Date post: | 15-Dec-2015 |
Category: |
Documents |
Upload: | sharon-wittman |
View: | 218 times |
Download: | 5 times |
NetCentric Warfare:Technology Driven Agility
Dawn MeyerriecksPrincipal Director, Global Information Grid Enterprise Services
(703)[email protected]
Current Operations Support : A Sample Operational Thread
““Freedom is not synonymous with an easy life.... There are many difficult things about freedom: It does not give you safety, it creates moral dilemmas for you; it requires self-discipline; it imposes great responsibilities; but such is the nature of Man and in such consists
his glory and salvation.”
Margaret Thatcher
Sample Mission Thread:Battle Damage Assessment to Target
LegendArmyNavy
Air ForceJoint
Commercial
Camp DohaQatar
DISN
Sigonella
Ali Al Salem
Norfolk
GWY
Langley
PSAB
MacDill
USAF RemoteOPNS
European Spt Site
GWY
ClientAppSvr
CJTF Deployed
Client
Networks @ Multiple Security Levels
INTERNET
DataSvr
ClientAppSvr
ClientCommSvr
C2 Reachback
DoD Intranet
KG
KG
KG
KG
KG
KGDataSvr
ClientAppSvr
ClientCommSvr
Intel Reachback
Intel Network
Logistics Reachback
AppSvr
DataSvr
DataSvr
Sensors
Shooter
DoD Secret Network
ClientAppSvr
JTF Deployed
Client
Personnel Reachback
AppSvr
DataSvr
AppSvr
FW
Joint Worldwide Intelligence
Communication SystemJoint Intel Center
K-7 CP 2270 Fiber PP
OC3 Mux Fiber PP
SPACELINK
OC3 Mux
Pair Gain
Cooper PP
Cooper PP
Pair Gain
P800 10 MS
EchoCanceller
P Coder
Pair Gain
Pair Gain
PRC
K-7 SIPRNET Router
CP 2270K-19
NIPRNET Router
SL-100 (DSN)
CP 2270 EF 8650SCTE 5 MS
EF 8650SCTE 5 MS CX Patch KG-194 Patch P 800
RESPONSIBILITY USAF Tech Control Center
RESPONSIBILITY RESPONSIBILITY RESPONSIBILITY
SPACELINK Defense Information Systems Agency USN Tech Control Center
ATM
JWICS Enclave/
DIAC
JWICS Enclave
CX
CP2270
Joint Worldwide Intelligence
Communication System
JOINTJOINT
NAVYDISA
AIR FORCE
K-7
P800 10 MS
Communications Relay Path
JWICS SIPR
Single Supporting Data Source
Service/JTF
National
MLDBR
CoCom
JTT
JTT
JTTJTT JTTJTT
NIMA(St. Louis)
JTT
GCCS
CENTCOM
MLDBR
West CoastBGs/ARGs/MEUs
EUCOMSOUTHCOM
CENTRIX(Coalition)
PACOM(JICPAC)
GCCS/GCCS
GCCSGCCSGCCS
GCCSGCCS
STRATCOM
SOCOMGCCS
GCCS
ARCENT(CFLCC)
NAVCENT(CFMCC)
CENTAF
BATTLEGROUP
GCCS/TBMCS
GCCS/TBMCS
GCCS/GCCS(ASAS)
GCCS-M/GCCS-M
GCCS-M/GCCS-M
IOS/IOS
GCCSclients
JTF-SWA(CFACC)
MARCENTSOCCENT(CFSOCC)
JSOC
JCS DIA
INSCOM NSANRO (Field Site)
GCCS/GCCS
GCCS/GCCS
GCCS/GCCS
GCCS/GCCS
GCCS
NIMA
GCCS
Common Operational Picture –Common Operational Picture – Real-Time Video, Integrated Imagery
UNCLASSIFIED
Common Operational Picture –Common Operational Picture –
Theater Ballistic Missile, Integrated Intelligence
Operation Iraqi Freedom Successes
First- All-Service and SOF, Red, Blue, & Intel fused picture.
First- Large-scale use of secure satellite phones in a combat environment.
First- Extensive coalition automated information sharing exchange.
First- Desktop collaboration tools used for joint C2.
First- Widespread use of VTC as a C2 system.
First- Ubiquitous use of commercial SATCOM to supplement military SATCOM.
First- Extensive coordinated use of UAVs.
First- Real time in-transit/asset visibility.
Operation Iraqi FreedomCommunications Trends
May2003
Vo
ice
DR
SN
Vo
ice
DR
SN
DA
TA
NIP
R/S
IPR
DA
TA
NIP
R/S
IPR
Vo
ice
DS
NV
oic
e D
SN
FIB
ER
OP
TIC
FIB
ER
OP
TIC
SA
TC
OM
SA
TC
OM
Sec
ure
VT
C
Sec
ure
VT
C
138 X138 X10 X10 X
6 X6 X 39 X39 X 22 X22 X17 X17 X
5 X5 X
305305MbpsMbps
1919MbpsMbps
44MbpsMbps
44 confper day
3200Mbps
130Mbps
750Kmin/day
19K19Kmin/daymin/day
2.12.1MbpsMbps
10.5Mbps
555Mbps
2 conf.2 conf.per dayper day
176176per mo.per mo.
3100+per mo.
Sep2001
Lo
gis
tics
Qu
erie
s
Lo
gis
tics
Qu
erie
s
ODS/OIF Comparisons
ODS
OIF
Kn
ow
led
ge
Sp
eed
Pre
cisi
on
Let
hal
ity
(A
ir 2
Gn
d O
PS
)
3200 ISRSortie Hours
RESULTS
1700 ISRSortie Hours
3X Info½ of the Hours
Footprint
7 Mos Buildup
<3 Mos Buildup
Footprint# Ships
Msn Achieve tSpeed of Mnvr
10 % PGMs~ 30 SOF Teams
70 % PGMs~ 100 SOF Teams
PrecisionDecisions
Collat DamRQD Ord
10 % Integ Ops4 Acft/Tgt
90 % Integ Ops1 Acft/4 Tgt
EconomyOf Force
Heavy OrdRqmts
0
5
10
15
20
25
30
35
40
J F M A M J J A S O N D J0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
5500
Jan Fe b M ar Apr M ay Jun Jul Aug Se p Oct Nov De c Jan
0
50
100
150
200
250
300
350
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan
CAT 1 = Root or Admin level intrusionCAT 2 = User level intrusion
Global CND Event Metrics(Category 3 and 6)Source: JCD As of 01 February 04
Global CND Event Metrics(Category 1, 2, 4, 5, and 7)Source: JCD As of 01 February 04
Source: JCDAs of 01 February 04
Intrusion Trends(Category 1 and 2)
Detected “Events”(DOD Unclassified Network “NIPRNet”)
As of 01 February 04Source: JCD
Leading CNDSecurity Indicators
W32.Slammer
CAT 3 – Unsuccessful Attempted AccessCAT 6 – Unauthorized Probe
Cat 1 – Unauthorized AccessCat 2 – Unauthorized User AccessCat 4 – Denial of ServiceCat 5 – Poor Security PracticeCat 7 – Malicious Logic
Blaster and Welchia
2002
TOTALS
CAT 1 - 126
CAT 2 -188
2003
TOTALS CAT 1 - 152CAT 2 - 142
225 559 730 780
5,844
22,144 23,662
40,076
46,057 46,684
5,540
0
10,000
20,000
30,000
40,000
50,000
94 95 96 97 98 99 00 01 02 03 01/04
• Current Enterprise-Wide Infrastructure Approaches Are Aging• Good News: 27 Releases of Global Command and Control
Since 9/11• Bad News: Insufficiently Scalable, Flexible, Technologically
Dated
• Current Web Services, Enterprise Application Integration, Service-Oriented Architectures Hold Promise• Good News: Early Enterprise Efforts Indicate Certain Aspects
of Technology are Sufficiently Mature for Broad Application• Bad News: Lots of Maturation Still Required – Both for the
Federal Enterprise to Use and for the Commercial Technology Itself
Why We’re Here Today:The Challenge
The Future
“…possibly the single-most transforming thing in our forces will not be a weapons system, but a set of a set of
interconnectionsinterconnections and a substantially enhanced capability because of that awarenessawareness.”
-- Defense Secretary Rumsfeld
To Counter the Asymmetric Threat:Agile NetCentric Warfare
- Transform Federal Intranets into Service Oriented Architectures
- Publish all information as early and as widely as possible
- Empower Users to pull whatever they want whenever they want
- Distribute Product Management to specialized Communities but
- Clearly identify Information Producers to the Enterprise
- Exploit Market Mechanisms
Visibility Supply & Demand
Agility ROI Metrics
“Boundaryless Information Flow”
Scale: Several Million Users; Tens of Thousands of Information Services
Keys to Agility
1st - Comprehensive, accurate, shared Situation Awareness to enable self-synchronization
2nd - Mobility and “Composability” to rapidly reconfigure forces and supporting information capabilities
3rd - Service Oriented Architecture (SOA)• Modular, loosely coupled Rapidly reconfigurable• Ubiquitous user access Collaboration
Result: Dramatically accelerated organizational learning* cycle!
*Responders (Users) exhibit rapid behavior change in combat (continuous experimentation)
The New Assumptions
• Industrial Age (System-centric)• Clear lines of authority• Limited Scope (Finite system boundaries and user population)• Known, relatively static requirements• Predictable future (stable Business environment and standard processes)• Deduce designs from high level abstractions and test effectiveness with small-scale
experimentation
• Information Age (Net-centric)• Boundless information space with no single controlling authority• Highly dynamic requirements w/ many unknowns• Marginally predictable near term future• Many users engaging in unpredictable ways at unpredictable intervals• Highly, Dynamically Interconnected
Designs must:1. Derive from massive simulations and ongoing real world observations 2. Be agile before and after fielding in response to new conditions
The New Imperatives
How to Improve Design of large, complex Net-centric capabilities?
How to Lower Risks inherent in designing and deploying large, complex Net-centric capabilities?
Shape evolution of Enterprise ITVice
Build systems
Net-centric Characteristics
• Heterogeneous• Variety is essential and inevitable – basis for healthy
evolutionary growth and survival within dynamic threat environment
• Parallel• Multiple implementation and concurrent use of components and
processes – increases speed and provides fail-over capability• Market-driven
• Emphasizes Market principles vice top down direction to optimize – “Survival of the fit“ (v. selection of the fittest from a single perspective)
• Developers “experiment early and often” to find the right niche• Agile and adaptable
• Capable of rapid reconfiguration to meet new and unanticipated requirements or circumvent disruption
• Expedient task-oriented collaborations vice static bureaucracy
The Solution:A Layered Architecture for DoD’s Future
Transformational CommunicationsEnterprise/Service/Agency Supplied
CES Operating EnvironmentEnterprise/Service/Agency Supplied
CES Information ServicesEnterprise/Service/Agency Supplied
COI Capability(e.g. NMCI)
COI Capability(e.g. DJC2)
Standards-Based Service Definitions: - Network Address(es) - Payload Information (Data & Service) - Descriptor Attributes (e.g. Service Quality, Security, Version #)
1
2
3
1
2
3
Comms:IPv4 -> IPv6
Applications, Storage, ESM, IA, User Assistance: Posix, Linux (Platform APIs)… -> Open Grid Services
Directory, Discovery, Mediation, Messaging, Collaboration (Video, Audio, Data): APIs….-> Web Services
Stan
dard
s Matu
rity
(examples)
FY04 FY 05 FY 06 FY07 FY08 FY09
Optical IP Networking for Joint OperationsCenters and ISR locations
Optical Bandwidth to Teleport
Optical Bandwidth to Ground Sites
Reachback Capabilitiesfor Deployed Forces
Power ToThe Edge
Global Net-centricSurveillance and
Targeting
Automated Tagging of
Selected Sensor and Combat
Support Data
Improved Strategic & Tactical C2
Improved Shared Access to Collateral ISR data
Deploymentof Collaborative
Applicationsto Joint
Commanders
Optical Bandwidth Support for Additional Global Hawk UAVs
Wideband Networkingfor UAVs and Other ISR
CollaborativeCollection
Management
CY 10
FY 10Multi-INTFusion forWarfighters
Improved Shared Access to Combat Support
Data Net-Centric Enterprise Services ForceNetForceNet
Net-Centric GCSS Net-Centric GCSS
ISR Battle ManagementISR Battle Management
JC2, DJC2,SJFHQJC2, DJC2,SJFHQ
Optical Mesh IP NetworkOptical Mesh IP Network
Integrated GIG NetworkIntegrated GIG NetworkProvides ubiquitous, secure, robust
optical IP foundation network
GIG Bandwidth Expansion
TCA SATCOMIncorporates mobile/tactical users and
global intelligence via optical cross links and EHF IP links
Future Combat System(FCS)Future Combat System(FCS)
IPV6
DISA Contributors to Key Net-Centric InitiativesDISA Contributors to Key Net-Centric Initiatives
Net-Centric Enterprise ServicesProvides information and data
services to all GIG users
Information AssuranceEnables trusted computer, networking,
and data services to all GIG users
TSAT (CY10 Launch)TSAT (CY10 Launch)
Application/Data DiversityMeans/tools to enable the smart pull
and fusion of data by users
Defense in DepthDefense in Depth
Wideband GapfillerWideband Gapfiller
- Enterprise Systems Management - Messaging - Discovery - Mediation - Collaboration- User Assist - IA/Security - Storage Services - Application
Block 1 (All CESs) in 3 Spirals Block 2 (All CESs) in 3 Spirals
EnterpriseSensor Grid
Automated IAVA Mgmt CBIS IOC
IOC FOC
1 2 3 4
Core Enterprise Services (9) + Application Program InterfacesCore Enterprise Services (9) + Application Program Interfaces
CR
EA
TE
WO
RL
D-W
IDE
C
OM
PU
TA
TIO
NA
L G
RID
DE
PL
OY
TR
US
TE
D
SE
RV
ICE
S
Identity Mgmt Infrastructure (PKI, Biometrics); Network Defense (Enterprise Sensor Grid)
IMP
RO
VE
S
EN
SE
MA
KIN
G
Op-Intel -CS -CS Data Fusion Fusion Applications Net-Centric ProcessesOp-Intel -CS -CS Data Fusion Fusion Applications Net-Centric Processes
CAC FOC
Seamlessly bridge sustaining base and deployed users via EHF IP links
Next Gen TeleportTactical IP GatewayTactical IP Gateway
Generation II Generation III
IP IOC
Networks
(Proposed) Objective DISN Services:• SLA-based (Converged) Voice, Video, Data Services
End-to-End QosDynamic Provisioning, Self-Healing, Self-
Configuring (e.g. Mesh Networks)Cacheing, Content Delivery, MultiCast,“Bandwidth on Demand”Effective, Efficient Acquisition & Management
L-BandL
EHF(Adv EHF)
EHF
SHF
KaKa
UHF setAdvanced UHFUHF
CSCIC-Band
Ku-Band
SHF
X
C
Ku
Terrestrial
X
TELEPORT
E-STEP
STEP
Standardized Interface:
modem conversions
crypto
switching
DISNServices
L-BandLL
EHF(Adv EHF)
EHFEHF
SHF
KaKa
UHF setAdvanced UHFUHF
CSCIC-Band
Ku-Band
SHF
X
C
KuKu
TerrestrialTerrestrial
XX
TELEPORT
E-STEP
STEP
Standardized Interface:
modem conversions
crypto
switching
DISNServices
GIG-BE
Optical SwitchingUp to N x OC-192
&IncreasedBandwidth
PhysicalDiversity
Ubiquitous, Secure, Robust, Optical IP Terrestrial NetworkUbiquitous, Secure, Robust, Optical IP Terrestrial NetworkFOC Sep 05FOC Sep 05
Ubiquitous, Secure, Robust, Optical IP Terrestrial NetworkUbiquitous, Secure, Robust, Optical IP Terrestrial NetworkFOC Sep 05FOC Sep 05
100 Locations Worldwide
Teleport
99 01 03 05 07 09 11 13
GBS (Hosted on UFO)
UFO
(Capacity & Broadcast)
SHF/ Ka FutureHigh Cap &Broadcast System
Advanced UHF (Mobile User Services)
ADVANCEDEHF
(Protected/Survivable)
MILSTAR (MDR - 02+)
DSCS-SLEPDSCS
Gapfiller WB (Mil Ka)
COMMERCIAL (C and Ku and L)Wideband
Protected
Narrowband
SMART-T (EHF)Tactical
TerminalsSCAMP (EHF)
Army Wideband Tactical
NESP Follow-On (EHF)
LMST
Teleport
STEPX
Pathfinder
GEN IC/KuUHF
GEN II
Ka EHF L HFIP
GEN IIIAdv EHF Future Wideband
GMT
Transformational Communications System
A i r b o r n e L CT e r m i n a l s
N e t w o r k S t a n d a r d sA n d I n t e r f a c e s
L a s e r c o mC r o s s l i n k s
M u l t i - a c c e s sL a s e r c o m
H i g h R a t e T e r r e s t r i a l N e t w o r k sa n d G r o u n d I n f r a s t r u c t u r e
B a s e l i n e : X G b p s ( T R L - 4 - 5 )T R L 6 D a t e : F Y 0 6B a c k u p : U s e 1 0 G b p s c l a s s
B a s e l i n e : 6 - 8 A c c e s s e s ( T R L - 2 - 3 )T R L 6 D a t e : F Y 0 7B a c k u p : U s e S A L C
D y n a m i c B W
B a s e l i n e : 1 2 d B m a r g i n r e u s e d ( T R L 4 - 5 )T R L 6 D a t e : F Y 0 6B a c k u p : F i x e d m a r g i n s / d a t a r a t e s
N e t w o r k S t a n d a r d sA n d I n t e r f a c e s
B a s e l i n e : X D R + ( T R L 4 - 5 )T R L 6 D a t e : F Y 0 6B a c k u p : A E H F X D R R a t e s
C O T M 1 ’ T r a c k i n gA n t e n n a
I n f o r m a t i o n A s s u r a n c e( C o v e r a l l S e g m e n t s )
B a s e l i n e : 1 0 0 M b p s f o r G r o u n d ( T R L 3 - 4 )8 M b p s f o r S p a c e ( T R L 4 )
T R L 6 D a t e : F Y 0 6B a c k u p : U s e l o w e r r a t e H A I P E a n d a g g r e g a t e
C O T M N u l l i n gA n t e n n a
B a s e l i n e : 8 0 ” N u l l e r ( T R L 4 - 5 )T R L 6 D a t e : F Y 0 5B a c k u p : 5 0 ” A E H F N u l l e r
K e yT C M C o m p o n e n t s
O t h e r C o m p o n e n t s
Hosting
(Proposed) Objective Computing Services:• SLA-based MIPS and Bytes
Capacity on Demand (e.g. Grid & Autonomic Computing)
Dynamic Storage ProvisioningReliable Data Distribution and
ReplicationEffective, Efficient Acquisition &
Management
Gridded Services Environment:Computing on Demand
Factory
Factory
…
Service Service Service…RegistryService
Handle2SvcMapper
Factory
Factory…
Service Service Service…RegistryService
Handle2SvcMapper
Simple HostingEnvironment
Virtual HostingEnvironment
FF
S S S
RM
FF
S S S
RM
Internet
DISA FirewallDISA Firewall
Application Switch
Content
Managers
Security Client
Servlet Engine
HTTP Server
Web Server(s)
Layer 3 filtered protocolsWith Web Servers
Application Server(s)Database Server(s)
DIS
A F
irew
all
DIS
A F
irew
all
NIPRNET Application Switch
DMZ
The Department’s DMZ
–Response to Code Red–Solution worked through Dell–60 applications now in DMZs
Infrastructure
CertSvr Dir
Svr
PortalSvr
(Proposed) Objective Enterprise Services:• Building Blocks for Secure Integration of
Applications and Data SourcesIdentification & AuthenticationDirectoryMessaging & TransactionsInformation Management (Discovery,
Access, Dissemination)CollaborationEnterprise Management
COE => NCES: A Paradigm Shift
cross-platform
APIs
COE perspective:plug ‘n play of common applications on a set of
common support services
operating system
COE Infrastructure svcs
commonsupport
apps
missionapps
DBs,comms
NCES perspective:access to information and services
if & when required(via web or download/install)
Service #1Service #2 Service #3 Service #4
Service #n
o.s. o.s. o.s. o.s.
backup
CASCADEDREGIONALSERVERS
commondisplays
The COE was all aboutSOFTWARE PORTABILITY
and REUSE
The COE was all aboutSOFTWARE PORTABILITY
and REUSE
The NCES core enterprise services are abouteasily connecting to net-centric services
The NCES core enterprise services are abouteasily connecting to net-centric services
GIG Enterprise ServicesSupport real-time & near-real-time warrior needs, and business usersSupport real-time & near-real-time warrior needs, and business users
DoD (Title 10) IC (Title 50)
UsersUsers
Business Domains Warfighter Domains
Force Application
COI’s
Protection
Command & Control
Strategic Planning & Budget
Logistics
Domain/ COI
Capabilities
ICOrg Spaces
National Intelligence Domain
Core Enterprise Services (CES)
Transformational Communications (TC) & Computing Infrastructure
Accounting & Finance
ApplicationUser
AssistantStorage Messaging
ICSIS Community Space
Acquisition
Installation & Environment
COI’s
COI’s
COI’s
Focused Logistics
Human Resource Management
Battlespace Awareness
IA/Security
IA/Security
ESM
IA/Security
ESM
IA/Security
ESMDiscovery
IA/Security
ESM
Collaboration
IA/Security
ESMEnterprise
Service Management
(ESM)
Mediation
IA/Security
ESM
IA/Security
ESM
Technical Infrastructure
Domain
ESM
IA/Security
Cross Domain COI’s
(e.g. M&S)
Levels of Services
Above Core Level
Expedient COI’s
CertSvr Dir
Svr
PortalSvr
Applications…C2 and BackOffice
(Proposed) Objective Applications & Data Sources
• Community of Interest Functionality• Secure, Interoperable Plug-n-Play Data
Sources and Applications
From Systems to ServicesDomainservices
Track
Readiness
Discovery
Fusion
Persistence
Targeting
Enterpriseservices
Capability
ServiceKey:
(Notional)
Today: Systems withTargeting Applications
GCCS
ABCS
GCCS-M
TBMCS
Capability discovers and uses common services
Distribution
The Results
Albert Einstein
““We can’t solve problems by using the same thinking we used We can’t solve problems by using the same thinking we used when we created them”when we created them”
Apps & Infrastructure with Redundancy (Target Bundle)ASSESS FINDENGAGE TARGET TRACKFIX PLAN
Distributed Services Capabilities
Intra-nodalIntra-nodal
Inte
r-no
dal
Inte
r-no
dal
PlatformsWeaponsSensors C2 Networks/Nodes
CG/DDG
PATRIOT
F/A-18
P-3C
E-2C
JSTARS
PREDATOR
GHAWK
LHD
JLENS
SM2
PAC-3
AMRAAM
SLAM-ER
HELLFIRE
C2
C2
C2
C2
C2
C2
C2
C2
EOI/IR
AN/SPY1
RADAR
AESA
APS-137
AN/APS145
SAR
SAR, EO/IR
RADAR
Integration Pattern Emergence
As-is: Stovepipe PatternsAs-is: Stovepipe PatternsAs-is: Stovepipe PatternsAs-is: Stovepipe PatternsTo-Be: Improved IntegrationTo-Be: Improved IntegrationTo-Be: Improved IntegrationTo-Be: Improved Integration
Illustrative Results
• 40% more TAMD kills
• 50% reduction in number of leakers
• 100% increase in engagement envelope
• Up to ten-fold increase in overland percent area protected
Increased combat reach in selected scenarios:
Most significant benefits realized when ALL combat reach capabilities implemented
Implications of NetCentricity5 Years 10 Years
Technical First emergence of component-based capabilities in place with plug-n-play
Dynamically composeable mission critical threads
Fixed compute platforms & host runtimes; dynamic work flow for mostly non-mission-critical business processes
Grid Computing; dynamic capacity allocation causes server platforms to disappear into "grid"; dynamic work flow for all DoD business processes
B/W & compute capacity high @ operational, strategic levels of war; challenge remains at tactical
Capacity no issue
MLS an issue MLS enabled by gridComplexity increases while tech stabilizes & commoditizes
Abstraction & hiding reduce complexity via layered services approach
Social Tactical user remains "have not" Hierarchy collapses in terms of IT capacity & capabilityDifferentiators viewed as important at infrastructure service levels; some "hot" channel providers (data and applications)
Differentiators based solely on content and quality of data and applications
DoD providers maintain shared infrastructure Intellectual Property (IP) as a differentiator
DoD providers maintain military-unique IP as differentiator
Budget $ allocated along "stove pipe" system lines, although more joint capabilities
Dynamic allocation of $ Based on PEO/PM performance and associated expertise & experience
Business threads identified to drive transformation but still funded & executed via legacy budget constructs
System thinking morphs to business processes - NOT service stovepipes
Service-based fees applied & well understood/accepted at network level only; fierce in-fighting to maintain separate & distinct infrastructure services
Service-based fees all encompassing; religion from discussion has disappeared as little division remains about how service "dial tone" is rendered
Training More joint but still service-centric & hierarchical Increased specialization based on mission skills and needs vice serviceTesting Capability-based, but preponderance of system-
centric thinking & approachesTrue plug-n-play
Exhaustive failure-based testing Characterization of where components WILL NOT fit vice exhaustive list & test of where it will
Assumes faulty design process Assumes robust design process that includes characterization of failure modes and overt application of risk management techniques during development