Search Results for: 2

Information Technology

DoD Enterprise Software Initiative

The DoD Enterprise Software Initiative (ESI) is a contract mechanism that establishes and manages Commercial-Off-The-Shelf (COTS) Information Technology (IT) agreements, assets, and policies for the purpose of lowering the total cost of ownership across the DoD, Coast Guard, and Intelligence communities. DoD ESI’s mission extends across the entire commercial IT life-cycle combining the DoD’s buying […]

Information Technology

DoD Enterprise Software Initiative Read More »

Information Technology

Cyberspace

Cyberspace is the global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Among many other things, cyberspace enables users to conduct business, communicate, socialize, connect, exchange ideas, play games, participate in social forums, and share information. Cyberspace

Information Technology

Cyberspace Read More »

Information Technology

Defense Business Systems (DBS)

Note: Canceled: DoD Instruction 5000.02, “Operation of the Defense Acquisition System,” Enclosure 12 and replaced by the Business Capability Acquisition Cycle (BCAS) A Defense Business Systems (DBS) are an information system, other than a national security system (NSS), operated by, for, or on behalf of DoD, including financial systems, mixed systems, financial feeder systems, and Information Technology (IT)

Information Technology

Defense Business Systems (DBS) Read More »

Information Technology

Clinger-Cohen Act (CCA) of 1996 – What is it?

The Clinger-Cohen Act (CCA) of 1996 is designed to improve how the federal government acquires, uses, and disposes of Information Technology (IT). It encompasses the (1) Information Technology Management Reform Act (ITMRA) (Division E) and the (2) Federal Acquisition Reform Act (FARA) (Division D), which were signed into law as part of the National Defense

Information Technology

Clinger-Cohen Act (CCA) of 1996 – What is it? Read More »

Information Technology

Configuration Management Information System (CMIS)

The DoD Configuration Management Information System (CMIS) supports the configuration, engineering, and technical data management functions of the Department of Defense (DoD) community with a standard Web-Based Automated Information System (AIS). The primary objective of CMIS is to provide the DoD community with a standard AIS to support CM activities. The CM activities supported are:

Information Technology

Configuration Management Information System (CMIS) Read More »

Information Technology

Acquisition Information Assurance Strategy

The Acquisition Information Assurance (IA) Strategy provides documentation that ensures that the program has an information assurance strategy that is consistent with DoD policies, standards, and architectures, to include relevant standards. The Program Manager (PM) develops the Acquisition IA Strategy to help the program office organize and coordinate its approach to identifying and satisfying IA

Information Technology

Acquisition Information Assurance Strategy Read More »

Financial Management

Automated Information System (AIS)

An Automated Information System (AIS) is a system of computer hardware, computer software, data, and/or telecommunications that performs functions such as collecting, processing, storing, transmitting, and displaying information. Program Managers (PM) for acquisitions of AIS applications are responsible for coordinating with organizations that will host (run) the applications early in the acquisition process.  The PM

Financial Management

Automated Information System (AIS) Read More »

Financial Management

Compliance with Information Enterprise

To comply with the DoD Information Enterprise requirements for an acquisition program throughout its life-cycle, a Program Manager (PM) should: [1] Meet the DoD Architecture Framework (DoDAF) requirements in producing architectural views. Meet the DODAF Meta-model (DM2) Physical Exchange Specification (PES) requirements for sharing/reusing architecture data. Meet the DoD Information Technology (IT) Standards Registry (DISR)

Financial Management

Compliance with Information Enterprise Read More »

Information Technology

Information Support Plan (ISP)

An Information Support Plan (ISP) describes a systems dependencies and interface requirements in sufficient detail to enable testing and verification of Information Technology (IT) and National Security Systems (NSS) interoperability and supportability requirements. The ISP is required for all Acquisition Category (ACAT) programs that connects in any way to the communications and information infrastructure including

Information Technology

Information Support Plan (ISP) Read More »