Presentation is loading. Please wait.

Presentation is loading. Please wait.

Public/Private Partnership for Netcentric Engineering.ORG (o) 703 262 5332 (m) 831 224 5182 Presentation.

Similar presentations


Presentation on theme: "Public/Private Partnership for Netcentric Engineering.ORG (o) 703 262 5332 (m) 831 224 5182 Presentation."— Presentation transcript:

1 Public/Private Partnership for Netcentric Engineering.ORG Chris.Gunderson@W2COG.org (o) 703 262 5332 (m) 831 224 5182 www.w2cog.org www.giglite.org Presentation to the Service Oriented Architecture for E- Government Conference, May 1-2, 2007

2

3 MYTH: Military Netcentric Operations is fundamentally different from commercial E- business REALITY: The world is flat! (Tom Friedman NY Times)…. QUESTION: Is Google good enough? …(Lt Gen) Croom (Defense Information Systems Agency Director) said (military systems) should provide military information as easily as Travelocity …Croom invokes commercial success stories..e.g. Google and Yahoo...said DISA would opt for a commercial approach* * FCW 7/11/05

4 Netcentric (i.e., e-Gov) Biz Model: Flatten & Partner Acquisition Community needs –To efficiently survey possible solutions. –To track operational community market trends –Use-based contract incentives –Test drives of live or downloadable use-case demos –To pool resources for similar requirements –Means to propagate investments in intellectual property Pointy End Operational Communities need –To communicate via use-cases –To Eliminate buffer between them and developers –To collaborate on domain specific standards and schemas –To integrate solutions through continuous low cost experimentation –Hosting and inter-enterprise facilitation services Developer Communities need –To leverage and improve others solutions –To collaborate on technology standards and their uses. –Government certification to accelerate adoption and mitigate commercial risk

5 CJCSI 6212.01D 8 Mar 06: Net- Ready-KPP (NR-KPP)/ NR-KPP Cert : (Develop) …Verifiable performance measures …to assess information needs… DISA Joint Interoperability Test Command (JITC) directed to enforce the NR-KPP … NR-KPP Challenge & Opportunity But HOW???

6 Net-Ready Key Performance Parameter (NR-KPP)..… not a show stopper or rubber stamp … H&R Block not the IRS! * NETCENTRIC VALUE ADDED! (Acquisition & OPS!) Data Strategy SOA Infrastructure Information Assurance Dynamic Multi-Level Privacy Streamlined Supply Chain Better Decisions Faster = NR-KPP = + Reward vs. Risk Measurable Useful * Tighter OODA Loop Increased interaction among coalition Decreased inventory at rest Faster speed to market Shortened training pipeline Improved test scores Fewer casualties Decreased maintenance down time Etc … Risk/Reward Measurable Useful Reusable

7 Government Intellectual Property to industry Industry risk reduced through certification Low overhead fee-for- service SOA e-Biz value proposition (VIRT + VOTS) Leverages existing capabilities Process change not major investment NetCert.Gov: Embed Distributed Adaptive Collaborative V&V in Computer Network Development Process via End-to-End Distributed Government/Industry Software Test Range FDCE CANES IDE DCGS DDTE Etc

8 NR-KPP Checklist IA => Share & Protect Enable sharing across domains Preserve privacy Protect network SOA => Reuse & Mash Up Accelerate delivery of netcentric capability Enable netcentric interoperability Decrease infrastructure cost Compose C4 capability on-the-fly Data Strategy => Discover in Context Broker information discovery Create information value chain feedback loop Do no harm Software Assurance vulnerability OK? Bind to accredited GIG IA services? Register dynamic discretionary access policy? Latencies OK? Reliability OK? Generate digital diagnostic architectural artifact. Re-useable/Composable (i.e. Bind to T-SOAF) Discoverable? Self describing? Open standard interfaces? Cross program investment? Net-enabling IPR model? Generate digital diagnostic architectural artifact. Demonstrate Increased Value/Bit Exchanged COI approved mission thread? Meta data registered in context? Increased automation? Mission based MOE OK (i.e., compress time line, and/or improve mission outcome)? * Generate digital diagnostic architectural artifact Net-Ready Parameters and Business Objectives Measurable & Testable Parameters * Confirm with operational evaluation

9 Open Architecture Open standards, e.g., (JBI) Enterprise Service Bus IAW GIG IA Roadmap Emphasis on semantic IOP Team with industry consortia ESB Trusted Discovery IA Services on High Assurance Platform

10 Resources Trusted Sharing Services: Authentication, Authorization, Audit, MLS, CND Discovery M2M Messaging Mediation ESM GIS Test Services & Toolkits Enterprise Service Bus Resources Radio WAN A Terrestrial WAN B Radio WAN C Resources NCES legacy NCES On Ramp DGInet NR-KPP compliant COI capability module Other legacy High Assurance Platform (HAP) Trusted Operating System On Ramp Radio PAN Ethernet LAN ashore Ethernet LAN afloat On Ramp Resources: Applications Data, Hosting, Utilities, Help desk, etc COI Services High Assurance Platform (HAP) Trusted Operating System High Assurance Platform (HAP) Trusted Operating System NR-KPP tested capability module

11 W2COG InstituteW2COG Institute: Enabling Trusted Transactions of Valuable Information at the Right Time An international, collaborative association of networking technology and operational experts A brokering service that efficiently puts expert providers in touch with customers An open GIGlite.org on-line environment for rapid prototyping ventures among self-selecting industry, government, and academic experts and dynamic repository of net-ready capability bundlesopen GIGlite.org

12 GIGlite.org… a disruptive approach To provide an infrastructure for collaboration and communication among government, academia, and industry to rapidly develop and propagate re-usable and continuously improving tools that facilitate trusted transactions of valuable information at the right time, i.e. bundles of netcentric capability. Govt, industry, & academic members Title 10 compliant, Non- FAR < ~90 day S&T & engineering spirals Open source/Open Standards IPR model Rolodex of experts Distributed major SOA test range Single POC for Govt labs and sponsors Distributed, Adaptive, Collaborative, SOA V&V and certification Convenient process for reuse of off-the-shelf components GIGLite.orgNetCert.gov Best Netcentric SOA Practice Net-Ready Certification $ & IP e-Portal for Govt certified off-the-shelf bundles of netcentric capability

13 Processes (E-biz rapid discovery cycles) GIGlite.Org open source/open standards community sandbox Colors and texture of the horizontal network grow incrementally richer through collective investment.... …Tax paying citizens of the network prosper through information value chain management Domain Context (Semantics) Network Performance (Protocols, Meters & Switches) Trusted transactions (Privacy) Dynamic Context (Space & Time) Military Domain-specific verticals include ecosystem of developers, operators, & testers Financial Industry Airline Industry Medical Disaster Response 1 st Adapt existing GOTS 2 nd Buy COTS solutions 3 rd Create adaptable solution as last resort ~90 day pilots target measurable increments of value added and deliver net-ready consumable tools and methods per ABC* model * NetCert.Gov adaptive collaborative mission- thread based V&V via pre- deployment M&S and post- deployment operational audit of VIRT-based SLAs Net Ready KPP (NR-KPP) : IA = Trusted Sharing SOA = VOTS Data strategy = VIRT Netcentric Productivity = SLAs

14 Public/private partnership designed to accelerate a net-ready market for products and services that facilitate trusted transactions of valuable information at the right time: A Dot org facilitates rapid non-FAR information processing discovery cycles via open IPR model and self selecting industry-academic-government project teams A light weight Dot gov administration office manages a distributed major software test range that brokers adaptive, distributed, net-ready V&V, and facilitates transfer of funds, artifacts, and intellectual property across government community of sponsors, operators, and labs Standing non-FAR legal vehicle between.org and.mil streamlines non-proprietary, capability- based, T&E & discovery process for all participants On-line GIG-lite.ORG serves as dynamic run-time repository of requirements, capabilities, best practices/practitioners, and lessons learned JCIDS/ACQ documents (e.g. JCD, ISP, CDD,CPD, NR-KPP) become living parallel & iterative on-line digital artifacts that continuously capture and propagate new requirements, discoveries, policies, and best practices Bundles of off-the-shelf DOTMLTF capability, are certified as net-ready, visible, consumable and continuously deployed via commercial e-Portal Acquisition lite for GIG Information Processing Components

15 Net-Ready e-Portal Consumable COTS & GOTS bundles certified to deliver netcentric increments of Valuable Information at the Right Time (VIRT) via trusted information transactions, i.e. Value Off the Shelf (VOTS) NR-KPP based Consumer Report format that compares bundles of similar net-enabling products and services Commercial e-Market offering certified bundles of net-enabling products and services Innovators dating service to broker customers and providers of net-enabling products and services GIGLite.org On-line SOA subversion-based DEVNET Secure multi-level access Dynamic Library: Netcentric RQMTS Mission Threads Mission Level Models VOTS S/W offerings GIG To-Be Acquisition Vision

16 Join US www.GIGlite.org –Trustworthy ESB – CANES RFI Response – DDTE Testing-as-a-Service Workshop Norfolk 14 June Practical Guide to Federal SOA –http://colab.cim3.net PgfSOA InfraStructure/DraftOnehttp://colab.cim3.net

17 BACKUP

18 Approach Use ABC* approach to build SOA Baseline = GIGLite.org Spiral 0 Test IA, SOA, and data strategy re: –1. Do no (unacceptable) harm –2. Bind to the SOA Foundation: Discoverable Self describing Open interfaces –3. Demonstrate netcentric value added Leverage.org to minimize bureaucracy and overhead = provide valuable service to developer and customer *ABC = Adapt existing capability or Buy COTS before Creating specialized capabilty

19 DataSecurity UserInterface DataObjects Services – Web & SOA Workflow/Process Access/Roles/Privacy Data Asset Preservation TechnicalRequirement InformationStreams Cross-domain Information Exchange Framework (CIEF) Elements of Interest

20 DataSecurity UserInterface DataObjects Services – Web & SOA Workflow/Process Access/Roles/Privacy Data Asset Preservation TechnicalRequirement InformationStreams Objective: Value/Bit Objective: Re-usable Objective: Intuitive Objective: Protect Objective: Discover in context Objective: Share Objective: Mash up Objective: Streamline Objective: Useful Persistence/redundancy CIEF Objective is Trusted Transactions of Valuable Information at the Right Time Across Domains

21 GIGlite.org Logical Stack Identity/Privacy Utilities & Services: Objective is Trusted Transactions Publish/Subscribe Utilities & Services: Objective is Seamless Delivery of Value in Context Business Process Utilities & Services. Objective is Continuous Improvement Computer Network Defense and Software Assurance Utilities & Services: Objective is Protection of Assets

22 –Security Trusted Authorization Broker (TAB) Trusted Authorization Policy Engine (TAPE) CAC V-LDAP Cyber Operation Information System –Discovery 3DV Open Source registry DGInet geospatial services M2mi xxx –Messaging M2MI xxx JBI Middleware –Mediation NCES on ramp Commercially viable JBI Enterprise Service Bus SOA tool kits (e.g. Jumpstart, C/JMTK) –ESM SPAWAR Cross-domain Information Exchange Framework via GIGLite Collabnet Portal –NR-KPP Test Services M&S web suite Web SOA test bench Center fro Assured Software (CAS) evaluation NCES On Ramp –The DISA Appliance bundles the NCES Services into a single deployment component that is accessible via NCES on ramp toolkit to deliver NCES capabilities to ESBs. S2OAF Technology Stack = NCES legacy + Best of Breed GOTs + OTD + Managed Services via ESB

23 JBI Enterprise Service Bus High Assurance Platform (HAP) System Assurance OS layer (COIS?) TAB TAPE Trusted Service Engine (TSE) Network A Network B Network C Resources CAC Trusted: Discovery Messaging Mediation ESM NCES legacy NCES On Ramp To Be NR-KPP compliant application Service DGInet Jumpstart Toolkit C/JMTK M2MI VIRT engine 3DVE Registry To be NCES Foundation Service V-LDAP Other JBI ESB Middle Ware NR-KPP compliant COI capability module = Later spiral enterprise service = S2OAF spiral 0 Other legacy Test Services NR-KPP tested capability module = NCES enabled application or utility Operating System On Ramp

24 DataSecurity UserInterface DataObjects Services – Web & SOA Workflow/Process Access/Roles/Privacy Data Asset Preservation TechnicalRequirement InformationStreams Objective: Value/Bit MOE = OODA loop compression; Data at rest within OODA loop; Mission performance metrics, e.g. probability of kill, casualty rate, etc. Objective: Re- usable MOE = Technology registered; IP license available; Open standards interfaces Objective: Intuitive MOE = Time required to achieve proficiency Objective: Protect MOE = Degree of vulnerability Introduced Objective: Discover in context MOE = Meta-data registered w/rt content, context, & administration Objective: Share MOE = Rules for dynamic data access control defined, enforced, and audited Objective: Mash up MOE = discoverable, self- described & commercial standard open interface Objective: Streamline MOE = speed of execution Objective: Useful persistence & redundancy MOE = Life cycle maintenance and sunset criteria defined Adaptive Collaborative Validation & Verification Measures of Effectiveness (MOE) RISK REWARD

25 DataSecurity UserInterface DataObjects Services – Web & SOA Workflow/Process Access/Roles/Privacy Data Asset Preservation TechnicalRequirement InformationStreams Adaptive Collaborative Validation & Verification Discoverable by CND, s/w assurance, ID, and pub/sub services? Discovers CND, s/w assurance, ID, and pub/sub services? Use case, MOEs, and SLAs defined? Acceptable latencies? Acceptable speed to capability? Discretionary access rules registered? Binds to ID services? Meta-data registered w/rt content, context, and admin? Basic IA compliance? Binds to IA services? CND & s/w vulnerability assessment OK? Technology registered? Technology reuses capability? Technology is easily licensed? Technology employs open standards? Mission simulation verifies value added per MOEs and service level targets? Operator training time OK? Operator proficiency score OK? Technology refresh model OK? Candidate Enterprise Capability Module (ECM)

26 JBI Enterprise Service Bus High Assurance Platform (HAP) System Assurance OS layer (COIS?) TAB TAPE Trusted Service Engine (TSE) Network A Network B Network C Resources CAC Trusted: Discovery Messaging Mediation ESM NCES legacy NCES On Ramp To Be NR-KPP compliant application Service DGInet Jumpstart Toolkit C/JMTK M2MI VIRT engine 3DVE Registry To be NCES Foundation Service V-LDAP Other JBI ESB Middle Ware PatrolNET = Later spiral enterprise service = S2OAF spiral 0 Other legacy Test Services NR-KPP tested capability module = NCES enabled application or utility Operating System On Ramp 18 Month Pilot Series: Global Strike + TST COI NSA Identity Services C&A NCES, NECC, CANES programs Deliverables every Quarter Flag Day Trident Warrior 08


Download ppt "Public/Private Partnership for Netcentric Engineering.ORG (o) 703 262 5332 (m) 831 224 5182 Presentation."

Similar presentations


Ads by Google