We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySierra Burgess
Modified over 2 years ago
© Front End Strategy 2010
Swedish Maritime Command and Communication Systems Presenters: Karl Hertz (Front End) – Tommy Nordqvist (Front End) – Per Erik Mårdberg
© Front End Strategy Introduction of the speakers and the project 2.Introduction to the scenario (operational context) 3.Maritime Communication and Control 1.Operational context developed further (OV) 2.Solutions perspective (SV) 4.Supported analyses 5.Lessons Learned 6.Q & A Agenda
© Front End Strategy 2010 A project in (so far) three stages 1.National C2 systems in a submarine hunting scenario 2.International C2 systems in Atalanta 2 (ME02) 3.National and international C2 capabilities over time A project under the Swedish Defense Material Department contracting Front End, HiQ and Rote Main focus: –Develop descriptions of maritime C2 assets –Develop operational context (requirement environment) for these assets. Maritime Command and Communication Systems, the project
© Front End Strategy 2010 National submarine hunting scenario, chosen for 1.The extensive range of actors 2.The interoperability requirements 3.The complexity of the operational context 4.The recognition factor All in all: Its a complex scenario, spanning over many different types of units and which most stakeholders recognize. Introduction to the scenario (operational context)
© Front End Strategy 2010 Inside the Model – Operational Context Unidentified submerged object (this scenario is fictional)
© Front End Strategy 2010 Inside the Model – OV-2
© Front End Strategy 2010 Inside the Model – other OV models (1)
© Front End Strategy 2010 Inside the Model – other OV models (2)
© Front End Strategy 2010 Inside the Model – OV-2
© Front End Strategy 2010 Inside the model – Realising information exchanges
© Front End Strategy 2010 Inside the Model – Exploring the C2 systems (part 1)
© Front End Strategy 2010 Inside the Model – Exploring the C2 systems (part 2)
© Front End Strategy 2010 Inside the model – A sample of possible analyses (1)
© Front End Strategy 2010 Inside the model – A sample of possible analyses (2)
© Front End Strategy 2010 Ongoing and future work Technical Requirements MODAF Model Operational Context Supports Textual requirements
© Front End Strategy 2010 Key success points Focused project, clear purpose and scope Using the language of the stakeholders Knowing when to stop modeling Using a clear operational context as basis for the model Describing the C2 assets and their usage prerequisite for assessing capabilities now and in the future Close cooperation between Subject Matter Experts and architects An architecture, not for the architect, but for the end user Lessons Learned
© Front End Strategy 2010 Thank you for listening! Presenters: Karl Hertz (Front End) – Tommy Nordqvist (Front End) – Per Erik Mårdberg
Human Views for MODAF Dr Anne Bruseberg Systems Engineering & Assessment Ltd, UK on behalf of the Human Factors Integration Defence Technology Centre (HFI.
© NATS Ltd June 2009 NATS Approach to Enterprise Architecture An Introductory Summary EA TRS Dissemination Workshop 8 th June 2009 presented by Dr John.
Systems Engineering for Systems of Systems Dr. Judith Dahmann The MITRE Corporation.
Marine SDI to facilitate Spatially Enabled Government and Society Marine SDI to facilitate Spatially Enabled Government and Society IHO-Workshop on Marine.
Requirements Elicitation and Use Case Diagrams Prof. Hany Ammar, CSEE Dept., WVU.
1 of 18 Evaluating an Information Project Getting Ready © FAO 2005 IMARK Investing in Information for Development Evaluating an Information Project Getting.
31 December 2013 CIPHER Study Stage An Enterprise Architecture Approach to Options Analysis in Large Acquisition Programmes.
Introduction to Design Rules in NATO NISP. Integrated EA conference London March
Joint Information Systems Committee Supporting Higher and Further Education Portals and the JISC Information Environment Strategy Chris Awre Programme.
Lecture 5: Requirements Engineering Dr Valentina Plekhanova University of Sunderland, UK
Chapter - 5 Understanding Requirements Unit II. Introduction Definition : “The broad spectrum of tasks and techniques that lead to an understanding of.
Security Research and Development Demonstration Programmes SECURITY RESEARCH in FP7 Securing Europe through knowledge and technology.
Chapter 7 Requirement Modeling : Flow, Behaviour, Patterns And WebApps Unit - II.
1 of 13 Organization and Management Information Management in Your Organization IMARK Investing in Information for Development Organization and Management.
What is the Value of Architecture Andrew L Macaulay Global Head of Architects Community March 2006 In collaboration with Microsoft Architect Insight Conference.
Whole Airspace Safety Case Meeting – Overview of Prior Work – 1 Whole Airspace Safety Case Meeting Overview of Prior Work Tim Kelly John McDermid Department.
Training Needs Analysis. Ambition in Action TAFE NSW: Doing business in the 21 st Century The TAFE NSW Workforce Development Guarantee.
Integrated EA Conference 2010 Slide No 1 Copyright © BAE Systems 2010 All rights reserved.
Benedict Tuffuor – TREND Regional LA, Ho – 24 th July, 2013.
Key Messages Learners need to know What skills are available When to use them Why they are appropriate for the task How to apply them to achieve.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 6 Slide 1 Chapter 6 Requirements Engineering Process.
Architecture Ignore at your own risk (DODAF 2.0 – Its the law for all future DOD programs) Dale Waldo Boeing Associate Technical Fellow - Systems Engineering.
Learning to Read What separate processes are involved in someone becoming a skilled reader?
Architecture-Based Drivers for System-of-Systems and Family-of- Systems Cost Estimating Gan Wang, Phil Wardle, Aaron Ankrum BAE Systems June 25, 2007.
Technical Module: Common ICT (Information, Communication & Technology) Common Services and Harmonized Business Practices ToT September 2010 unite.
Implications of the Common Core State Standards and Next Generation Assessments Sue Gendron, Policy Coordinator, SMARTER Balanced Assessment Consortium.
3rd meeting COTS team April 25, 2007, Helsinki. AGENDA 9.00Opening of meeting 9.05Approval of agenda, minutes, Goal setting 9.15Feedback on the specific.
IBM Rational Requirements Management Tools Achieving better control over your requirements.
Key Stage 3 National Strategy Standards and assessment: session 3.
Dr.Virendra Gawande & Sarika Gawande Information Technology Department, College of Applied Sciences, PO Box – 484, Postal Code – 411, Oman.
© 2016 SlidePlayer.com Inc. All rights reserved.