Acq Notes

AcqNote Description Area

Production, Quality & Manufacturing

Reliability Centered Maintenance

Reliability Centered Maintenance (RCM) is a systematic approach for identifying preventative or scheduled maintenance tasks for an equipment end item and establishing necessary preventative (or scheduled) maintenance task intervals. It’s generally used to achieve improvements in fields such as the establishment of safe minimum levels of maintenance, changes to operating procedures and strategies, and the […]

Production, Quality & Manufacturing

Reliability Centered Maintenance Read More »

Production, Quality & Manufacturing

Integrated Management Planning

The Integrated Product & Process Development (IPPD) approach to manufacturing and quality planning is Integrated Management Planning (IMP). IMP is the merging of manufacturing and production, planning and development activities, and quality practices. Production and quality planning are performed simultaneously in IMP. It includes four (4) important production activities that are performed by both contractor

Production, Quality & Manufacturing

Integrated Management Planning Read More »

Information Technology

Reference Architecture

A Reference Architecture guides and constrains the development of Solution Architectures. There may be multiple Reference Architectures within a subject area where each represents a different emphasis or viewpoint. They can be defined at many levels of detail and abstraction (from specific to generalized) and for many different purposes. They help provide: [1] A common

Information Technology

Reference Architecture Read More »

Information Technology

Net-Ready Key Performance Parameter Checklist

The following checklist from the Defense Acquisition Guidebook (DAG) summarizes the requirements for demonstrating compliance with the Net-Ready Key Performance Parameter (KPP) and should be useful in preparing for milestone approvals. Checklist: Net-Ready KPP Compliance Guidebook: Navy Net-Ready Key Performance Parameter Guidebook – 30 Sept 2011 Required Documents: Applicable Integrated Architecture Products, AV-1, OV-2, OV-4,

Information Technology

Net-Ready Key Performance Parameter Checklist Read More »

Information Technology

Net-Ready Key Performance Parameter

The Net-Ready Key Performance Parameter (NR-KPP) assesses the net-ready attributes required for both the technical exchange of information and the end-to-end operational effectiveness of that exchange. It evaluates information needs, information timeliness, Information Assurance (IA), and net-ready attributes. It’s rquirements are summarized in the NR-KPP Checklist. Checklist: Net-Ready Key Performance Parameter Guidebook: Navy Net-Ready Key

Information Technology

Net-Ready Key Performance Parameter Read More »

Information Technology

Net-Centric Operations

Net-Centric Operations refers to participating as a part of a complex community of people, devices, information, and services interconnected by a communications network to optimize resource management and provide superior information on events and conditions needed to empower decision-makers. The Net-Centricity concept is the realization of a networked environment, including infrastructure, systems, processes, and people,

Information Technology

Net-Centric Operations Read More »

Information Technology

Mission Assurance Category

Mission Assurance Category (MAC) is applicable to Department of Defense (DoD) information systems and reflects the importance of information relative to the achievement of DoD goals and objectives, particularly the warfighters’ combat mission. Mission assurance categories are primarily used to determine the requirements for availability and integrity. Definition: Mission Assurance is a term primarily used

Information Technology

Mission Assurance Category Read More »

Information Technology

Net-Centric Data & Service Strategy

The DoD Net-Centric Data Strategy provides the basis for implementing and sharing data in a net-centric environment. It describes the requirements for inputting and sharing data, metadata, and forming dynamic communities to share data. Program Managers (PMs) and Sponsors/Domain Owners should comply with the explicit requirements and the intent of this strategy, which is to

Information Technology

Net-Centric Data & Service Strategy Read More »

Test & Evaluation

Joint Interoperability Test Certification Validation

There are two tests that are performed by the Joint Interoperability Test Center (JITC) to certify and validate a system is ready for operational fielding. These two (2) tests are: Joint Interoperability Test Certification Joint Interoperability Test Validation Website: Joint Interoperability Test Center (JITC) (1) Joint Interoperability Test Certification The Joint Interoperability Test Certification is

Test & Evaluation

Joint Interoperability Test Certification Validation Read More »

Systems Engineering

Initial Technical Review (ITR)

The Initial Technical Review (ITR) is a multi-disciplined technical review to support a program’s initial Program Objective Memorandum (POM) submission in the Materiel Solutions Analysis (MSA) Phase . This review ensures a program’s Technical Baseline is sufficiently rigorous to support a valid cost estimate and enable an independent assessment. The ITR assesses the capability needs

Systems Engineering

Initial Technical Review (ITR) Read More »

Information Technology

Information Technology Maintenance

Information Technology (IT) Maintenance refers to the processes needed to sustain an IT product throughout its operational life cycle. Modifications to the IT product are logged and tracked, an impact analysis performed, code and other parts of the IT system are modified, testing is performed, and a new version of the IT product is released.

Information Technology

Information Technology Maintenance Read More »

Information Technology

Information Technology Acquisition Board

The Information Technology Acquisition Board (ITAB) is the decision forum for Milestone review of Acquisition Category (ACAT) IAM programs. The ITAB contributes strategic-level insight for net-centric, Global Information Grid (GIG), and Information Technology issues when they cannot be resolved at the Overarching Integrated Product Team (OIPT) level. The ITAB facilitates execution of the Milestone Decision

Information Technology

Information Technology Acquisition Board Read More »

Information Technology

Information Support Plan Analysis

Information Support Plan (ISP) Analysis is concerned with analyzing a program’s information needs and dependencies. This analysis must be considered in the context of the process that is critical to the capability being completed by the system. It examines the critical mission threads associated with a program and compares the operational architecture views to the

Information Technology

Information Support Plan Analysis Read More »

Information Technology

Information Superiority

Information Superiority is the operational advantage derived from the ability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same. The Department of Defense (DoD) strategic vision for the 21st century is to ensure that U.S. forces have information superiority in every mission area

Information Technology

Information Superiority Read More »

Information Technology

Information Resources Management (IRM)

Information Resources Management (IRM) is the process of managing information resources to accomplish agency missions and improve agency performance, including reducing information collection burdens on the public. When standardized and controlled, these resources can be shared and reused throughout an agency, not just by a single user or application. [1] Definition: Information Resource Management (IRM)

Information Technology

Information Resources Management (IRM) Read More »

Information Technology

Information Assurance Services in an Acquisition Strategy

A DoD program should address Information Assurance (IA) in their Acquisition Strategy if they acquire Information Technology (IT) services by a contractor. The focus should be to ensure IA is implemented in the design, development, test, and production of the system being developed. In the case of an acquisition of IT services, the IA considerations

Information Technology

Information Assurance Services in an Acquisition Strategy Read More »

Information Technology

Cybersecurity Content in an Request for Proposal

Every acquisition program should include language in their Request for Proposal (RFP) that addresses Cybersecurity requirements for a contractor. These requirements should be clearly and unambiguously articulated to potential offerors and what is expected from them in terms of compliance and performance. Below is a sample/explanation of Cybersecurity RFP Content that was obtained from the Defense

Information Technology

Cybersecurity Content in an Request for Proposal Read More »

Information Technology

Global Information Grid (GIG)

The Information Technology (IT) infrastructure of the DoD is the Global Information Grid (GIG). The GIG is the Department’s globally interconnected end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policymakers, and support personnel. The GIG includes owned and leased communications and computing systems and services, software

Information Technology

Global Information Grid (GIG) Read More »

Information Technology

Federal Risk and Authorization Management Program

The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP is the result of close collaboration with cybersecurity and cloud experts from GSA, NIST, DHS, DoD, NSA, OMB, the Federal CIO Council and its working

Information Technology

Federal Risk and Authorization Management Program Read More »

Information Technology

Electronic Data Interchange (EDI)

Electronic Data Interchange (EDI) is the exchange of standardized information between business partners typically communicated electronically between computers. It is used to transfer electronic documents or business data from one computer system to another computer system. EDI also is used within individual organizations that want to transfer data between different divisions or departments, including finance,

Information Technology

Electronic Data Interchange (EDI) Read More »

Intelligence & Security

DoD Public Key Infrastructure

A Cryptography Key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption. Keys are also used in other cryptographic

Intelligence & Security

DoD Public Key Infrastructure Read More »

Information Technology

DoD NetOps Strategic Vision

NetOps is defined as the DoD-wide operational, organizational, and technical capabilities for operating and defending the Global Information Grid (GIG). NetOps includes, but is not limited to, enterprise management, net assurance, and content management. The role of NetOps in Net-Centric Operations is to enable the GIG to provide users at all levels and in all

Information Technology

DoD NetOps Strategic Vision Read More »

Information Technology

DoD Data Services Environment (DSE)

Note: The DoD Metadata Registry has been replaced by the DoD Data Services Environment (DSE). The Department of Defense (DoD) Data Services Environment (DSE) is managed by the Defense Information Systems Agency (DISA). The DSE provides a single location to DoD data source directories to improve search, access, consistency, and integration of data services as well

Information Technology

DoD Data Services Environment (DSE) Read More »

Information Technology

DoD Information Technology Standards and Profile Registry

The DoD Information Technology Standards Registry (DISR) is an online repository of Information Technology (IT) standards.  DISR online supports the continuing evolution of the DISR and the automation of all its processes and is the repository for information related to DOD IT and National Security Systems (NSS) standards. DISR should be used by anyone involved

Information Technology

DoD Information Technology Standards and Profile Registry Read More »