SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Agile and the U.S. Department of Defense
A whitepaper by John C Goodpasture, PMP

November, 2009




© Copyright John C. Goodpasture, 2009, all rights reserved
www.sqpegconsulting.com
Page 1 of 14
Agile and the U.S. Department of Defense
Agile methods have a useful but limited role in Defense
programs, providing quick-reaction capability, effective
methodology for many Web applications, and a source of
potential innovation for Defense needs.

                             The primary objective of Defense acquisition is to acquire quality
                             products that satisfy user needs with measurable improvements to
                             mission capability and operational support, in a timely manner, and
                             at a fair and reasonable price.

                                         “Introduction to Defense Acquisition Management”1




There is certainly no conflict between agile methods and the primary objective of Defense
acquisition, as given in the opening quotation. Customer value, timeliness, and investor
satisfaction, albeit in a government context, are all there.

There is no lack of adoption: just search the          Large scale acquisition programs5 for the
archives at the Air Force Software Technical           U.S. Department of Defense, DoD are
Support Center’s publication “Crosstalk –              perhaps the pinnacle of formal process and
The Journal of Defense Software                        high ceremony. To be sure, DoD is not
Engineering” for any number of ‘agile’                 alone with programs of grand scale, leading
words and you will find well more than a               edge technology, and complexity that
hundred articles in the return, many citing            stretches the imagination.
successful case studies.2
                                                       Look for examples in the space programs of
In fact, within the strictures for Defense             the     various     space-faring     nations;
acquisition, there is an acquisition process           construction projects of complex buildings
called ‘evolutionary acquisition’ that                 and infrastructure world-wide; nuclear,
embraces many agile values and principles.3            conventional, and alternative energy projects
And like all large enterprises, software               of all kinds; advanced physics and material
intensive projects in the Department of                sciences; bio-engineering; and many others.
Defense range from relatively simple Web               However, the long-standing and well
functionalities for the agencies and services          documented methodologies and practices of
all the way to mission critical and life               the DoD are an excellent example of
critical applications and systems for the              formality and doctrine applied to programs
warfighter. Consequently, a range of project           and projects. Therefore, for the purposes of
capabilities is applicable, including agile,           this book, we will use the DoD as our
according to needs and requirements.4                  surrogate for high-ceremony methodology
                                                       on an enterprise scale.


© Copyright John C. Goodpasture, 2009, all rights reserved
www.sqpegconsulting.com
Page 2 of 14
—Directive     5000.01, “The      Defense
Free information on DoD values, principles,            Acquisition System”, that establishes the
and practices is available from the Defense            Defense acquisition system, and
Acquisition University6, and various
Defense documents in the public domain,                —Instruction 5000.02, “Operation of the
starting with these two:                               Defense Acquisition System” that gives
                                                       operating instructions and guidance.

                                                              Agile and the military

                                               • XP depends on discipline, something the military
                                                 is quite good at.

                                               • SCRUM envisions a product master, a role
                                                 provided by the acquisition agencies

                                               • EVO envisions incremental and evolutionary
   A project management tip                      deliveries from a string of short waterfalls,
                                                 almost identical in description to the
                                                 ‘evolutionary development’ in the DoD
                                                 instructions

                                               • Crystal envisions harnessing the ingenuity of
                                                 individuals adapting to situations; small units in
                                                 DoD are trained to act on their on recognizance.




Slicing and dicing finds the agile spot
As in most businesses, projects in DoD come in all sizes. The business case for a defense
acquisition determines the Acquisition Category, ACAT, within which the program lies. ACATs
number I to IV, and are largely defined by dollars and milestone decision authority with ACAT I
being the category for the largest programs.7

Within DoD, programs are classified in a               The other two classifications are Command,
number of different ways; one way is by                Control, Communications, and Intelligence
technology content. Software is one of those           [C3I], and Embedded Systems. The latter
technologies – ‘software intensive’ systems            are typically found in warfighter systems
are those for which the dominate technology            like avionics, vehicular, man-pack, and ship-
is software. ‘Software intensive’ is further           borne systems and tend to have critical
classified by application and domain:                  specifications.
Automated Information Systems, AIS, is
one of the three general classifications of            There are other views and classifications
DoD software intensive systems, primarily              sanctioned within DoD. For instance, there
for business systems within DoD; AIS                   are functional and technical domain views,
ACAT III programs are relatively smaller               either vertical or horizontal. There are three
and less complex defense undertakings that             primary vertical        domains:     business,
are potential candidates for agile methods.8           intelligence, and warfighter.



© Copyright John C. Goodpasture, 2009, all rights reserved
www.sqpegconsulting.com
Page 3 of 14
For example, in business systems, there may             methodology; according to Air Force
be personnel, logistics, and planning                   doctrine9 evolutionary development is
systems. In C3I, there may be intelligence,             applicable to projects where:
strategic, tactical, and field systems; and in
warfighter domains there may be fire                    —Requirements are uncertain and the user
control, motion control, and electronic                 needs “… ‘early functionality’ delivered to
warfare.                                                refine    requirements  for     subsequent
                                                        deliveries”;
In the horizontal domains, there are security
and communication protocols, tools and                  —User needs are uncertain;
simulators, and user interface systems.
                                                        —Technical feasibility present high risks;
Acquisition managers often look at lifecycle            and
views. There are four acquisition lifecycles
at the top level: traditional, top-down                 — An early IOC10 is required.
sequential with iteration; evolutionary with
incremental delivery; spiral; and incremental           The other three lifecycles have a traditional
without evolution.        The evolutionary              definition.
lifecycle is much like any agile


   The agile spot in DoD
   So, putting it all together, agile is a candidate for software intensive, evolutionary
   programs;
   Most likely they are ACAT III, or at the discretion of the Component Acquisition
   Authority, for funding and decision authority, and
   They may be in any of the domains.




Program managers are in the authority chain
In DoD jargon, programs and projects are defined in much the same way as they are in the non-
defense literature. Programs are collections of projects, and projects are one-time endeavors to
produce a set of outcomes needed by user component.

Acquisitions, programs, and projects are                manager. Many instructions and regulations
managed activities. The roles are defined in            can be waived by managers at various levels
Table 1.11 For agile projects the important             when dollar limits are low and specifications
thing to take note is that for ACAT III                 are not critical. Within the space and
programs, the Component Acquisition                     intelligence community, there is even more
Authority has wide latitude, and traditionally          latitude given the low volume and one-of-a-
delegates all project particulars to the                kind nature of space and intelligence
Program Executive Authority, who in turn                programs.12
has latitude to delegate to the program



 © Copyright John C. Goodpasture, 2009, all rights reserved
 www.sqpegconsulting.com
 Page 4 of 14
Table 1 DoD Management Roles

     Typical Title               Management duties on DoD programs

     Defense
                                   • The defense under-secretary responsible for acquisition for
     Acquisition
                                     the DoD
     Executive

     Component                     • The service secretaries and defense agency directors
     Acquisition                   • The CAE is the ultimate authority within their components
     Executive, CAE                  for acquisition

     Program                       • A manager with executive authority over multiple programs
     Executive Officer,
     PEO                           • Typically a general officer or civilian equivalent

                                   • The manager whose principal duty is gathering and
                                     validating end-user needs, developing the investment
     Program Manager                 budget, planning program decision milestones, validating
                                     requirements for joint service interoperability, and
                                     operations and maintenance [O&M] budgeting and planning

                                   • The manager whose principal duty is acquiring the product
                                     even if the product is produced on a contract.

                                   • Manage contract requirements and technical management of
     Acquisition                     contracts, other specifications and standards, and overall
     Manager                         management of resources allocated from the program to the
                                     project.

                                   • The duties may also include management of key reviews
                                     leading to decision milestones.

                                   • The manager whose principle duty is the day to day
                                     management of a project, to include planning, organizing,
     Project Manager
                                     controlling, and managing earned value from resources
                                     committed.


Methodology is flexible within standards
All defense programs follow a prescribed defense acquisition management process. However,
according to ACAT and other discretion granted to the Component Acquisition Executive in
Instruction 5000.02, the Program Executive Officer and the program manager are empowered to
tailor practices for less complexity and quicker life cycle.

One example of discretion is DoD's                      possible time, DoD program managers can
'evolutionary acquisition' exceptions already           'cut to the chase' and field functionality
noted. Where it is determined by the CAE                incrementally and in evolutionary fashion.
or PEO that the underlying technology is                In these programs, it is recognized up-front
mature and available, and there is a                    that a fully functional capability will come
recognized need for capability in the shortest          over time. Less than a fully functional

 © Copyright John C. Goodpasture, 2009, all rights reserved
 www.sqpegconsulting.com
 Page 5 of 14
system is accepted for the benefit of an early          the work of organizations like ISO, IEC,
deployment of essential feature and                     IEEE, and EIA, the DoD has adopted many
function.                                               of their standards as replacements for in-
                                                        house DoD directives.
There are a very large number of practice
standards for every aspect of DoD projects.             An important example is the adoption of
A generation ago, DoD was its own                       ANSI/EIA 748B, Standard for Earned Value
standards body, writing and publishing a                Measurement System. Another example: In
prodigious body of knowledge in the form                the national intelligence community policy
of    instructions,   guidelines,  military             guidance 105.1 already discussed, there is
standards, handbooks, and procedures for                direction that specifically allows system
projects and programs. Since 1994 onward,               engineering to follow nationally recognized
it has been DoD policy to govern DoD                    bodies of knowledge, like that from the
design and implementation practices                     Software Engineering Institute and the
according to industry standards insofar as              International     Council    on     System
possible given the warfighter nature of                 Engineering.13
defense requirements. Seeking to leverage
                                                        Phases and Gates
The Defense acquisition                                 Major DoD programs are sequential
management process                                      between major phases; each phase is
The Defense acquisition management life                 guarded by a gate with formal criteria and a
cycle for the U.S. DoD is given in Figure 1             decision authority empowered to open the
that is adapted from the “System                        gate, or not.
Engineering Guide” of the Department of
Defense.




 © Copyright John C. Goodpasture, 2009, all rights reserved
 www.sqpegconsulting.com
 Page 6 of 14
Figure 1, Acquisition Life Cycle

Though not explicit about how much time is             typically pre-requisite to milestone reviews.
apportioned among phases, suffice to say
that the phases run sequentially and finish-           All important activities to determine user
to-start in precedence based upon the                  needs and make an assessment of available
milestone decisions.                                   technology are outboard of the formally
                                                       defined phases. These activities have
Gates, called milestone reviews, control the           processes all to themselves. These activities
exit from and entry into phases. Criteria are          in effect develop and obtain approval of the
defined for moving through the gates                   business case. Critical success factors are
successfully; program decision points are              documented.        Parallel  or    enabling
events to assess the achievement of the                technology programs could be started, or
criteria. Decision point reviews are                   synchronized with the program being

© Copyright John C. Goodpasture, 2009, all rights reserved
www.sqpegconsulting.com
Page 7 of 14
approved.                                               the "FOC" models is made available to all
                                                        users. IOC is intended to be fully functional
In a nod to Mr Royce's ideas and to the ideas           but may not be manfacturable in scale.
of agile and iterative methods, a subset of             However, like the evolutionary acquisition
customers may get the advantage of an                   already discussed, IOC may also be less than
"IOC" model before full scale production of             fully featured and functional.


Iteration in the DoD model
At the top level as illustrated in Figure 1-5,          milestone decision has been made to move
the DoD model departs from Royce's model                onto the next phase, it is not the usual
insofar as iteration is not planned or                  practice
encouraged between phases. Once the
to double back to an earlier phase.                     other methodologies could be used
                                                        according to risk and technology, to include
However, within phases, the Royce model or              agile methods we discuss in this book.

Agile requires reconciliation of traditional Defense
acquisition practices
For the agile project manager, there are a few key practices in normal Defense programs that
require reconciliation with agile methods. Among these are the practices of the customer,
contracts, and teams; and the system engineer. Four others are earned value management,
independent test verification and validation, configuration management, and data management.
Customers, contracts, and teams
For the most part, DoD end-users are                    DoD structure but it is a reality driven by
represented by acquisition agencies or                  practicality – there’s simply no way for
training and development components.14                  hundreds, perhaps many thousands of users
These agencies and components are the                   to participate in a single project.
product masters for end-user projects.
                                                        Therefore, practices like customer teams to
Although not an exclusive arrangement,                  represent large constituent populations,
representation       rather    than    direct           webinars and webinar demonstrations to
participation is a fact is many DoD projects.           disparate user groups, wide-spread ‘beta’
Representation puts distance between                    tests among early adopters, and even
developer and user that is not present in               collaborative contributions to end-user
most       commercial       agile   projects.           documentation, not unlike the open
Consequently, practices must emerge and                 community that contributes to Wikipedia,
evolve to overcome the disadvantages of                 are possible mitigations for distance and
distance.                                               dispersion of the real end-users.15

Furthermore, the end-user community is                  Another point is that most software is
quite large, although not as large as the mass          acquired by contract from developers and
software audience for games, social                     suppliers. Agile methods will more often
networking, and home-use applications. So,              than not be applied through the channel of a
representation is not only a reality of the             contract, and the contracting officials will


 © Copyright John C. Goodpasture, 2009, all rights reserved
 www.sqpegconsulting.com
 Page 8 of 14
not be the end-user or even the end-user’s              the military is built from the smallest unit
component unit. The contract will represent             upward. DoD is comfortable with ‘joint’
three points of view: the rules of contract             operations involving the mix of military and
law held by the contracting officer; the                civilian, multiple skills, matrix assignments,
project objectives of the project manager;              and leadership commensurate with the
and the functional needs of the end-user. A             situation.
successful contractor will satisfy all three
constituents.                                           It reasonable and practical to build joint
                                                        DoD-supplier teams to perform work orders
The contracting officer is the only one of the          contracted for agile projects. Typically, the
three with the statutory power to commit the            DoD contribution to the team will be end-
government to a contract and authorize                  user representatives; the contractor will
acceptance and payment of contractor                    provide a workforce and a project manager;
invoices. In general terms, the contracting             the DoD will have a program manager
officer also controls scope and delivery—               whose responsibilities end at the water’s
that is, insofar as scope and delivery are              edge of the actual project operation. That is,
explicit in the contract, only the contracting          the DoD program manager will have
officer can change the obligation of the                responsibility for funding, top-level plans,
contractor’s performance requirement.                   assessment of progress, and functional
                                                        acceptance of the work product; the DoD
DoD is comfortable with teams that are                  project manager will not manage the project
small high performance units with                       day-to-day unless the work is done in-house
empowering decision authority. That is how              of the acquisition agency.
System Engineering
Just like in any civilian project, DoD                  criteria and means to verify and validate
projects begin with an idea, a vision, and a            satisfaction of the top-level requirements.16
need that is validated by a business case.
The project then enters the realm of                    The job of system engineering is not
acquisition.                                            threatened by agile methods, but
                                                        responsibilities are different. Agile does not
DoD acquisition managers work from the                  embrace a ‘big design up front’ where
top-level requirements stated by the user               system engineers typically do most of their
components or others responsible for the                work. System engineering in the agile space
user’s needs, and from requirements derived             provides ‘just enough’ architecture and
from the standing instructions and directives           system design to provide guidance for each
of the acquisition system.                              planning wave and direction for each
                                                        iteration to begin work.
System engineering is a mandated discipline
in DoD acquisitions as given in Enclosure               Assuming agile projects will be conforming
12 of 5000.02 – “Systems engineering shall              to evolutionary acquisition, and likely will
be embedded in program planning and be                  be small endeavors well within the
designed to support the entire acquisition              discretion of PEOs and program managers,
life cycle”. The job of system engineering              the system engineer has the additional
in DoD is two-fold: specify the architecture            responsibility of reconciling evolutionary
and associated requirements to synthesize a             requirements with the overall vision and
system design; and specify the acceptance               guiding architecture. These responsibilities

 © Copyright John C. Goodpasture, 2009, all rights reserved
 www.sqpegconsulting.com
 Page 9 of 14
are explicated recognized in Chapter 3 of the          like it is for any other agile project.
DoD “Systems Engineering Fundamentals”
guidebook.                                             However, agile does not require detailed
                                                       requirements from the architect at the outset
Contractors working on agile DoD projects              since details are developed during each
may provide systems engineering, or the                iteration. A persistent means to record
government may provide the engineering                 requirements is required for support and
talent. In any event, following the dictum             follow-on to so-called pre-planned product
that every system or product has                       improvements, P3I.
architecture, a systems model is needed just
Earned Value Management and the IMS/IMP
DoD policy requires earned value                       value measurement systems. As described
management on programs valued at $20M or               in Data Item Description 81650, an IMS is a
greater. EIA 748 is the directed standard.             network schedule that conforms to an
There are means to incorporate earned value            ‘activity on node’ paradigm; it shows a
measurements in agile methods, even for the            critical path and all the dependencies among
smallest program. In point of fact, earning            activities.     And, 81650 requires risk
value is valuable regardless of the amount at          adjustment of schedules, embracing the 3-
stake.                                                 point estimating procedure used widely in
                                                       project estimating.
An Integrated Master Plan, IMP, is required
on programs that require earned value                  Agile teams’ dependencies can easily be
measurement. The IMP is event based; it is             rendered in a network schedule. Activities
intended to forecast accomplishments to be             within a team are not ordinarily scheduled
expected at events. In the agile space,                formally since a team completes its work in
appropriate events are releases. A master              a matter of a few weeks; however, there is
schedule complements the IMP.                          nothing to preclude identification of key
                                                       activities    and      scheduling     their
An Integrated Master Schedule, IMS, is                 interdependencies    within    the    team
required on all programs that have earned              complement.
Independent Test and Verification
Development, test, and evaluation [DT&E]               the project performance team? Certainly
is mandated by 5000.02 Enclosure 6.                    independent validation where users actually
However, there is wide latitude granted the            employ the deliverables operationally, or in
program manager: “The PM shall design                  an operational test setting, is probably
DT&E objectives appropriate to each phase              without question. Generally speaking, in
and milestone of an acquisition program.”              this book we endorse independent
                                                       acceptance testing to verify before
Agile methods embrace test as integral to              validation that the product works. See
the design and development process. The                Figure 2-2 for our ‘V’ diagram. All other
question arises about a Taylor-Deming view             testing is appropriately within the agile high
of test – to what degree should testing be             performance team.
independent of the developers and outside




© Copyright John C. Goodpasture, 2009, all rights reserved
www.sqpegconsulting.com
Page 10 of 14
Configuration and Data Management

Configuration management is a component                 that can be examined and evaluated by
of system engineering in the DoD world. As              constituents. There are also issues of data
given in 5000.02 Enclosure 12 for Systems               rights and ownership of intellectual property
Engineering, the management team will “…                by the myriad participants in a DoD project.
use a configuration management approach to
establish and control product attributes and            Again, Enclosure 12 comes into play:
the technical baseline across the total system          Enclosure 12 makes data management a
life cycle.” This is a matter of establishing           system engineering responsibility. It is
permanence and change control over the                  incumbent on the program manager and the
product baseline. No less is expected in                system engineer to establish a ‘data
commercial projects where product baseline              management strategy’ consistent with the
control is carefully exercised.                         project’s agility, long-term P3I possibilities,
                                                        and the needs of the user community.
Data management extends to the broader
topic of information management. Unlike                 Each situation will be different; the latitude
commercial agile projects where common                  afforded program managers on smaller scale
practice is whiteboards, CRC cards, user                projects is the key to effective strategy for
stories on 3x5s, and etc, projects in the               the performance teams and the project
public domain must have permanent records               beneficiaries.

Summary and take-away points
     • Our theme is agile methods have a useful but limited role in Defense programs, providing
       quick-reaction capability, effective methodology for many Web applications, and a
       source of potential innovation for Defense needs.
     • Right from the top evolutionary and incremental methods are encouraged by DoD to
       solve a number of acquisition needs.
     • Acquisition officials, right down to the program manager, are afforded much latitude to
       get the job done. Adoption has begun within many software intensive systems in all
       domains.
     • However, there are limitations: mission and life critical needs, certain high security
       needs, and programs on the scale that is routine in the DoD are not appropriate to agile
       methods because there is insufficient rigor and scalability to the practices.
     • System engineering, with its included tasks of test, data management, and configuration
       management, is an important skill to have on the agile project. System engineering
       brings thoughtful architecture that in the end will pay lifecycle benefits.
     • In the main, DoD will benefit from agile methods applied with discretion and
       thoughtfulness because agile projects are inherently timely and cost effective.




 © Copyright John C. Goodpasture, 2009, all rights reserved
 www.sqpegconsulting.com
 Page 11 of 14
End notes

1 Editors, “Introduction to Defense Acquisition Management” Defense Acquisition University
Press, Fort Belvoir, VA, December 2008, pg 1
2 http://www.stsc.hill.af.mil/crosstalk/2009/07/index.html
3 USD(AT &L) “DoD Instruction 5000.02, Operation of the Defense Acquisition System” U.S.
Department of Defense, 8 December 2008, pg 13
Retrieved from https://acc.dau.mil/dag500002, August 2009
4 At the present time, the only agile method formally recognized in the Defense Acquisition
Guidelines, DAG, is the evolutionary acquisition process. However in the Air Force guidelines
for system acquisition, Extreme Programming is a recognized design method. According to the
Air Force view, waterfall, incremental, evolutionary, and spiral are the four principal lifecycles.
See Editors, “Guidelines for Successful Acquisition and Management of Software Intensive
Systems: Weapons Systems, Command and Control Systems, Management Information Systems”,
Software Technical Support Center, U.S. Department of the Air Force, February, 2003, Chapter 2
pg 4-13; Chapter 15 pg. 7
5 DoD makes a distinction between acquisition and procurement, the latter being for non-
developmental items such as parts and supplies and services. Acquisition includes design,
engineering, test and evaluation, production, and operations and support of defense systems.
6 See the web link at http://www.dau.mil/pubs/gdbks/idam.asp
7 There are distinctions between automated information systems, AIS, defense space systems,
and all other programs insofar as ACATs are concerned. AIS only uses ACAT I and III, wherein
AIS ACAT III is defined simply as not meeting the requirements for ACAT I. Defense space
systems are exempt from DoD instruction 5000.2 that governs defense acquisition, but there are
parallel instructions for space systems that recognize the low volume but high complexity of
space systems. As regards ACAT IV, only the Navy and Marine Corps have ACAT IV
programs. See “Introduction to Defense Acquisition Management” op. cit. ppg 20-23
8 ACAT III AIS programs are budgeted for less than $126M acquisition cost, with not more than
$32M in any fiscal year, all in FY2000 constant dollars; subject to change with each session of
Congress.
See “DoD Instruction 5000.02, Operation of the Defense Acquisition System” op. cit., Enclosure
3, pg 33
See “Guidelines for Successful Acquisition and Management of Software Intensive Systems:
Weapons Systems, Command and Control Systems, Management Information Systems”, op. cit.,
Chapter 2 pg 10
10 'IOC' and 'FOC' refer to initial and final operating capability. IOC specifically means that a
subset of the total user population has been given the use of the deliverable

 © Copyright John C. Goodpasture, 2009, all rights reserved
 www.sqpegconsulting.com
 Page 12 of 14
11 “Introduction to Defense Acquisition Management” op. cit. pg 25
12 “A key challenge for the Milestone Decision Authority is ensure a balance between the agility
and discipline of the acquisition process” is guidance given in “Intelligence Community Policy
Guidance – Acquisition, 105.1” (Unclassified) 12 July 2007, paragraph G.3, authorized by the
Deputy Director for National Intelligence for Policy, Plans, and Requirements
13 “Intelligence Community Policy Guidance – Acquisition, 105.1” op. cit. paragraph N
14 ‘Components’ is DoD jargon for the various organizations within the Department of Defense.
To be a component does not strictly imply a place in the hierarchy, but generally components are
very high-level, to include each service and major command, other field units, and the Defense
agencies, and organizational units under the Secretary of Defense and the Joint Chiefs of Staff.
See “DoD Instruction 5000.02, Operation of the Defense Acquisition System” op. cit. paragraph
2.A. for details.
15 In 2009, the Army began collaboration among users to write and edit Army field manuals,
using techniques something like Wikipedia collaboration. Users make contributions to
established field manuals, but then editors and review boards validate content. See:
Cohen, N. “Care to write Army doctrine? With ID, Log on” The New York Times, August 13,
2009, retrieved from
http://www.nytimes.com/2009/08/14/business/14army.html?scp=5&sq=wikipedia&st=cse
August, 2009
16 A good reference for system engineering in the DoD is:
Editors, “Systems Engineering Fundamentals” Systems Management College, Defense
Acquisition Press, January 2001, Chapter 3, pg 31-33




© Copyright John C. Goodpasture, 2009, all rights reserved
www.sqpegconsulting.com
Page 13 of 14
About the author
                          John C. Goodpasture, PMP and managing principal at Square
                          Peg Consulting, is a program manager, coach, author, and
                          project consultant specializing in technology projects, strategic
                          planning, project office operations. He is the author of books,
                          articles, and web logs in the field of project management. He
                          blogs at johngoodpasture.com, provides presentations at
                          www.slideshare.com/jgoodpas, and his work products are found
                          in the library at www. sqpegconsulting.com.
                          His latest book, “Project Management the Agile Way—Making
                          it work in the Enterprise” addresses agile methods applied to
                          large scale projects.
In his early career, John was a program manager at the National
Security Agency, a unit of the Department of Defense.              He
subsequently worked in the aerospace and defense industry as a system
engineer and program manager.
John’s most recent engagements have been in the information
technology space doing projects with large scale ERP’s.




© Copyright John C. Goodpasture, 2009, all rights reserved
www.sqpegconsulting.com
Page 14 of 14

Mais conteúdo relacionado

Mais procurados

Forward Operating Bases 2012
Forward Operating Bases 2012Forward Operating Bases 2012
Forward Operating Bases 2012Sharmin Ahammad
 
M 6 (Progeny)
M 6 (Progeny)M 6 (Progeny)
M 6 (Progeny)mcd202dc
 
Fuller.david
Fuller.davidFuller.david
Fuller.davidNASAPMC
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
IDGA Irregular Warfare COTS Deck
IDGA Irregular Warfare COTS DeckIDGA Irregular Warfare COTS Deck
IDGA Irregular Warfare COTS Deckrgiuntini
 

Mais procurados (6)

Forward Operating Bases 2012
Forward Operating Bases 2012Forward Operating Bases 2012
Forward Operating Bases 2012
 
M 6 (Progeny)
M 6 (Progeny)M 6 (Progeny)
M 6 (Progeny)
 
Air Launched Weapons
Air Launched WeaponsAir Launched Weapons
Air Launched Weapons
 
Fuller.david
Fuller.davidFuller.david
Fuller.david
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
IDGA Irregular Warfare COTS Deck
IDGA Irregular Warfare COTS DeckIDGA Irregular Warfare COTS Deck
IDGA Irregular Warfare COTS Deck
 

Destaque

Fmc close out repot hse dept. rev.000
Fmc close out repot hse dept. rev.000Fmc close out repot hse dept. rev.000
Fmc close out repot hse dept. rev.000Fitri Ifony
 
Managing improvement v4
Managing improvement v4Managing improvement v4
Managing improvement v4Rob England
 
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011Pedram Danesh-Mand
 
IBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue BoxIBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue BoxDaniele Bolletta
 
Pharma project risk management
Pharma project risk managementPharma project risk management
Pharma project risk managementMegha Kotak, PMP
 
Project risk management - Methodology and application
Project risk management - Methodology and applicationProject risk management - Methodology and application
Project risk management - Methodology and applicationMarco De Santis, PMP, CFPP
 
Health and safety plan generic
Health and safety plan genericHealth and safety plan generic
Health and safety plan genericfirstpick
 

Destaque (10)

Fmc close out repot hse dept. rev.000
Fmc close out repot hse dept. rev.000Fmc close out repot hse dept. rev.000
Fmc close out repot hse dept. rev.000
 
Managing improvement v4
Managing improvement v4Managing improvement v4
Managing improvement v4
 
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
 
IBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue BoxIBM Cloud Solution - Blue Box
IBM Cloud Solution - Blue Box
 
Pharma project risk management
Pharma project risk managementPharma project risk management
Pharma project risk management
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Project risk management - Methodology and application
Project risk management - Methodology and applicationProject risk management - Methodology and application
Project risk management - Methodology and application
 
PMP_Project Risk Management
PMP_Project Risk ManagementPMP_Project Risk Management
PMP_Project Risk Management
 
Health and safety plan generic
Health and safety plan genericHealth and safety plan generic
Health and safety plan generic
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 

Semelhante a Agile and the DoD

Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier Management
Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier ManagementInfosys - Aerospace Global Engineering & Modular Sourcing | Supplier Management
Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier ManagementInfosys
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
CTLR 2010 Issue 7 Waterfall Contract
CTLR 2010 Issue 7 Waterfall ContractCTLR 2010 Issue 7 Waterfall Contract
CTLR 2010 Issue 7 Waterfall Contractsusanatkinson
 
24 Feb 2016, Soldiers Five Presentation and Photos
24 Feb 2016, Soldiers Five Presentation and Photos24 Feb 2016, Soldiers Five Presentation and Photos
24 Feb 2016, Soldiers Five Presentation and PhotosBlake Barrett CSC
 
Doug maughan ppt
Doug maughan pptDoug maughan ppt
Doug maughan pptgbass12
 
DoDi 5000.02 And Resource Informed Army Modernization
DoDi 5000.02 And Resource Informed Army ModernizationDoDi 5000.02 And Resource Informed Army Modernization
DoDi 5000.02 And Resource Informed Army ModernizationWilliam Bajusz
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxjenkinsmandie
 
Agile Project Management Methods of IT Projects
Agile Project Management Methods of IT ProjectsAgile Project Management Methods of IT Projects
Agile Project Management Methods of IT ProjectsGlen Alleman
 
Agile and earned value management
Agile and earned value management  Agile and earned value management
Agile and earned value management Dr Ezzat Mansour
 
Hacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) ViewHacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) ViewGovernment Contract Pricing Summit
 
Trends in Cloud Computing
Trends in Cloud ComputingTrends in Cloud Computing
Trends in Cloud Computingawais mushtaq
 
Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Livingstone Advisory
 
Wendy Nather - Building a Rube Goldberg Application Security Program
Wendy Nather - Building a Rube Goldberg Application Security ProgramWendy Nather - Building a Rube Goldberg Application Security Program
Wendy Nather - Building a Rube Goldberg Application Security ProgramSource Conference
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesLivingstone Advisory
 

Semelhante a Agile and the DoD (20)

Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier Management
Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier ManagementInfosys - Aerospace Global Engineering & Modular Sourcing | Supplier Management
Infosys - Aerospace Global Engineering & Modular Sourcing | Supplier Management
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
CTLR 2010 Issue 7 Waterfall Contract
CTLR 2010 Issue 7 Waterfall ContractCTLR 2010 Issue 7 Waterfall Contract
CTLR 2010 Issue 7 Waterfall Contract
 
24 Feb 2016, Soldiers Five Presentation and Photos
24 Feb 2016, Soldiers Five Presentation and Photos24 Feb 2016, Soldiers Five Presentation and Photos
24 Feb 2016, Soldiers Five Presentation and Photos
 
Doug maughan ppt
Doug maughan pptDoug maughan ppt
Doug maughan ppt
 
DoDi 5000.02 And Resource Informed Army Modernization
DoDi 5000.02 And Resource Informed Army ModernizationDoDi 5000.02 And Resource Informed Army Modernization
DoDi 5000.02 And Resource Informed Army Modernization
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
Agile Project Management Methods of IT Projects
Agile Project Management Methods of IT ProjectsAgile Project Management Methods of IT Projects
Agile Project Management Methods of IT Projects
 
Agile and earned value management
Agile and earned value management  Agile and earned value management
Agile and earned value management
 
Hacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) ViewHacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) View
 
Session Three: Defence Authority for C4ISR
Session Three: Defence Authority for C4ISRSession Three: Defence Authority for C4ISR
Session Three: Defence Authority for C4ISR
 
Trends in Cloud Computing
Trends in Cloud ComputingTrends in Cloud Computing
Trends in Cloud Computing
 
Implementing security
Implementing securityImplementing security
Implementing security
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
The value of agility
The value of agilityThe value of agility
The value of agility
 
7 Myths of Agile Development
7 Myths of Agile Development7 Myths of Agile Development
7 Myths of Agile Development
 
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
 
Wendy Nather - Building a Rube Goldberg Application Security Program
Wendy Nather - Building a Rube Goldberg Application Security ProgramWendy Nather - Building a Rube Goldberg Application Security Program
Wendy Nather - Building a Rube Goldberg Application Security Program
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologies
 

Mais de John Goodpasture

Five tools for managing projects
Five tools for managing projectsFive tools for managing projects
Five tools for managing projectsJohn Goodpasture
 
Risk management short course
Risk management short courseRisk management short course
Risk management short courseJohn Goodpasture
 
Agile earned value exercise
Agile earned value exerciseAgile earned value exercise
Agile earned value exerciseJohn Goodpasture
 
Agile 103 - the three big questions
Agile 103  - the three big questionsAgile 103  - the three big questions
Agile 103 - the three big questionsJohn Goodpasture
 
Agile for project managers - a sailing analogy-UPDATE
Agile for project managers  - a sailing analogy-UPDATEAgile for project managers  - a sailing analogy-UPDATE
Agile for project managers - a sailing analogy-UPDATEJohn Goodpasture
 
Dynamic Systems Development, DSDM
Dynamic Systems Development, DSDMDynamic Systems Development, DSDM
Dynamic Systems Development, DSDMJohn Goodpasture
 
Agile for project managers - A presentation for PMI
Agile for project managers  - A presentation for PMIAgile for project managers  - A presentation for PMI
Agile for project managers - A presentation for PMIJohn Goodpasture
 
Five risk management rules for the project manager
Five risk management rules for the project managerFive risk management rules for the project manager
Five risk management rules for the project managerJohn Goodpasture
 
Building Your Personal Brand
Building Your Personal BrandBuilding Your Personal Brand
Building Your Personal BrandJohn Goodpasture
 
Portfolio management and agile: a look at risk and value
Portfolio management and agile: a look at risk and valuePortfolio management and agile: a look at risk and value
Portfolio management and agile: a look at risk and valueJohn Goodpasture
 
Project examples for sampling and the law of large numbers
Project examples for sampling and the law of large numbersProject examples for sampling and the law of large numbers
Project examples for sampling and the law of large numbersJohn Goodpasture
 
Agile for project managers - a sailing analogy
Agile for project managers  - a sailing analogyAgile for project managers  - a sailing analogy
Agile for project managers - a sailing analogyJohn Goodpasture
 
Risk management with virtual teams
Risk management with virtual teamsRisk management with virtual teams
Risk management with virtual teamsJohn Goodpasture
 
Bayes Theorem and Inference Reasoning for Project Managers
Bayes Theorem and Inference Reasoning for Project ManagersBayes Theorem and Inference Reasoning for Project Managers
Bayes Theorem and Inference Reasoning for Project ManagersJohn Goodpasture
 
Adding quantitative risk analysis your Swiss Army Knife
Adding quantitative risk analysis your Swiss Army KnifeAdding quantitative risk analysis your Swiss Army Knife
Adding quantitative risk analysis your Swiss Army KnifeJohn Goodpasture
 
Business value and kano chart
Business value and kano chartBusiness value and kano chart
Business value and kano chartJohn Goodpasture
 
Agile for Business Analysts
Agile for Business AnalystsAgile for Business Analysts
Agile for Business AnalystsJohn Goodpasture
 

Mais de John Goodpasture (20)

Five tools for managing projects
Five tools for managing projectsFive tools for managing projects
Five tools for managing projects
 
Risk management short course
Risk management short courseRisk management short course
Risk management short course
 
Agile in the waterfall
Agile in the waterfall Agile in the waterfall
Agile in the waterfall
 
RFP template
RFP templateRFP template
RFP template
 
Agile earned value exercise
Agile earned value exerciseAgile earned value exercise
Agile earned value exercise
 
Agile 103 - the three big questions
Agile 103  - the three big questionsAgile 103  - the three big questions
Agile 103 - the three big questions
 
Agile for project managers - a sailing analogy-UPDATE
Agile for project managers  - a sailing analogy-UPDATEAgile for project managers  - a sailing analogy-UPDATE
Agile for project managers - a sailing analogy-UPDATE
 
Feature driven design FDD
Feature driven design FDDFeature driven design FDD
Feature driven design FDD
 
Dynamic Systems Development, DSDM
Dynamic Systems Development, DSDMDynamic Systems Development, DSDM
Dynamic Systems Development, DSDM
 
Agile for project managers - A presentation for PMI
Agile for project managers  - A presentation for PMIAgile for project managers  - A presentation for PMI
Agile for project managers - A presentation for PMI
 
Five risk management rules for the project manager
Five risk management rules for the project managerFive risk management rules for the project manager
Five risk management rules for the project manager
 
Building Your Personal Brand
Building Your Personal BrandBuilding Your Personal Brand
Building Your Personal Brand
 
Portfolio management and agile: a look at risk and value
Portfolio management and agile: a look at risk and valuePortfolio management and agile: a look at risk and value
Portfolio management and agile: a look at risk and value
 
Project examples for sampling and the law of large numbers
Project examples for sampling and the law of large numbersProject examples for sampling and the law of large numbers
Project examples for sampling and the law of large numbers
 
Agile for project managers - a sailing analogy
Agile for project managers  - a sailing analogyAgile for project managers  - a sailing analogy
Agile for project managers - a sailing analogy
 
Risk management with virtual teams
Risk management with virtual teamsRisk management with virtual teams
Risk management with virtual teams
 
Bayes Theorem and Inference Reasoning for Project Managers
Bayes Theorem and Inference Reasoning for Project ManagersBayes Theorem and Inference Reasoning for Project Managers
Bayes Theorem and Inference Reasoning for Project Managers
 
Adding quantitative risk analysis your Swiss Army Knife
Adding quantitative risk analysis your Swiss Army KnifeAdding quantitative risk analysis your Swiss Army Knife
Adding quantitative risk analysis your Swiss Army Knife
 
Business value and kano chart
Business value and kano chartBusiness value and kano chart
Business value and kano chart
 
Agile for Business Analysts
Agile for Business AnalystsAgile for Business Analysts
Agile for Business Analysts
 

Último

Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 

Último (20)

Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 

Agile and the DoD

  • 1. Agile and the U.S. Department of Defense A whitepaper by John C Goodpasture, PMP November, 2009 © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 1 of 14
  • 2. Agile and the U.S. Department of Defense Agile methods have a useful but limited role in Defense programs, providing quick-reaction capability, effective methodology for many Web applications, and a source of potential innovation for Defense needs. The primary objective of Defense acquisition is to acquire quality products that satisfy user needs with measurable improvements to mission capability and operational support, in a timely manner, and at a fair and reasonable price. “Introduction to Defense Acquisition Management”1 There is certainly no conflict between agile methods and the primary objective of Defense acquisition, as given in the opening quotation. Customer value, timeliness, and investor satisfaction, albeit in a government context, are all there. There is no lack of adoption: just search the Large scale acquisition programs5 for the archives at the Air Force Software Technical U.S. Department of Defense, DoD are Support Center’s publication “Crosstalk – perhaps the pinnacle of formal process and The Journal of Defense Software high ceremony. To be sure, DoD is not Engineering” for any number of ‘agile’ alone with programs of grand scale, leading words and you will find well more than a edge technology, and complexity that hundred articles in the return, many citing stretches the imagination. successful case studies.2 Look for examples in the space programs of In fact, within the strictures for Defense the various space-faring nations; acquisition, there is an acquisition process construction projects of complex buildings called ‘evolutionary acquisition’ that and infrastructure world-wide; nuclear, embraces many agile values and principles.3 conventional, and alternative energy projects And like all large enterprises, software of all kinds; advanced physics and material intensive projects in the Department of sciences; bio-engineering; and many others. Defense range from relatively simple Web However, the long-standing and well functionalities for the agencies and services documented methodologies and practices of all the way to mission critical and life the DoD are an excellent example of critical applications and systems for the formality and doctrine applied to programs warfighter. Consequently, a range of project and projects. Therefore, for the purposes of capabilities is applicable, including agile, this book, we will use the DoD as our according to needs and requirements.4 surrogate for high-ceremony methodology on an enterprise scale. © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 2 of 14
  • 3. —Directive 5000.01, “The Defense Free information on DoD values, principles, Acquisition System”, that establishes the and practices is available from the Defense Defense acquisition system, and Acquisition University6, and various Defense documents in the public domain, —Instruction 5000.02, “Operation of the starting with these two: Defense Acquisition System” that gives operating instructions and guidance. Agile and the military • XP depends on discipline, something the military is quite good at. • SCRUM envisions a product master, a role provided by the acquisition agencies • EVO envisions incremental and evolutionary A project management tip deliveries from a string of short waterfalls, almost identical in description to the ‘evolutionary development’ in the DoD instructions • Crystal envisions harnessing the ingenuity of individuals adapting to situations; small units in DoD are trained to act on their on recognizance. Slicing and dicing finds the agile spot As in most businesses, projects in DoD come in all sizes. The business case for a defense acquisition determines the Acquisition Category, ACAT, within which the program lies. ACATs number I to IV, and are largely defined by dollars and milestone decision authority with ACAT I being the category for the largest programs.7 Within DoD, programs are classified in a The other two classifications are Command, number of different ways; one way is by Control, Communications, and Intelligence technology content. Software is one of those [C3I], and Embedded Systems. The latter technologies – ‘software intensive’ systems are typically found in warfighter systems are those for which the dominate technology like avionics, vehicular, man-pack, and ship- is software. ‘Software intensive’ is further borne systems and tend to have critical classified by application and domain: specifications. Automated Information Systems, AIS, is one of the three general classifications of There are other views and classifications DoD software intensive systems, primarily sanctioned within DoD. For instance, there for business systems within DoD; AIS are functional and technical domain views, ACAT III programs are relatively smaller either vertical or horizontal. There are three and less complex defense undertakings that primary vertical domains: business, are potential candidates for agile methods.8 intelligence, and warfighter. © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 3 of 14
  • 4. For example, in business systems, there may methodology; according to Air Force be personnel, logistics, and planning doctrine9 evolutionary development is systems. In C3I, there may be intelligence, applicable to projects where: strategic, tactical, and field systems; and in warfighter domains there may be fire —Requirements are uncertain and the user control, motion control, and electronic needs “… ‘early functionality’ delivered to warfare. refine requirements for subsequent deliveries”; In the horizontal domains, there are security and communication protocols, tools and —User needs are uncertain; simulators, and user interface systems. —Technical feasibility present high risks; Acquisition managers often look at lifecycle and views. There are four acquisition lifecycles at the top level: traditional, top-down — An early IOC10 is required. sequential with iteration; evolutionary with incremental delivery; spiral; and incremental The other three lifecycles have a traditional without evolution. The evolutionary definition. lifecycle is much like any agile The agile spot in DoD So, putting it all together, agile is a candidate for software intensive, evolutionary programs; Most likely they are ACAT III, or at the discretion of the Component Acquisition Authority, for funding and decision authority, and They may be in any of the domains. Program managers are in the authority chain In DoD jargon, programs and projects are defined in much the same way as they are in the non- defense literature. Programs are collections of projects, and projects are one-time endeavors to produce a set of outcomes needed by user component. Acquisitions, programs, and projects are manager. Many instructions and regulations managed activities. The roles are defined in can be waived by managers at various levels Table 1.11 For agile projects the important when dollar limits are low and specifications thing to take note is that for ACAT III are not critical. Within the space and programs, the Component Acquisition intelligence community, there is even more Authority has wide latitude, and traditionally latitude given the low volume and one-of-a- delegates all project particulars to the kind nature of space and intelligence Program Executive Authority, who in turn programs.12 has latitude to delegate to the program © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 4 of 14
  • 5. Table 1 DoD Management Roles Typical Title Management duties on DoD programs Defense • The defense under-secretary responsible for acquisition for Acquisition the DoD Executive Component • The service secretaries and defense agency directors Acquisition • The CAE is the ultimate authority within their components Executive, CAE for acquisition Program • A manager with executive authority over multiple programs Executive Officer, PEO • Typically a general officer or civilian equivalent • The manager whose principal duty is gathering and validating end-user needs, developing the investment Program Manager budget, planning program decision milestones, validating requirements for joint service interoperability, and operations and maintenance [O&M] budgeting and planning • The manager whose principal duty is acquiring the product even if the product is produced on a contract. • Manage contract requirements and technical management of Acquisition contracts, other specifications and standards, and overall Manager management of resources allocated from the program to the project. • The duties may also include management of key reviews leading to decision milestones. • The manager whose principle duty is the day to day management of a project, to include planning, organizing, Project Manager controlling, and managing earned value from resources committed. Methodology is flexible within standards All defense programs follow a prescribed defense acquisition management process. However, according to ACAT and other discretion granted to the Component Acquisition Executive in Instruction 5000.02, the Program Executive Officer and the program manager are empowered to tailor practices for less complexity and quicker life cycle. One example of discretion is DoD's possible time, DoD program managers can 'evolutionary acquisition' exceptions already 'cut to the chase' and field functionality noted. Where it is determined by the CAE incrementally and in evolutionary fashion. or PEO that the underlying technology is In these programs, it is recognized up-front mature and available, and there is a that a fully functional capability will come recognized need for capability in the shortest over time. Less than a fully functional © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 5 of 14
  • 6. system is accepted for the benefit of an early the work of organizations like ISO, IEC, deployment of essential feature and IEEE, and EIA, the DoD has adopted many function. of their standards as replacements for in- house DoD directives. There are a very large number of practice standards for every aspect of DoD projects. An important example is the adoption of A generation ago, DoD was its own ANSI/EIA 748B, Standard for Earned Value standards body, writing and publishing a Measurement System. Another example: In prodigious body of knowledge in the form the national intelligence community policy of instructions, guidelines, military guidance 105.1 already discussed, there is standards, handbooks, and procedures for direction that specifically allows system projects and programs. Since 1994 onward, engineering to follow nationally recognized it has been DoD policy to govern DoD bodies of knowledge, like that from the design and implementation practices Software Engineering Institute and the according to industry standards insofar as International Council on System possible given the warfighter nature of Engineering.13 defense requirements. Seeking to leverage Phases and Gates The Defense acquisition Major DoD programs are sequential management process between major phases; each phase is The Defense acquisition management life guarded by a gate with formal criteria and a cycle for the U.S. DoD is given in Figure 1 decision authority empowered to open the that is adapted from the “System gate, or not. Engineering Guide” of the Department of Defense. © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 6 of 14
  • 7. Figure 1, Acquisition Life Cycle Though not explicit about how much time is typically pre-requisite to milestone reviews. apportioned among phases, suffice to say that the phases run sequentially and finish- All important activities to determine user to-start in precedence based upon the needs and make an assessment of available milestone decisions. technology are outboard of the formally defined phases. These activities have Gates, called milestone reviews, control the processes all to themselves. These activities exit from and entry into phases. Criteria are in effect develop and obtain approval of the defined for moving through the gates business case. Critical success factors are successfully; program decision points are documented. Parallel or enabling events to assess the achievement of the technology programs could be started, or criteria. Decision point reviews are synchronized with the program being © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 7 of 14
  • 8. approved. the "FOC" models is made available to all users. IOC is intended to be fully functional In a nod to Mr Royce's ideas and to the ideas but may not be manfacturable in scale. of agile and iterative methods, a subset of However, like the evolutionary acquisition customers may get the advantage of an already discussed, IOC may also be less than "IOC" model before full scale production of fully featured and functional. Iteration in the DoD model At the top level as illustrated in Figure 1-5, milestone decision has been made to move the DoD model departs from Royce's model onto the next phase, it is not the usual insofar as iteration is not planned or practice encouraged between phases. Once the to double back to an earlier phase. other methodologies could be used according to risk and technology, to include However, within phases, the Royce model or agile methods we discuss in this book. Agile requires reconciliation of traditional Defense acquisition practices For the agile project manager, there are a few key practices in normal Defense programs that require reconciliation with agile methods. Among these are the practices of the customer, contracts, and teams; and the system engineer. Four others are earned value management, independent test verification and validation, configuration management, and data management. Customers, contracts, and teams For the most part, DoD end-users are DoD structure but it is a reality driven by represented by acquisition agencies or practicality – there’s simply no way for training and development components.14 hundreds, perhaps many thousands of users These agencies and components are the to participate in a single project. product masters for end-user projects. Therefore, practices like customer teams to Although not an exclusive arrangement, represent large constituent populations, representation rather than direct webinars and webinar demonstrations to participation is a fact is many DoD projects. disparate user groups, wide-spread ‘beta’ Representation puts distance between tests among early adopters, and even developer and user that is not present in collaborative contributions to end-user most commercial agile projects. documentation, not unlike the open Consequently, practices must emerge and community that contributes to Wikipedia, evolve to overcome the disadvantages of are possible mitigations for distance and distance. dispersion of the real end-users.15 Furthermore, the end-user community is Another point is that most software is quite large, although not as large as the mass acquired by contract from developers and software audience for games, social suppliers. Agile methods will more often networking, and home-use applications. So, than not be applied through the channel of a representation is not only a reality of the contract, and the contracting officials will © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 8 of 14
  • 9. not be the end-user or even the end-user’s the military is built from the smallest unit component unit. The contract will represent upward. DoD is comfortable with ‘joint’ three points of view: the rules of contract operations involving the mix of military and law held by the contracting officer; the civilian, multiple skills, matrix assignments, project objectives of the project manager; and leadership commensurate with the and the functional needs of the end-user. A situation. successful contractor will satisfy all three constituents. It reasonable and practical to build joint DoD-supplier teams to perform work orders The contracting officer is the only one of the contracted for agile projects. Typically, the three with the statutory power to commit the DoD contribution to the team will be end- government to a contract and authorize user representatives; the contractor will acceptance and payment of contractor provide a workforce and a project manager; invoices. In general terms, the contracting the DoD will have a program manager officer also controls scope and delivery— whose responsibilities end at the water’s that is, insofar as scope and delivery are edge of the actual project operation. That is, explicit in the contract, only the contracting the DoD program manager will have officer can change the obligation of the responsibility for funding, top-level plans, contractor’s performance requirement. assessment of progress, and functional acceptance of the work product; the DoD DoD is comfortable with teams that are project manager will not manage the project small high performance units with day-to-day unless the work is done in-house empowering decision authority. That is how of the acquisition agency. System Engineering Just like in any civilian project, DoD criteria and means to verify and validate projects begin with an idea, a vision, and a satisfaction of the top-level requirements.16 need that is validated by a business case. The project then enters the realm of The job of system engineering is not acquisition. threatened by agile methods, but responsibilities are different. Agile does not DoD acquisition managers work from the embrace a ‘big design up front’ where top-level requirements stated by the user system engineers typically do most of their components or others responsible for the work. System engineering in the agile space user’s needs, and from requirements derived provides ‘just enough’ architecture and from the standing instructions and directives system design to provide guidance for each of the acquisition system. planning wave and direction for each iteration to begin work. System engineering is a mandated discipline in DoD acquisitions as given in Enclosure Assuming agile projects will be conforming 12 of 5000.02 – “Systems engineering shall to evolutionary acquisition, and likely will be embedded in program planning and be be small endeavors well within the designed to support the entire acquisition discretion of PEOs and program managers, life cycle”. The job of system engineering the system engineer has the additional in DoD is two-fold: specify the architecture responsibility of reconciling evolutionary and associated requirements to synthesize a requirements with the overall vision and system design; and specify the acceptance guiding architecture. These responsibilities © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 9 of 14
  • 10. are explicated recognized in Chapter 3 of the like it is for any other agile project. DoD “Systems Engineering Fundamentals” guidebook. However, agile does not require detailed requirements from the architect at the outset Contractors working on agile DoD projects since details are developed during each may provide systems engineering, or the iteration. A persistent means to record government may provide the engineering requirements is required for support and talent. In any event, following the dictum follow-on to so-called pre-planned product that every system or product has improvements, P3I. architecture, a systems model is needed just Earned Value Management and the IMS/IMP DoD policy requires earned value value measurement systems. As described management on programs valued at $20M or in Data Item Description 81650, an IMS is a greater. EIA 748 is the directed standard. network schedule that conforms to an There are means to incorporate earned value ‘activity on node’ paradigm; it shows a measurements in agile methods, even for the critical path and all the dependencies among smallest program. In point of fact, earning activities. And, 81650 requires risk value is valuable regardless of the amount at adjustment of schedules, embracing the 3- stake. point estimating procedure used widely in project estimating. An Integrated Master Plan, IMP, is required on programs that require earned value Agile teams’ dependencies can easily be measurement. The IMP is event based; it is rendered in a network schedule. Activities intended to forecast accomplishments to be within a team are not ordinarily scheduled expected at events. In the agile space, formally since a team completes its work in appropriate events are releases. A master a matter of a few weeks; however, there is schedule complements the IMP. nothing to preclude identification of key activities and scheduling their An Integrated Master Schedule, IMS, is interdependencies within the team required on all programs that have earned complement. Independent Test and Verification Development, test, and evaluation [DT&E] the project performance team? Certainly is mandated by 5000.02 Enclosure 6. independent validation where users actually However, there is wide latitude granted the employ the deliverables operationally, or in program manager: “The PM shall design an operational test setting, is probably DT&E objectives appropriate to each phase without question. Generally speaking, in and milestone of an acquisition program.” this book we endorse independent acceptance testing to verify before Agile methods embrace test as integral to validation that the product works. See the design and development process. The Figure 2-2 for our ‘V’ diagram. All other question arises about a Taylor-Deming view testing is appropriately within the agile high of test – to what degree should testing be performance team. independent of the developers and outside © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 10 of 14
  • 11. Configuration and Data Management Configuration management is a component that can be examined and evaluated by of system engineering in the DoD world. As constituents. There are also issues of data given in 5000.02 Enclosure 12 for Systems rights and ownership of intellectual property Engineering, the management team will “… by the myriad participants in a DoD project. use a configuration management approach to establish and control product attributes and Again, Enclosure 12 comes into play: the technical baseline across the total system Enclosure 12 makes data management a life cycle.” This is a matter of establishing system engineering responsibility. It is permanence and change control over the incumbent on the program manager and the product baseline. No less is expected in system engineer to establish a ‘data commercial projects where product baseline management strategy’ consistent with the control is carefully exercised. project’s agility, long-term P3I possibilities, and the needs of the user community. Data management extends to the broader topic of information management. Unlike Each situation will be different; the latitude commercial agile projects where common afforded program managers on smaller scale practice is whiteboards, CRC cards, user projects is the key to effective strategy for stories on 3x5s, and etc, projects in the the performance teams and the project public domain must have permanent records beneficiaries. Summary and take-away points • Our theme is agile methods have a useful but limited role in Defense programs, providing quick-reaction capability, effective methodology for many Web applications, and a source of potential innovation for Defense needs. • Right from the top evolutionary and incremental methods are encouraged by DoD to solve a number of acquisition needs. • Acquisition officials, right down to the program manager, are afforded much latitude to get the job done. Adoption has begun within many software intensive systems in all domains. • However, there are limitations: mission and life critical needs, certain high security needs, and programs on the scale that is routine in the DoD are not appropriate to agile methods because there is insufficient rigor and scalability to the practices. • System engineering, with its included tasks of test, data management, and configuration management, is an important skill to have on the agile project. System engineering brings thoughtful architecture that in the end will pay lifecycle benefits. • In the main, DoD will benefit from agile methods applied with discretion and thoughtfulness because agile projects are inherently timely and cost effective. © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 11 of 14
  • 12. End notes 1 Editors, “Introduction to Defense Acquisition Management” Defense Acquisition University Press, Fort Belvoir, VA, December 2008, pg 1 2 http://www.stsc.hill.af.mil/crosstalk/2009/07/index.html 3 USD(AT &L) “DoD Instruction 5000.02, Operation of the Defense Acquisition System” U.S. Department of Defense, 8 December 2008, pg 13 Retrieved from https://acc.dau.mil/dag500002, August 2009 4 At the present time, the only agile method formally recognized in the Defense Acquisition Guidelines, DAG, is the evolutionary acquisition process. However in the Air Force guidelines for system acquisition, Extreme Programming is a recognized design method. According to the Air Force view, waterfall, incremental, evolutionary, and spiral are the four principal lifecycles. See Editors, “Guidelines for Successful Acquisition and Management of Software Intensive Systems: Weapons Systems, Command and Control Systems, Management Information Systems”, Software Technical Support Center, U.S. Department of the Air Force, February, 2003, Chapter 2 pg 4-13; Chapter 15 pg. 7 5 DoD makes a distinction between acquisition and procurement, the latter being for non- developmental items such as parts and supplies and services. Acquisition includes design, engineering, test and evaluation, production, and operations and support of defense systems. 6 See the web link at http://www.dau.mil/pubs/gdbks/idam.asp 7 There are distinctions between automated information systems, AIS, defense space systems, and all other programs insofar as ACATs are concerned. AIS only uses ACAT I and III, wherein AIS ACAT III is defined simply as not meeting the requirements for ACAT I. Defense space systems are exempt from DoD instruction 5000.2 that governs defense acquisition, but there are parallel instructions for space systems that recognize the low volume but high complexity of space systems. As regards ACAT IV, only the Navy and Marine Corps have ACAT IV programs. See “Introduction to Defense Acquisition Management” op. cit. ppg 20-23 8 ACAT III AIS programs are budgeted for less than $126M acquisition cost, with not more than $32M in any fiscal year, all in FY2000 constant dollars; subject to change with each session of Congress. See “DoD Instruction 5000.02, Operation of the Defense Acquisition System” op. cit., Enclosure 3, pg 33 See “Guidelines for Successful Acquisition and Management of Software Intensive Systems: Weapons Systems, Command and Control Systems, Management Information Systems”, op. cit., Chapter 2 pg 10 10 'IOC' and 'FOC' refer to initial and final operating capability. IOC specifically means that a subset of the total user population has been given the use of the deliverable © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 12 of 14
  • 13. 11 “Introduction to Defense Acquisition Management” op. cit. pg 25 12 “A key challenge for the Milestone Decision Authority is ensure a balance between the agility and discipline of the acquisition process” is guidance given in “Intelligence Community Policy Guidance – Acquisition, 105.1” (Unclassified) 12 July 2007, paragraph G.3, authorized by the Deputy Director for National Intelligence for Policy, Plans, and Requirements 13 “Intelligence Community Policy Guidance – Acquisition, 105.1” op. cit. paragraph N 14 ‘Components’ is DoD jargon for the various organizations within the Department of Defense. To be a component does not strictly imply a place in the hierarchy, but generally components are very high-level, to include each service and major command, other field units, and the Defense agencies, and organizational units under the Secretary of Defense and the Joint Chiefs of Staff. See “DoD Instruction 5000.02, Operation of the Defense Acquisition System” op. cit. paragraph 2.A. for details. 15 In 2009, the Army began collaboration among users to write and edit Army field manuals, using techniques something like Wikipedia collaboration. Users make contributions to established field manuals, but then editors and review boards validate content. See: Cohen, N. “Care to write Army doctrine? With ID, Log on” The New York Times, August 13, 2009, retrieved from http://www.nytimes.com/2009/08/14/business/14army.html?scp=5&sq=wikipedia&st=cse August, 2009 16 A good reference for system engineering in the DoD is: Editors, “Systems Engineering Fundamentals” Systems Management College, Defense Acquisition Press, January 2001, Chapter 3, pg 31-33 © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 13 of 14
  • 14. About the author John C. Goodpasture, PMP and managing principal at Square Peg Consulting, is a program manager, coach, author, and project consultant specializing in technology projects, strategic planning, project office operations. He is the author of books, articles, and web logs in the field of project management. He blogs at johngoodpasture.com, provides presentations at www.slideshare.com/jgoodpas, and his work products are found in the library at www. sqpegconsulting.com. His latest book, “Project Management the Agile Way—Making it work in the Enterprise” addresses agile methods applied to large scale projects. In his early career, John was a program manager at the National Security Agency, a unit of the Department of Defense. He subsequently worked in the aerospace and defense industry as a system engineer and program manager. John’s most recent engagements have been in the information technology space doing projects with large scale ERP’s. © Copyright John C. Goodpasture, 2009, all rights reserved www.sqpegconsulting.com Page 14 of 14