Currently viewing the tag: "Strategy"

Active remote sensing is the principal tool used to study and to predict short- and long-term changes in the environment of Earth – the atmosphere, the oceans and the land surfaces – as well as the near space environment of Earth. All of these measurements are essential to understanding terrestrial weather, climate change, space weather hazards, and threats from asteroids. Active remote sensing measurements are of inestimable benefit to society, as we pursue the development of a technological civilization that is economically viable, and seek to maintain the quality of our life. A Strategy for Active Remote Sensing Amid Increased Demand for Spectrum describes the threats, both current and future, to the effective use of the electromagnetic spectrum required for active remote sensing. This report offers specific recommendations for protecting and making effective use of the spectrum required for active remote sensing.

Source: A Strategy for Active Remote Sensing Amid Increased Demand for Radio Spectrum | The National Academies Press

Incoming search terms:

StrategyArchives-ACyberFellow, CyberWarfareArchives-ACyberFellow
Tagged with:
 

Download (PDF, 795KB)

Released in December of 2011 by the Executive Office of the President, the National Science and Technology Council provides direction in Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program.  I find understanding this document helps clarify how the “Technology Doctrine” flows down through the government into the Department of Defense and then into the U.S. Navy.

The objective of  Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program is “to express a vision for the research necessary to develop game-changing technologies that can neutralize the attacks on the cyber systems of today and lay the foundation for a scientific approach that better prepares the field to meet the challenges of securing the cyber systems of tomorrow.

Federal Cybersecurity Research and Development (R&D) Program Thrusts:

  1. Inducing Change
    • Designed-In Security
    • Tailored Trustworthy Spaces (with a Focus Area  of Wireless Mobile Networks)
    • Moving Target (with Focus Areas of Deep Understanding of Cyberspace and Nature-Inspired Solutions)
    • Cyber Economic Incentives – Research required to Explore models of cybersecurity investment and markets; develop data models, ontologies, and automatic means of sanitizing data or making data anonymous; define meaningful cybersecurity metrics and actuarial tables; improve the economic viability of assured software development methods; provide methods; to support personal data ownership; provide knowledge in support of laws, regulations, and international agreements.
  2. Developing Scientific Foundations
    • Organizes disparate areas of knowledge – Provides structure and organization to a broad-based body of knowledge in the form of testable models and predictions
    • Enables discovery of universal laws – Produces laws that express an understanding of basic, universal dynamics against which to test problems and formulate explanations
    • Applies the rigor of the scientific method – Approaches problems using a systematic methodology and discipline to formulate hypotheses, design and execute repeatable experiments, and collect and analyze data
  3. Maximizing Research Impact
    • Supporting National Priorities – Health IT, Smart Grid, Financial Services, National Defense, Transportation, Trusted Identities, Cybersecurity Education.
    • Engaging the Cybersecurity Research Community
  4. Accelerating Transition to Practice
    • Technology Discovery
    • Test and Evaluation
    • Transition, Adoption, and Commercialization

Executing the Federal Cybersecurity Research Program:

  1. Research Policies
    • Provide accurate, relevant, timely scientific and technical advice
    • ensure policies of Executive Branch are informed by sound science
    • ensure scientific and technical work of Executive Branch is coordinated to provide greatest benefit to society
  2. Research Coordination

    NITRD Structure for Cybersecurity R&D Coordination

  3. Research Execution (via Agencies)
    • DARPA
    • DHS S&T
    • DoE
    • IARPA
    • NIST
    • NSA
    • NSF
    • OSD
    • DoD Service research organizations

[via NITRD]

Download (PDF, 774KB)

We’ve seen the U.S. Government CIO publicize his plan to Do More with Less Through Strategic Investment and now the White House has published the Federal Information Technology Shared Services Strategy (May 2, 2012).  

Its main points are:

  • Need to Innovate with Less – the large fiscal deficit drives this necessity but really the IT consolidation that is occurring throughout the U.S. Government is something that should have been done from the beginning.  Quantities of Scale are not a new discovery and the ability for the USG to combine together to provide a single service provided for the entirety of the organization is now paramount.  The disappointing aspect of this document is that is bounds itself to only the Executive Branch of the USG.  The requirement to “Deliver solutions faster, for less money, and with fewer resources” is a significant challenge.  One that will only be accomplished through this quantity of scale solution.
  • While I would agree that “Federal Agency CIOs are well positioned to work with other agency executives and provide leadership for the Shared-First effort by using a cross-organizational perspective to identify opportunities for the consolidation of redundant mission, support, and commodity IT services at all levels,” I don’t believe they are empowered sufficiently enough to accomplish what is being required of them.  One must remember that the USG has only had two CIO’s.  This entity within the Government sector is an exceptionally junior member that has only recently been able to sit at the table with the well established executives within our Government.  There is significant differences from organization to organization with respect to how the CIO is positioned and how empowered the individual is within the organization.  This all equates to their overall effectiveness.  I think this aspect represents the largest portion of risk to this initiative.
  • A new requirement for Chief Operating Officers (COOs) is hidden within the generation of a thing called PortfolioStat.
  • What is a PortfolioStat?A PortfolioStat session is a face-to-face, evidence-based review of an agency’s IT portfolio that includes examining cost, schedule and performance data on commodity IT investments, and identifying potential duplications or investments that do not appear to be well aligned to agency missions or business functions, with an eye toward consolidating or eliminating those investments to free up agency funds for innovation and other requirements (Glad we cleared that up – Effective oversight, check).
  • The document then goes on to identify the Managing Partner, Customer, and Supplier for the Shared IT services.  I’m fairly sure we could have figured this out on our own.  Should have just cut to the chase and formed a new Government “Pick your favorite major IT company” like a Government Google or Government Microsoft, etc.  At least with a solution like this we could focus the quantities of scale dollars on IT experts vice having a bounty of average IT individuals.
  • Critical Success Factors – Executive Support (won’t happen without it), Cultural Change (change in Gov’t = slow), Business Process Reengineering (see previous comment about change), Technology Enablement (hmm might have heard this before), Resource Realignment (see change comment), Adoption Strategy (more change), Continuous Improvement (isn’t this institutionalized yet?).
  • Commodity IT – one great thing thus far.  But since it wasn’t defined how will we know what it is?  And the reference doesn’t make it much better (OMB M-11-29).  So we know what Commodity IT maybe is but the USG definitely does not know how to deal with it or properly acquire it and this challenge only becomes more difficult as you approach the leading edge of innovation.
  • The remainder of the document focuses on implementation, timelines, Policy and Governance details.

Remember all of this supports the initial USG 25-Point Implementation Plan to Reform Federal IT Management. Although I jest a bit with this review, the document is a good continuum of effort and push by the Federal CIO.  As noted Mr. Steven VanRoekel is only the second in the USG CIO position and there are large hurdles to vault before we can get the full USG into the advanced IT realm.

[via The White House]

Incoming search terms:

what is portfoliostat, portfoliostat
Set your Twitter account name in your settings to use the TwitterBar Section.