Show Me the Money — Time to Rethink This DOD Cloud-Broker

Remember that note from the DoD CIO that designated DISA as the priority choice for defense agencies seeking cloud services? Well, it may not be so any more.  For all the bureaucratic hangers-on, don’t kid yourself — this is really significant. Right now, every defense IT contractor is rubbing their hands and licking their chops.

DoD rescinds DISA Cloud-Broker

For years industry has shared, mostly at the bar and in side conversations at every IT conference, that they can do the job cheaper, faster, and more effectively than DISA.  But in public, no one wants to step up against the powerful establishment that can easily shut a business out of their business.  You have to be on the list to work with them and getting on the list means having someone vouch you in the door — essentially to get the job you have to already be doing the job with them.

This is not to downplay the good work that DISA performs for the DoD in working with an infrastructure that is struggling to rebuild itself while traveling inflight at warp speed. They have a huge challenge.  The problem is that too often the focus of the organization is on the infrastructure itself, rather than on the results that the rest of DoD wants and needs.

Combatant commanders, organizational leaders, and senior decision makers increasingly want to know how they can use all the data potentially available to them to improve their mission or business. That requires data discovery and advanced analytics in real-time ways at their fingertips wherever they are in the world.  They don’t care about the infrastructure itself — if fact, it should be transparent to them because that is what they’re used to with the rest of the world in the cloud.  DISA is an extraordinarily competent and technical agency, but when the bureaucracy can’t address the business and mission of their users, they fall back into discussions about the technologies and technical yada yada.

Industry and the information technology business has to go to school (and stay in class) in a quick study way to give their users and customers what they want — otherwise they’ll lose the business. High school kids don’t buy SmartPhones because of the infrastructure, they just want to connect to the world now and do it in ways that grandma or the CEO next door never imagined.

If DISA wants to offer cloud services, they need to talk less (read: nada) about the infrastructure and focus on how to directly provide services that improve their users’ missions. It’s great to claim victory on enterprise e-mail, but that is just one aspect of  the cloud and industry will continue to challenge that arena.  In the meantime, they may be missing the real opportunity to provide data discovery and analytics as a service, allowing the Services and Defense Agencies to really use their (and the rest of the world’s) data to improve the mission and see some return against their IT investment

Posted in Analytics as a Service, DISA, Enterprise Analytics, Mission/Business Improvement | Tagged , , , | Leave a comment

DOE’s KBase Moves Big Data in the Right Direction

While Defense and other federal agencies are trying to figure out how to leverage big data, some of the folks at DOE are moving out. The  Department of Energy’s KBase team has set up a way for non-IT folks to analyze lots of information across their wide spectrum of research/lines of business without having to have the data coder chops that is normally par for the course.

KBase is a narrative interface that allows DOE scientists to perform analysis through a pre-coded format, giving mere mortals a way to interpret and filter data outputs and moving toward a new standard in working with lots and lots of scientific output that is not necessarily in rows and columns of traditional databases. The real kick is that researchers can more easily share their results, datasets, and thought process in an interactive, evolving narrative.

The interface leverages some social tools — Facebook for social interaction between team members, Amazon for data and tool sharing, and Google Docs for project collaboration, all with the intent to help-me-help-you evolve your success.

Their primary success to date is around bioenergy — the KBase team highlighted on their website has much background in biology, genetic research, and microbial science — but it is easy to understand the much larger opportunity to share across any kind of scientific research.

This is good stuff and a major reach in the right direction! The “big data” community needs to leverage this kind of process in many endeavors, not simply for scientific research where it is obviously a good fit, but in any area of business, service, government, or data discovery/advanced analytics where the “non-IT” real users are trying to figure out how to use all the data potentially available to improve their mission or business.

CIOs and CTOs take note — this is a great example of what IT should be about!  It enables users across the enterprise to use data, information, and technology to do their job better and figuring out how to leverage commercial and social tools in the process.

Posted in Big Data, Enterprise Analytics, Information Sharing, Mission/Business Improvement, Technology | Tagged , , , | Leave a comment

Analytics as a Service – DISA May Be Missing a Business Opportunity

I have great respect for Dave Bennett and the task he faces as DISA CIO. He is on track in pushing for enterprise solutions that leverage COTS solutions without driving modifications that make them no-longer COTS.

Focusing on addressing ways to change business process to leverage available solutions is a big cultural shift and is likely to face some resistance from many system integrators whose business is based on butts-in-a-seat to tailor those solutions to existing in-house business functions. However, there is a business opportunity that DISA is still missing, which is a step beyond Infrastructure, SW, and Platform as a service.

The purpose of information technology is to improve the mission or business. Improving the business generally involves making decisions and that almost always involves data discovery and advanced analytics.  There is a business case to be made for DISA offering Analytics as a Service, allowing its defense user-base to pay for the end-game analysis directly, without worrying or caring about the infrastructure, platform, or SW that is behind the curtain.

Most CEOs and C-suite leaders will openly share they are not in the business of owning an IT infrastructure and if they can get someone else to own it, run it, and provide it at the level of service expectation they need to accomplish their mission they are really happy campers.

The operational users in DOD services and agencies don’t care that much about the technology behind the curtain — they just know they need to leverage all the data available to improve their mission or business function. Commercial businesses are ready to take on that task as cloud service providers. In defense solutions they need to meet security and availability requirements as part of the first consideration. Most of those vendors pursuing FedRAMP certification offer up IAS, SAS, PAS. DISA should look hard at standing up a line of business around Analytics as a Service.

Posted in Analytics as a Service, DISA | Tagged , | 1 Comment

Owning an IT Infrastructure is NOT a Core Competency of Most Businesses

Today’s C-suite leaders share that owning an IT infrastructure is not a core competency of their businesses and acquiring an infrastructure becomes less palatable unless the result directly contributes to improving the business or mission. However, they do want the end result — analytics and data discovery that will make the business more effective, efficient, and profitable.  

Big Data, the Internet of Things, B2B, new technology advances — all affect the way we improve business efficiencies, effectiveness, and mission.  They also provide a smart business opportunity to leverage someone else’s technology infrastructure. 

 Owning an IT infrastructure depends on how much, how big, how in-depth, how critical, complex, and sensitive the data is that you need to make decisions.  You may not want trade secrets and your intellectual secret sauce in a cloud run/maintained by somebody else unless they can guarantee the same support, availability, and security of your in-house team.

Be honest — IT is a support function.  If not improving the business, you’re wasting money and need to refocus on why the IT functions in the first place. The IT group is there to improve the bottom-line, just as your supply chain, financial, and contracting functions. To be smart about how you and the business approach the return you expect from your information technology investment, you need a data risk assessment that describes how you use it and how its support infrastructure fits your strategic vision and corporate objectives. 

 Leveraging data points across the enterprise improves C-suite decisions and leads to far better understanding of the relationships between functions and decisions.  However, there are likely whole groups of data assets outside the corporate relational database firewalls.  Analyzing ALL the data could mean expanding the infrastructure to gain new data discovery insights into how the business runs or could be more efficient, customer friendly, bottom-line invested. However, if your IT team is more concerned about building an IT kingdom and their shiny new data center technology, it may be time to re-assess how, where, and why the IT functions in the first place.  

 IT is about directly improving the business — not building an infrastructure fiefdom.  The CEO wants to know what the IT Infrastructure is doing for the bottomline.  Put your data where improvement gets done best.

Posted in Uncategorized | Leave a comment

Defense Acquisition – “Where Did That Requirement Come From, Anyway?”

I once had a customer pursuing a “requirement” to process a million rows of data in a set period of time.  This was deemed a critical component of a user acceptance test for a new system.  By itself this was not an issue, but the question in my mind was, “why would anyone need to bring back a million rows of anything”. 

The inference was that the user needed all that information to answer a question and the additional implication was that somewhere in the million rows of information was the answer to some question that the user really needed to find.  So the reality was that the user’s question was not “I need a million rows of information”, but instead was “I need to sift through a lot of information to find the answer that I seek.”  My instinct told me that perhaps a more specific question was appropriate in order to save the user some time and get to the answer more quickly.

A related requirement was to bring back all queries in less than a certain period of time.  This did not apply to just tactical transactions (that really needed near-real-time responses), but all system queries including strategic analytical data sets.  How, then, was a system requirement developed to bring back so much data or deliver an instantaneous answer to everything.  Something was broken in the requirements process.

The PBS series “Connections” was always interesting for me, because it joined the dots between present-day wonders and the science and invention required to make them so.  It showed how various discoveries, scientific achievements and world events were successively interconnected to bring about particular aspects of modern technology.  For a requirements developer and strategic planner, it provided interesting perspective.

Do you know where the requirement for the height and width of the USAF’s C-17 was derived?  Among many other large items, the C-17 had to carry an Abrams tank, so it needed to be so many feet high and wide. 

That is interesting bar conversation, until you ask where the Army derived the height and width of an Abrams tank?  It could have been wider and higher, except for the one very important requirement that it be able to maneuver the terrain in Europe, which included passage through most train tunnels.  So a major planning component of the Army’s battle force was driven by the need to leverage the train landscape. 

But, a question then can be posed, what drove the height and width of the train tunnels?  The obvious answer is the height and width of the trains, but what drove that?  The men who created trains didn’t look too far when they wanted to leverage the steam engine to power their new transportation vehicle  The wagons of the day would do nicely, if they were modified a bit, so these men simply put the engine on a wagon, put a stack on it to keep the smoke out of their eyes and the world of train travel was begun. 

In most parts of the world travel by wagon involved creating roads that following the terrain, over the plains, rivers and mountains. Sometimes the grade on the mountains was too difficult to traverse, so was begun the backbreaking work of going through the mountains rather than over them, and that involved digging out tunnels that would fit the bill.  So the requirement for the road tunnel wide enough for a wagon to pass was established

Again interesting bar conversation, but one might ask where the requirements for most of the wagons of the day was established.  Wagons were made of mostly wood and some important metal pieces (such as the axle), and there needed to be some consistency between wagons and carriages as people began to travel about Europe.  They needed to know that wherever they traveled they could repair their vehicles without having to carry a whole new vehicle with them.  Over time they adopted some standards for wheels and axles that made sense and used what was in place. 

Interestingly, hundreds of years prior to the world of trains, people were using the interstates of Europe that were put in place by the engineers and craftsmen of the Roman empire.  The Roman engineers establish standards that enabled the field troops to quickly build a roadway network  throughout Europe as the Roman Legion needed to quickly move and put troops in place anywhere within the empire.  Their solution was to engineer roadways to carry the primary vehicle of the legion, which was the Roman chariot.  So the roadways were built to accommodate the width of a chariot.  

But what determined the width of a chariot.  This was an entirely tactical requirement — a driver and an archer needed to be pulled by two horses for greatest efficiency on the battlefield.  And since two horses could not be made smaller than God made two horses, the width of a chariot was derived from how closely those horses needed to be bridled together.  Or from a somewhat different perspective, the width of a horse’s ass drove the width of the chariot.  So for practical purposes, the width of a C-17 was ultimately driven by the width of a horse’s ass.

Sometimes, from a defense acquisition perspective, there is a good reason to ask operations folks where the requirements for a new weapon system are derived.  There may be a long, but valid reason.  On the other hand, there may be a more direct way to get to the specific need that saves time and resources and more efficiently answers the mail.  Technology enables us to do and think about things differently than we could have imagined only a few years ago, and often allows us to go after specific objectives directly when the same was not possible in an earlier time.

In World War II, during two raids against the ball bearing factories in Schweinfurt, it took 521 B-17s, carrying well over 2.5M lbs of bombs and with aircrews of over 5,000 airmen  to fly the missions with at least an 80% certainty of effectively destroying the target objective.  During the First Gulf War, technology enabled one F-117 with one pilot and one missile to complete the mission with a 95+% probability of destroying the target.  Today, it doesn’t even require a man-in-the-cockpit. 

Moore’s law observes that the number of transistors in a dense integrated circuit doubles approximately every two years. Dennard scaling suggests that power requirements are roughly proportional to the area for transistors, and the combined result is that as circuits get faster (i.e., more transistors in a circuit), their power consumption stays about the same. As circuit performance increases, so too has the ability to put more data points on storage media, and hard disk and other storage cost decreases.  Network capacity increases and the cost of data transmission decreases.  What does all this infer? The bottomline, for those of us who require a less technical explanation of these phenomena, is that technology (especially information technology) changes significantly every 18-24 months enabling new ways to do things that were previously not possible. 

We use information and data to make decisions do business in better ways.  The issue for those in the technology business is in being enamored of the technology and forgetting about the business or mission requirement.  Can we bring back a million rows of anything or provide an instantaneous answer to everything?  Probably, and if not today, perhaps tomorrow or in the not-too-distant future of technology.  But what is the cost to make that happen, and is it worth paying that price today if the result is not really what we need to achieve to improve the business.

Defense acquisition is a complicated give and take of requirements, priorities, funding, technical capabilities, and mission objectives.  It is an amalgam of cost, schedule, and performance, all stuffed into a risk management balloon.   If you squeeze one part of the balloon, it will respond and expand outward in another area.  Technology advances suggest that we can ultimately accomplish objectives that may now be impossible, but at some cost.  Understanding the requirement upfront, including where it was derived, is critical to understanding the risk in getting there in a reasonable manner. 

Don’t be afraid to ask the question.

 

 

Posted in Acquisition, Air Force, Mission/Business Improvement, Requirements, Technology | Leave a comment

Corporate Re-Organization – Efficiency, Effectiveness, and Improve Mission Results

Stick around long enough and everything eventually cycles back.  The USAF’s just announced re-org replays some parts of previous structures that may seem somewhat familiar to those who claim part of the past.

At Air Force Materiel Command, after the stand-up of the AF Life Cycle Management Center, it is not surprising to see a new AF Installation & Mission Support Center.  In the late 80’s and early 90’s, AF Systems Center and AF Logistics Center were combined into the AFMC to introduce efficiencies between the acquisition and sustainment functions.  The stand-up of AFLCMC and AFIMSC revitalizes what was intended with that merger, but maintains the consolidated efficiency and effectiveness of running those through one MAJCOM.  The AF surely had to work tightly with the congressional depot caucus to gain their thumbs up approval for a new AFIMSC, so the success of the AFLCMC was an important driver and pre-requisite before this new re-organization could be realized.

The ISR function has bounced around over the past 30 years perhaps more than any other service activity.   Many years ago, when intel and recce were more strategically focused, the function of the USAFSS and ESC were aligned with Strategic Air Command and AF Space Command.  The organization re-aligned multiple times as it became more tactically integrated with an increasing near-real-time ability to contribute to combat operations and information dominance.  AFIC stood up the merged missions of the FASTC at WPAFB, AF Special Activities at Ft Belvoir, and AFIA — AFIC soon became AIA.  By 2001 AIA was integrated into ACC and AF ISR Agency was stood up in 2007 as a FOA to coordinate enterprise ISR capabilities for joint warfighters and national users, with a shift from SIGINT to multiple intelligence. Today’s re-org tightens the important AF corporate support needed to fund and defend AFISRA’s expanding missions with ACC’s ability to tie those needs directly to the operational missions.

The A3, A5, A8 changes reflect an ongoing debate about how to best identify, prioritize, fund, and support mission requirements and the programs that address those requirements.  A re-alignment 25 years ago was intended to sync requirements and accountability with the operational functions responsible for planning to use the result in order to force more fiscal stewardship onto the ops community.  Today’s new re-shift pulls weapon system programming responsibility back more closely with the financial budgeting/accounting part of the corporate Air Force.  That’s good.  It also refocuses the operational planning aspects of that corporate body.  That’s also good.  The one aspect that has not changed (and remains true) is that whoever controls the funding controls the outcome.  That presents potential power struggles between ops and program/budget teams around priorities and available funds.

Organizations are restructured to work best within the framework of the decision-makers in place in order to help them best improve the mission and business of the whole.  Today’s re-organizations should support the current fiscal reality, leadership construct, and decision-making arena.  Will it affect those working with and doing business with the Air Force corporate decision-making structure (read: will it be easier or harder to do business, get my projects funded, and/or will it stymie ongoing programs as different voices, perspectives, and processes emerge?)  Perhaps.  However, the intent of a restructure is always to improve the efficiency and effectiveness of the decision-making processes, and along the way, make things happen to improve the mission.

What may influence the success of today’s changes is the significant revolution in the way all these organizations can access, share, and analyze information. From an enterprise perspective, common ground around the data used to make decisions is critical, whether for new projects, sustaining existing programs, or understanding ISR in the context of world events.  The process of how to discover new insights, perform advanced analytics, and make the best decisions supporting the Air Force enterprise relies on information leadership that can support all these mission and business functions.  In a world with more data than we know what to do with, leveraging it to best advantage is not just important, but critical to the success of any organizational alignment and ultimately to the long-term success, viability, and relevance of the Service.

Posted in Air Force, Mission/Business Improvement | 1 Comment

Business Value is Driven by Data Context — Big Data Provides Challenge & Opportunity for Additional Insight

Technology is an enabler of new ways to improve the business and getting to the end result. If the next Uber drives down the cost, makes the ride better, improves the publishing process so that more writers are willing to dip their toe into the pool, that is ultimately a good thing. It forces us as business owners, service providers, and up-and-comers to stay sharp and responsive to the needs of our consumer base. The specific job may change or even go away — but the requirement for the service does not. It is just accomplished in a more effective and efficient manner and we need to adapt and grow with the opportunity to change as a business and service provider.

If we believe we’re technically savy because we have a daily report or dashboard that tells us what happened yesterday, we may be a bit off-the-money. By definition, a report is historical information.  It lays out activities that already happened.  Nothing in a report can be changed –the data is what it is. It can be parsed, and integrated, and shaded in ways that are often valid only in the eyes of the interpreter.  This is important however, because although the data itself doesn’t change, the interpretation is dependent on its relative position to the rest of the world around us.

Finding and placing value around data is accomplished by understanding what was occuring with one item while another event was taking place.  Those rows and columns in simple spreadsheets, data marts and more complex data bases gather and place relational context around a number of similar data points that allow a basic understanding of the events around them and provide a table of context.  Deeper value and insight begins to take shape when tables are compared to other tables and databases are compared to other databases.  A world of business tools exist to simplify, ease, and automate how we manipulate, visualize, and more clearly understand data relationships that are important to helping us drive our business and gain business intelligence from those relationships in order to make better business decisions.

This is all well and good for relational data that can be easily broken and compiled into columns and rows.  The more difficult questions facing most organizations today involve describing how to leverage the huge amount of other data, the databit streams coming off small devices and pieces of equipment that does not lend itself to obvious relationships.  The Internet of Things, the Internet of People, the Cloud, Big Data, significant technology advances are all changing the way businesses think about how they leverage data to improve the business.  The real task, then, is to place all that “big data” stuff into some kind of context so it can make sense and can be used to provide additional insight by sorting through the volume and variety of data streaming (and screaming) across the network at a velocity that makes business value difficult, but necessary, if we want to use it in a way that will help us make better, valid decisions (and get a leg up on our competition).

Data scientists bring multiple computing skills to discover data relationships among all the apparent noise, using advanced analytic algorithms to learn how to put Tab A into Slot B, find what uncommon events might precede a result, and identify relationships that are otherwise not apparent.  In truth, the companies working to bring those advanced analytics skills to every business user will be winners in the next round of data success.  Tomorrow’s technology leaders will be those thought-leaders pushing the leading-edge even further beyond what we now consider “advanced” analysis and data discovery, who will in the not-to-distant-future incorporate autonomous, self-learning tools and solutions built to make better business and mission decisions than today’s best data scientist, program manager, or chief executive officer.

Posted in Big Data, Technology | Tagged , , , | Leave a comment

Facebook’s “Altering Behavior” Occurs When Any Biz Wants to Improve Customer Experience & Result

Every organization should work any data available to harvest business improvement. That is the nature of doing business, to find a way to get customers to enjoy what they are doing, spend more, come back, tell their friends, create a buzz that says “we like doing business with these guys.” No business works to make the experience worse and drive potential users away. You want them their reaction to be good, their emotions to be positive, the result to be good for them and good for you as a company.

Facebook is a data company. They are in the business of putting people with data together with other people with data. Their customers share information freely about themselves, with anyone and everyone who will read it. Personally, that is a little more information and data points than many of us really want to know about each other. There is some sense of maintaining a little mystery that is good and that only those really, really close are privy — however, that is a digression toward a different subject.

Facebook, in publishing its own study results, did not alter or manipulate the personal content of anyone’s personal data. Their data scientists changed the emotional content of news feeds. Understand that this is not changing the substance of the news, simply the way the content was presented. From a practical perspective, this is the same thing that Mad Men on 5th Ave get paid big marketing bucks to do for their clients. It is what the spin doctors inside the White House do with every news conference. It is what the news teams at your local television station accomplish every night and what the ABC, NBC, CBS, MSNBC, and every other network does as it massages the information you receive about what happened in the Supreme Court, or in SW Asia, or on Wall Street, or in an aviation accident, or in your neighborhood.

This is also akin to other data or media companies analyzing what shows you watch immediately around another event, such as the World Cup or Super Bowl. When it’s over, do you end up watching NCIS, or Downton Abbey, or the WWC? And just prior to the event, were you tuned in to all the pre-game, or were you watching National Geographic or Family Feud or Phineas & Ferb? And from that analysis, what are the likely marketing opportunities for you to buy a car or some hot wings or go on a vacation cruise. There is a lot to be learned from the data, both in terms of how to make it better for the consumer and to make it valuable for the provider (and their business partners).

The Facebook data team is given the task of finding ways to make their customer experience better. That also means analyzing and understanding what is not well received so they can change it or avoid that result. From a business perspective, organizations don’t look for ways to make their service or products worse (really, they don’t). If they’re smart, they do lots of analysis to better understand what works and what doesn’t in order to continually provide a better result for their customers and better business result for the company.

The media hype on Facebook is spun as “altering behavior” to make it appear their business analysis is a bad thing. But think about it — altering behavior occurs when any business wants to improve their customers’ experience and the result. That is what we all do when we’re trying to improve our business — tweak out the things that don’t work so well and replace it with products or designs or services that work better. Good data analysts learn to fail fast and move on to what succeeds.

In a socially correct and responsible world it is good and necessary to include a process review to ensure the “what-if” test passes both a company sanity check and a “what if this ended up on the front page of the Washington Post” check. But, in the end, it is what businesses (smart businesses) do to improve their business, their product, and their customer experience.

Posted in Uncategorized | Leave a comment

The Defense Acquisition Conundrum: Requirements, Performance, Oversight, Effectiveness, and Efficiency

Defense Acquisition exists to acquire a service, tool, or product needed to accomplish a mission or function in better fashion, more efficiently, more effectively, less cost.
In an earlier and simpler time, the requirement was for rifles, bullets, clothes, food that supported soldiers in the field. As time and technology moved forward, the tools to accomplish our defense became more complicated. Better swords, better shields, faster ships, bigger firepower, stealthier information gathering, more data points, more zip, more zap, more bang for the buck.
Clearly defense warfighters/users must focus on their operational tasks, so an acquisition corps is given the responsibility to get what the soldiers, sailors, and airmen need and with that comes a disconnect and separation between those who are responsible to support, train and equip and those who are responsible to execute the defense missions.
No one in the executive chain has the appropriations or authority to buy anything unless it is provided by the Congress. Those on the Hill responsible for both the authorization and appropriations are living a tri-polar existence in terms of providing for the common national defense, listening to the constituents who placed them there, and following their own personal agendas (hopefully in that order).
And then there are the suppliers, supporters, and industries that provide the goods and services. Some are good, some are not, all are in business to make money (Don’t ever misplace that fact — if they don’t make a fair profit, they go away. Not good for anyone.)
At a high level, there should be no intent to buy something that is not needed or to spend money, time, or resources on things that don’t improve the mission or the business function. The problem is that there is never really full agreement on what is needed.
The FAR, DOD 5000.0 and all other rules and regulations are in place to ensure funds provided are spent wisely to acquire commodities and services that meet a need. The first version of whatever the original acquisition rules were about were pretty simple – buy this for that general, keep track of what you did, report back to the Congress on how you spent the money. Somebody along the way didn’t like the result, so a change was implemented that provided more oversight to ensure the purchase met the original description. Some competing supplier thought they should have a piece of the pie and convinced their Congressman to legislate more fairness. Greater fairness meant more oversight. More oversight meant more need to prepare for the oversight. More preparation time meant less time to focus on delivery and performance and more time to answer questions about delivery and performance.
Our democracy is based upon everyone having a voice. Unfortunately, in a world of ever evolving technology, communication, and information sharing, there are so many voices that it is difficult to focus on the basic need in a way that cannot be disputed by someone else in the food fight. The process becomes more complicated with more irons in the fire and dogs in the fight. Everyone wants to be heard – few want to listen. 

We can acquire needs quickly and efficiently when absolutely necessary. There are black programs in every service and agency that are in place to make it so. When all is considered there are but a handful of rules that absolutely must be followed in order to ensure products and services are delivered quickly, efficiently, and effectively. They are carried out by the best of the best, who know the touch points, the requirements, the authorization and appropriations processes, and where the lines exist that cannot be crossed. All the rest is oversight that keeps information flowing, but mostly eats up a lot of time and money. These are the best practices that our acquisition process must figure out how to emulate without affecting safety, performance, or breaking the law.
 

Posted in Uncategorized | Leave a comment

Is It the Rules or the Inability to Make a Decision Inside the Rules That Is Hampering Military Acquisition?

A recent Reuters article pointed to the current acquisition rules as hampering our ability to quickly respond to cyber attacks against the networks, weapons, and the industry at larger.  There is without question a large bureaucracy that often seems more inclined to say “no” than “move out” when it comes to rapid response to threats.  However, it is also clear that a decision paralysis often prevails because decision makers are concerned of being second-guessed and questioned after the fact.

Decision makers, especially those navigating complex acquisition processes, need to know the boundaries — particularly what is allowed — and how to ensure they stay inside the lines. However, the paralysis of fortitude bears as much responsibility for slow responses as do the rules themselves. There are communities of excellence that know how to make the acquisition process flow quickly and efficiently by leveraging the limited number of rules that absolutely, positively must be followed. To succeed, they ask the finance, contract, and legal counsel “how can I make this happen?” rather than focusing on “am I allowed to do this?”

The rules are there to guide the acquisition, not hinder it. Learn to use them wisely.

Military acquisition rules hamper U.S. ability to counter cyber threats in.reuters.com

By Andrea Shalal COLORADO SPRINGS Colo. (Reuters) – U.S. military experts on Monday said current acquisition rules hamper their ability to respond quickly to a growing number of cyber attacks against U.S. weapons and computer networks and new…

Posted in Uncategorized | Leave a comment