Acq Notes

AcqNote Description Area

Information Technology

DoD Information Enterprise Architecture

  The Defense Information Enterprise Architecture (DIEA) provides a common foundation to support the Department of Defense (DoD) transformation to net-centric operations and establishes priorities to address critical barriers to its realization. It comprises the information, information resources, assets, and processes required to achieve an information advantage and share information across the DoD and mission […]

Information Technology

DoD Information Enterprise Architecture Read More »

Information Technology

DoD Information Technology Portfolio Repository

DoD Information Technology (IT) Portfolio Repository (DITPR) contains a comprehensive unclassified inventory of the DoD’s mission-critical and mission-essential Information technology systems and their interfaces. It contains basic overview information regarding all DoD IT systems, including;  system names, acronyms, descriptions, sponsoring components, approval authority, points of contact, and other basic information required to analyze DoD inventory, portfolios,

Information Technology

DoD Information Technology Portfolio Repository Read More »

Information Technology

DoD Information Sharing Strategy

The DoD Information Sharing Strategy provides a common vision to synchronize information sharing initiatives and investments throughout the Department of Defense (DoD). Sharing of information is an increasingly important element of mission success. It is imperative to effectively exchange information among components, Federal agencies, coalition partners, foreign governments, and international organizations as a critical element

Information Technology

DoD Information Sharing Strategy Read More »

Information Technology

DoD Information Assurance Certification and Accreditation Process (DIACAP) (Replaced)

Note: The DIACAP process has been replaced by the Risk Management Framework (RMF) for DoD Information Technology. (Replaced) The DoD Information Assurance Certification and Accreditation Process (DIACAP) is the Department of Defense (DoD) process to ensure that risk management is applied on information systems (IS). DIACAP defines a DoD-wide formal and standard set of activities,

Information Technology

DoD Information Assurance Certification and Accreditation Process (DIACAP) (Replaced) Read More »

Information Technology

DoD Enterprise Software Initiative

The DoD Enterprise Software Initiative (ESI) is a contract mechanism that establishes and manages Commercial-Off-The-Shelf (COTS) Information Technology (IT) agreements, assets, and policies for the purpose of lowering the total cost of ownership across the DoD, Coast Guard, and Intelligence communities. DoD ESI’s mission extends across the entire commercial IT life-cycle combining the DoD’s buying

Information Technology

DoD Enterprise Software Initiative Read More »

Financial Management

DoD Enterprise Architecture

An Enterprise Architecture (EA) describes the “current architecture” and “target architecture,” and provides a strategy that will enable an agency to transition from its current state to its target environment. The Office of Management and Budget defines enterprise architecture as the explicit description and documentation of the current and desired relationships among business and management

Financial Management

DoD Enterprise Architecture Read More »

Information Technology

Defense Information System Agency (DISA)

  The Defense Information System Agency (DISA) is a Combat Support Agency comprised of military, federal civilian, and our contractor partners. DISA provides the network, computing infrastructure, and enterprise services to support information sharing and decision making within the DoD and federal agencies. The mission of DISA is to provide command and control capabilities and

Information Technology

Defense Information System Agency (DISA) Read More »

Information Technology

Defense Business Systems (DBS)

Note: Canceled: DoD Instruction 5000.02, “Operation of the Defense Acquisition System,” Enclosure 12 and replaced by the Business Capability Acquisition Cycle (BCAS) A Defense Business Systems (DBS) are an information system, other than a national security system (NSS), operated by, for, or on behalf of DoD, including financial systems, mixed systems, financial feeder systems, and Information Technology (IT)

Information Technology

Defense Business Systems (DBS) Read More »

Information Technology

Cyberspace

Cyberspace is the global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Among many other things, cyberspace enables users to conduct business, communicate, socialize, connect, exchange ideas, play games, participate in social forums, and share information. Cyberspace

Information Technology

Cyberspace Read More »

Information Technology

Configuration Management Information System (CMIS)

The DoD Configuration Management Information System (CMIS) supports the configuration, engineering, and technical data management functions of the Department of Defense (DoD) community with a standard Web-Based Automated Information System (AIS). The primary objective of CMIS is to provide the DoD community with a standard AIS to support CM activities. The CM activities supported are:

Information Technology

Configuration Management Information System (CMIS) Read More »

Information Technology

Clinger-Cohen Act (CCA) of 1996 – What is it?

The Clinger-Cohen Act (CCA) of 1996 is designed to improve how the federal government acquires, uses, and disposes of Information Technology (IT). It encompasses the (1) Information Technology Management Reform Act (ITMRA) (Division E) and the (2) Federal Acquisition Reform Act (FARA) (Division D), which were signed into law as part of the National Defense

Information Technology

Clinger-Cohen Act (CCA) of 1996 – What is it? Read More »

Financial Management

Compliance with Information Enterprise

To comply with the DoD Information Enterprise requirements for an acquisition program throughout its life-cycle, a Program Manager (PM) should: [1] Meet the DoD Architecture Framework (DoDAF) requirements in producing architectural views. Meet the DODAF Meta-model (DM2) Physical Exchange Specification (PES) requirements for sharing/reusing architecture data. Meet the DoD Information Technology (IT) Standards Registry (DISR)

Financial Management

Compliance with Information Enterprise Read More »

Financial Management

Automated Information System (AIS)

An Automated Information System (AIS) is a system of computer hardware, computer software, data, and/or telecommunications that performs functions such as collecting, processing, storing, transmitting, and displaying information. Program Managers (PM) for acquisitions of AIS applications are responsible for coordinating with organizations that will host (run) the applications early in the acquisition process.  The PM

Financial Management

Automated Information System (AIS) Read More »

Information Technology

Acquisition Information Assurance Strategy

The Acquisition Information Assurance (IA) Strategy provides documentation that ensures that the program has an information assurance strategy that is consistent with DoD policies, standards, and architectures, to include relevant standards. The Program Manager (PM) develops the Acquisition IA Strategy to help the program office organize and coordinate its approach to identifying and satisfying IA

Information Technology

Acquisition Information Assurance Strategy Read More »

Information Technology

Information Support Plan (ISP)

An Information Support Plan (ISP) describes a systems dependencies and interface requirements in sufficient detail to enable testing and verification of Information Technology (IT) and National Security Systems (NSS) interoperability and supportability requirements. The ISP is required for all Acquisition Category (ACAT) programs that connects in any way to the communications and information infrastructure including

Information Technology

Information Support Plan (ISP) Read More »

Information Technology

DoD Information Enterprise

The Department of Defense (DoD) Information Enterprise (IE) is an organizing construct that consists of DoD information assets, processes, activities, and resources required to achieve an information advantage and share information across the DoD. The construct is envisioned to help the DoD move to trusted network-centric operations through the acquisition of services and systems that

Information Technology

DoD Information Enterprise Read More »

Software Management

Software System Best Practices

The Software Development Process is the structured approach to developing software for a system or project. There are a number of approaches (see Software Development Approaches) that can be used to include waterfall, spiral and incremental development. These different approaches will focus the testing effort at different points in the development process. However, each is

Software Management

Software System Best Practices Read More »

Software Management

Software Specification Review

A Software Specification Review (SSR) is conducted for each Computer Software Configuration Item (CSCI) after the System Functional Review (SFR), but prior to the initiation of preliminary design for the individual CSCI. The SSR is part of the overall systems engineering process of allocating and formally defining requirements and must occur after the system/subsystem level

Software Management

Software Specification Review Read More »

Software Management

Software Source Selection Considerations

  Software Source Selection Consideration for Computer Systems & Software (CS&S) tasks includes: Creating CS&S Request for Proposal (RFP) content Accomplishing Software Proposal Evaluation   It’s should be the objective to select developers with sound approaches; applicable domain experience in the development of software-intensive systems; proven program management, systems engineering, and software engineering processes; and

Software Management

Software Source Selection Considerations Read More »

Software Management

Software Size Estimate

Software Size Estimating is an important activity in software engineering that is used to estimate the size of an application or component in order to be able to implement other program management activities such as cost estimation or schedule progress.  The software engineer is responsible for generating independent estimates of the software size throughout the

Software Management

Software Size Estimate Read More »

Software Management

Software Risk Estimation

Software Risk Estimation is one of the most significant risks faced by any weapon system program.  The ability to properly estimate software size, effort, and schedule is crucial and must be addressed by every Program Manager (PM). Visit: Software Estimation Process Consideration Visit: Estimating Reuse Feasibility The following factors contribute to software estimation risk: Ability

Software Management

Software Risk Estimation Read More »

Software Management

Software Size Control

  The software development process often results in software size growth due to additional decomposed and derived requirements at the lower system tiers. A typical challenge for embedded systems is that software size often grows under the radar, unconstrained, unmanaged, and unattended.  In order to combat this situation, consider establishing a software size control program.

Software Management

Software Size Control Read More »