programs.7 Within DoD, programs are classified in a The other two classifications are Command, number of different ways; one way is by Control, Communications, and Intelligence technology content. Software is one of those [C3I], and Embedded Systems. The latter technologies – ‘software intensive’ systems are typically found in warfighter systems are those for which the dominate technology like avionics, vehicular, man-pack, and ship- is software. ‘Software intensive’ is further borne systems and tend to have critical classified by application and domain: specifications. Automated Information Systems, AIS, is one of the three general classifications of There are other views and classifications DoD software intensive systems, primarily sanctioned within DoD. For instance, there for business systems within DoD; AIS are functional and technical domain views, ACAT III programs are relatively smaller either vertical or horizontal. There are three and less complex defense undertakings that primary vertical domains: business, are potential candidates for agile methods.8 intelligence, and warfighter. © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 3 of 14
4.
For example, in
business systems, there may methodology; according to Air Force be personnel, logistics, and planning doctrine9 evolutionary development is systems. In C3I, there may be intelligence, applicable to projects where: strategic, tactical, and field systems; and in warfighter domains there may be fire —Requirements are uncertain and the user control, motion control, and electronic needs “… ‘early functionality’ delivered to warfare. refine requirements for subsequent deliveries”; In the horizontal domains, there are security and communication protocols, tools and —User needs are uncertain; simulators, and user interface systems. —Technical feasibility present high risks; Acquisition managers often look at lifecycle and views. There are four acquisition lifecycles at the top level: traditional, top-down — An early IOC10 is required. sequential with iteration; evolutionary with incremental delivery; spiral; and incremental The other three lifecycles have a traditional without evolution. The evolutionary definition. lifecycle is much like any agile The agile spot in DoD So, putting it all together, agile is a candidate for software intensive, evolutionary programs; Most likely they are ACAT III, or at the discretion of the Component Acquisition Authority, for funding and decision authority, and They may be in any of the domains. Program managers are in the authority chain In DoD jargon, programs and projects are defined in much the same way as they are in the non- defense literature. Programs are collections of projects, and projects are one-time endeavors to produce a set of outcomes needed by user component. Acquisitions, programs, and projects are manager. Many instructions and regulations managed activities. The roles are defined in can be waived by managers at various levels Table 1.11 For agile projects the important when dollar limits are low and specifications thing to take note is that for ACAT III are not critical. Within the space and programs, the Component Acquisition intelligence community, there is even more Authority has wide latitude, and traditionally latitude given the low volume and one-of-a- delegates all project particulars to the kind nature of space and intelligence Program Executive Authority, who in turn programs.12 has latitude to delegate to the program © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 4 of 14
5.
Table 1 DoD
Management Roles Typical Title Management duties on DoD programs Defense • The defense under-secretary responsible for acquisition for Acquisition the DoD Executive Component • The service secretaries and defense agency directors Acquisition • The CAE is the ultimate authority within their components Executive, CAE for acquisition Program • A manager with executive authority over multiple programs Executive Officer, PEO • Typically a general officer or civilian equivalent • The manager whose principal duty is gathering and validating end-user needs, developing the investment Program Manager budget, planning program decision milestones, validating requirements for joint service interoperability, and operations and maintenance [O&M] budgeting and planning • The manager whose principal duty is acquiring the product even if the product is produced on a contract. • Manage contract requirements and technical management of Acquisition contracts, other specifications and standards, and overall Manager management of resources allocated from the program to the project. • The duties may also include management of key reviews leading to decision milestones. • The manager whose principle duty is the day to day management of a project, to include planning, organizing, Project Manager controlling, and managing earned value from resources committed. Methodology is flexible within standards All defense programs follow a prescribed defense acquisition management process. However, according to ACAT and other discretion granted to the Component Acquisition Executive in Instruction 5000.02, the Program Executive Officer and the program manager are empowered to tailor practices for less complexity and quicker life cycle. One example of discretion is DoD's possible time, DoD program managers can 'evolutionary acquisition' exceptions already 'cut to the chase' and field functionality noted. Where it is determined by the CAE incrementally and in evolutionary fashion. or PEO that the underlying technology is In these programs, it is recognized up-front mature and available, and there is a that a fully functional capability will come recognized need for capability in the shortest over time. Less than a fully functional © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 5 of 14
6.
system is accepted
for the benefit of an early the work of organizations like ISO, IEC, deployment of essential feature and IEEE, and EIA, the DoD has adopted many function. of their standards as replacements for in- house DoD directives. There are a very large number of practice standards for every aspect of DoD projects. An important example is the adoption of A generation ago, DoD was its own ANSI/EIA 748B, Standard for Earned Value standards body, writing and publishing a Measurement System. Another example: In prodigious body of knowledge in the form the national intelligence community policy of instructions, guidelines, military guidance 105.1 already discussed, there is standards, handbooks, and procedures for direction that specifically allows system projects and programs. Since 1994 onward, engineering to follow nationally recognized it has been DoD policy to govern DoD bodies of knowledge, like that from the design and implementation practices Software Engineering Institute and the according to industry standards insofar as International Council on System possible given the warfighter nature of Engineering.13 defense requirements. Seeking to leverage Phases and Gates The Defense acquisition Major DoD programs are sequential management process between major phases; each phase is The Defense acquisition management life guarded by a gate with formal criteria and a cycle for the U.S. DoD is given in Figure 1 decision authority empowered to open the that is adapted from the “System gate, or not. Engineering Guide” of the Department of Defense. © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 6 of 14
7.
Figure 1, Acquisition
Life Cycle Though not explicit about how much time is typically pre-requisite to milestone reviews. apportioned among phases, suffice to say that the phases run sequentially and finish- All important activities to determine user to-start in precedence based upon the needs and make an assessment of available milestone decisions. technology are outboard of the formally defined phases. These activities have Gates, called milestone reviews, control the processes all to themselves. These activities exit from and entry into phases. Criteria are in effect develop and obtain approval of the defined for moving through the gates business case. Critical success factors are successfully; program decision points are documented. Parallel or enabling events to assess the achievement of the technology programs could be started, or criteria. Decision point reviews are synchronized with the program being © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 7 of 14
8.
approved.
the "FOC" models is made available to all users. IOC is intended to be fully functional In a nod to Mr Royce's ideas and to the ideas but may not be manfacturable in scale. of agile and iterative methods, a subset of However, like the evolutionary acquisition customers may get the advantage of an already discussed, IOC may also be less than "IOC" model before full scale production of fully featured and functional. Iteration in the DoD model At the top level as illustrated in Figure 1-5, milestone decision has been made to move the DoD model departs from Royce's model onto the next phase, it is not the usual insofar as iteration is not planned or practice encouraged between phases. Once the to double back to an earlier phase. other methodologies could be used according to risk and technology, to include However, within phases, the Royce model or agile methods we discuss in this book. Agile requires reconciliation of traditional Defense acquisition practices For the agile project manager, there are a few key practices in normal Defense programs that require reconciliation with agile methods. Among these are the practices of the customer, contracts, and teams; and the system engineer. Four others are earned value management, independent test verification and validation, configuration management, and data management. Customers, contracts, and teams For the most part, DoD end-users are DoD structure but it is a reality driven by represented by acquisition agencies or practicality – there’s simply no way for training and development components.14 hundreds, perhaps many thousands of users These agencies and components are the to participate in a single project. product masters for end-user projects. Therefore, practices like customer teams to Although not an exclusive arrangement, represent large constituent populations, representation rather than direct webinars and webinar demonstrations to participation is a fact is many DoD projects. disparate user groups, wide-spread ‘beta’ Representation puts distance between tests among early adopters, and even developer and user that is not present in collaborative contributions to end-user most commercial agile projects. documentation, not unlike the open Consequently, practices must emerge and community that contributes to Wikipedia, evolve to overcome the disadvantages of are possible mitigations for distance and distance. dispersion of the real end-users.15 Furthermore, the end-user community is Another point is that most software is quite large, although not as large as the mass acquired by contract from developers and software audience for games, social suppliers. Agile methods will more often networking, and home-use applications. So, than not be applied through the channel of a representation is not only a reality of the contract, and the contracting officials will © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 8 of 14
9.
not be the
end-user or even the end-user’s the military is built from the smallest unit component unit. The contract will represent upward. DoD is comfortable with ‘joint’ three points of view: the rules of contract operations involving the mix of military and law held by the contracting officer; the civilian, multiple skills, matrix assignments, project objectives of the project manager; and leadership commensurate with the and the functional needs of the end-user. A situation. successful contractor will satisfy all three constituents. It reasonable and practical to build joint DoD-supplier teams to perform work orders The contracting officer is the only one of the contracted for agile projects. Typically, the three with the statutory power to commit the DoD contribution to the team will be end- government to a contract and authorize user representatives; the contractor will acceptance and payment of contractor provide a workforce and a project manager; invoices. In general terms, the contracting the DoD will have a program manager officer also controls scope and delivery— whose responsibilities end at the water’s that is, insofar as scope and delivery are edge of the actual project operation. That is, explicit in the contract, only the contracting the DoD program manager will have officer can change the obligation of the responsibility for funding, top-level plans, contractor’s performance requirement. assessment of progress, and functional acceptance of the work product; the DoD DoD is comfortable with teams that are project manager will not manage the project small high performance units with day-to-day unless the work is done in-house empowering decision authority. That is how of the acquisition agency. System Engineering Just like in any civilian project, DoD criteria and means to verify and validate projects begin with an idea, a vision, and a satisfaction of the top-level requirements.16 need that is validated by a business case. The project then enters the realm of The job of system engineering is not acquisition. threatened by agile methods, but responsibilities are different. Agile does not DoD acquisition managers work from the embrace a ‘big design up front’ where top-level requirements stated by the user system engineers typically do most of their components or others responsible for the work. System engineering in the agile space user’s needs, and from requirements derived provides ‘just enough’ architecture and from the standing instructions and directives system design to provide guidance for each of the acquisition system. planning wave and direction for each iteration to begin work. System engineering is a mandated discipline in DoD acquisitions as given in Enclosure Assuming agile projects will be conforming 12 of 5000.02 – “Systems engineering shall to evolutionary acquisition, and likely will be embedded in program planning and be be small endeavors well within the designed to support the entire acquisition discretion of PEOs and program managers, life cycle”. The job of system engineering the system engineer has the additional in DoD is two-fold: specify the architecture responsibility of reconciling evolutionary and associated requirements to synthesize a requirements with the overall vision and system design; and specify the acceptance guiding architecture. These responsibilities © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 9 of 14
10.
are explicated recognized
in Chapter 3 of the like it is for any other agile project. DoD “Systems Engineering Fundamentals” guidebook. However, agile does not require detailed requirements from the architect at the outset Contractors working on agile DoD projects since details are developed during each may provide systems engineering, or the iteration. A persistent means to record government may provide the engineering requirements is required for support and talent. In any event, following the dictum follow-on to so-called pre-planned product that every system or product has improvements, P3I. architecture, a systems model is needed just Earned Value Management and the IMS/IMP DoD policy requires earned value value measurement systems. As described management on programs valued at $20M or in Data Item Description 81650, an IMS is a greater. EIA 748 is the directed standard. network schedule that conforms to an There are means to incorporate earned value ‘activity on node’ paradigm; it shows a measurements in agile methods, even for the critical path and all the dependencies among smallest program. In point of fact, earning activities. And, 81650 requires risk value is valuable regardless of the amount at adjustment of schedules, embracing the 3- stake. point estimating procedure used widely in project estimating. An Integrated Master Plan, IMP, is required on programs that require earned value Agile teams’ dependencies can easily be measurement. The IMP is event based; it is rendered in a network schedule. Activities intended to forecast accomplishments to be within a team are not ordinarily scheduled expected at events. In the agile space, formally since a team completes its work in appropriate events are releases. A master a matter of a few weeks; however, there is schedule complements the IMP. nothing to preclude identification of key activities and scheduling their An Integrated Master Schedule, IMS, is interdependencies within the team required on all programs that have earned complement. Independent Test and Verification Development, test, and evaluation [DT&E] the project performance team? Certainly is mandated by 5000.02 Enclosure 6. independent validation where users actually However, there is wide latitude granted the employ the deliverables operationally, or in program manager: “The PM shall design an operational test setting, is probably DT&E objectives appropriate to each phase without question. Generally speaking, in and milestone of an acquisition program.” this book we endorse independent acceptance testing to verify before Agile methods embrace test as integral to validation that the product works. See the design and development process. The Figure 2-2 for our ‘V’ diagram. All other question arises about a Taylor-Deming view testing is appropriately within the agile high of test – to what degree should testing be performance team. independent of the developers and outside © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 10 of 14
11.
Configuration and Data
Management Configuration management is a component that can be examined and evaluated by of system engineering in the DoD world. As constituents. There are also issues of data given in 5000.02 Enclosure 12 for Systems rights and ownership of intellectual property Engineering, the management team will “… by the myriad participants in a DoD project. use a configuration management approach to establish and control product attributes and Again, Enclosure 12 comes into play: the technical baseline across the total system Enclosure 12 makes data management a life cycle.” This is a matter of establishing system engineering responsibility. It is permanence and change control over the incumbent on the program manager and the product baseline. No less is expected in system engineer to establish a ‘data commercial projects where product baseline management strategy’ consistent with the control is carefully exercised. project’s agility, long-term P3I possibilities, and the needs of the user community. Data management extends to the broader topic of information management. Unlike Each situation will be different; the latitude commercial agile projects where common afforded program managers on smaller scale practice is whiteboards, CRC cards, user projects is the key to effective strategy for stories on 3x5s, and etc, projects in the the performance teams and the project public domain must have permanent records beneficiaries. Summary and take-away points • Our theme is agile methods have a useful but limited role in Defense programs, providing quick-reaction capability, effective methodology for many Web applications, and a source of potential innovation for Defense needs. • Right from the top evolutionary and incremental methods are encouraged by DoD to solve a number of acquisition needs. • Acquisition officials, right down to the program manager, are afforded much latitude to get the job done. Adoption has begun within many software intensive systems in all domains. • However, there are limitations: mission and life critical needs, certain high security needs, and programs on the scale that is routine in the DoD are not appropriate to agile methods because there is insufficient rigor and scalability to the practices. • System engineering, with its included tasks of test, data management, and configuration management, is an important skill to have on the agile project. System engineering brings thoughtful architecture that in the end will pay lifecycle benefits. • In the main, DoD will benefit from agile methods applied with discretion and thoughtfulness because agile projects are inherently timely and cost effective. © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 11 of 14
12.
End notes 1 Editors,
“Introduction to Defense Acquisition Management” Defense Acquisition University Press, Fort Belvoir, VA, December 2008, pg 1 2 http://www.stsc.hill.af.mil/crosstalk/2009/07/index.html 3 USD(AT &L) “DoD Instruction 5000.02, Operation of the Defense Acquisition System” U.S. Department of Defense, 8 December 2008, pg 13 Retrieved from https://acc.dau.mil/dag500002, August 2009 4 At the present time, the only agile method formally recognized in the Defense Acquisition Guidelines, DAG, is the evolutionary acquisition process. However in the Air Force guidelines for system acquisition, Extreme Programming is a recognized design method. According to the Air Force view, waterfall, incremental, evolutionary, and spiral are the four principal lifecycles. See Editors, “Guidelines for Successful Acquisition and Management of Software Intensive Systems: Weapons Systems, Command and Control Systems, Management Information Systems”, Software Technical Support Center, U.S. Department of the Air Force, February, 2003, Chapter 2 pg 4-13; Chapter 15 pg. 7 5 DoD makes a distinction between acquisition and procurement, the latter being for non- developmental items such as parts and supplies and services. Acquisition includes design, engineering, test and evaluation, production, and operations and support of defense systems. 6 See the web link at http://www.dau.mil/pubs/gdbks/idam.asp 7 There are distinctions between automated information systems, AIS, defense space systems, and all other programs insofar as ACATs are concerned. AIS only uses ACAT I and III, wherein AIS ACAT III is defined simply as not meeting the requirements for ACAT I. Defense space systems are exempt from DoD instruction 5000.2 that governs defense acquisition, but there are parallel instructions for space systems that recognize the low volume but high complexity of space systems. As regards ACAT IV, only the Navy and Marine Corps have ACAT IV programs. See “Introduction to Defense Acquisition Management” op. cit. ppg 20-23 8 ACAT III AIS programs are budgeted for less than $126M acquisition cost, with not more than $32M in any fiscal year, all in FY2000 constant dollars; subject to change with each session of Congress. See “DoD Instruction 5000.02, Operation of the Defense Acquisition System” op. cit., Enclosure 3, pg 33 See “Guidelines for Successful Acquisition and Management of Software Intensive Systems: Weapons Systems, Command and Control Systems, Management Information Systems”, op. cit., Chapter 2 pg 10 10 'IOC' and 'FOC' refer to initial and final operating capability. IOC specifically means that a subset of the total user population has been given the use of the deliverable © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 12 of 14
13.
11 “Introduction to
Defense Acquisition Management” op. cit. pg 25 12 “A key challenge for the Milestone Decision Authority is ensure a balance between the agility and discipline of the acquisition process” is guidance given in “Intelligence Community Policy Guidance – Acquisition, 105.1” (Unclassified) 12 July 2007, paragraph G.3, authorized by the Deputy Director for National Intelligence for Policy, Plans, and Requirements 13 “Intelligence Community Policy Guidance – Acquisition, 105.1” op. cit. paragraph N 14 ‘Components’ is DoD jargon for the various organizations within the Department of Defense. To be a component does not strictly imply a place in the hierarchy, but generally components are very high-level, to include each service and major command, other field units, and the Defense agencies, and organizational units under the Secretary of Defense and the Joint Chiefs of Staff. See “DoD Instruction 5000.02, Operation of the Defense Acquisition System” op. cit. paragraph 2.A. for details. 15 In 2009, the Army began collaboration among users to write and edit Army field manuals, using techniques something like Wikipedia collaboration. Users make contributions to established field manuals, but then editors and review boards validate content. See: Cohen, N. “Care to write Army doctrine? With ID, Log on” The New York Times, August 13, 2009, retrieved from http://www.nytimes.com/2009/08/14/business/14army.html?scp=5&sq=wikipedia&st=cse August, 2009 16 A good reference for system engineering in the DoD is: Editors, “Systems Engineering Fundamentals” Systems Management College, Defense Acquisition Press, January 2001, Chapter 3, pg 31-33 © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 13 of 14
14.
About the author
John C. Goodpasture, PMP and managing principal at Square Peg Consulting, is a program manager, coach, author, and project consultant specializing in technology projects, strategic planning, project office operations. He is the author of books, articles, and web logs in the field of project management. He blogs at johngoodpasture.com, provides presentations at www.slideshare.com/jgoodpas, and his work products are found in the library at www. sqpegconsulting.com. His latest book, “Project Management the Agile Way—Making it work in the Enterprise” addresses agile methods applied to large scale projects. In his early career, John was a program manager at the National Security Agency, a unit of the Department of Defense. He subsequently worked in the aerospace and defense industry as a system engineer and program manager. John’s most recent engagements have been in the information technology space doing projects with large scale ERP’s. © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 14 of 14
Baixar agora