CM and DM Support to the Modeling and Simulation Process Support to Systems Engineering Functions

Size: px
Start display at page:

Download "CM and DM Support to the Modeling and Simulation Process Support to Systems Engineering Functions"

Transcription

1 CM and DM Support to the Modeling and Simulation Process Support to Systems Engineering Functions First Views Discussions with Mr. Gordon Tillery Cynthia C. Hauer

2 DM Support for Engineering M&S Simulation model development library Simulation validation and Verification with on-line test data and simulations Pre- and post-flight data analysis Quick-look, telemetry, optics, radar Test Scenario definition baseline Definition of data collection requirements Software re-use libraries for user development Libraries of test articles for models and simulations Preservation of documentation, engineering data, design information, and analysis results Metadata development, evolving version and baseline management, retention support, knowledge-managed environment Support for product browsing, keyword and system context, and assisted pointers for online location of assets and holdings Change Management Support

3 Potential Expanded Roles for DM Access to on-line engineering and flight test data for systems and technologies Repository metadata development and pointers to simulation libraries and capabilities Gateway to MEDALS and other similar repositories for USG and industry development teams Pre- and post-processing processing support as required Data reduction and analysis Standard library or facility to house standard threat, environment, technology envelope modules Indexing and routing capabilities for such related data products as flight test data, simulations, analysis data, technical documentation, and contractor down-select data and past/current technical baselines

4 M&S Process Overview DM Support Areas Data Capture, Life Cycle Analysis Support, and Validated Simulation and Model Outcomes Candidate Architectures and Evolving Technical Concepts Contractor Contractor A Contractor Contractor B USG USG and and industry Evaluation and and Insight Insight Activities Flight Test Data Engineering Data Performance Analysis Missile Simulations HWIL Test Data SWIL Test Data Lethality Data Threat Data Animation Reports Spreadsheet Data Element Test Data Element Models Element Architecture Simulation Simulation Support Environment Performance Parameters Algorithm Parameters Modeling Utilities Modeling Components Emerging Technical Element Baselines Technology Technology and and System System Evaluation Evaluation Libraries Baseline Libraries Baseline Libraries Capture Libraries Capture and and Management Management Simulation and Analysis Baselines Validated Concept Models Large Scale Large Scale Integrated Integrated Systems Systems Testing- Testing-

5 Possible Data Capture and Management Candidate Events, Milestones, and Products Design policy and architecture approach Design requirements Systems/subsystems architecture HW/SW preliminary and evolving design Baselined HW/SW detailed design SW code test, inspection, and acceptance Physical design mapped to requirements Drawings and associated lists Test and qualification Installation and field maintenance Insight Management and Milestone Decision Analysis for USG and Industry

6 DM Diverse Support Concept Evaluation and Development Management of data supporting the development and evaluation of multiple configurations and design variations Proposal evaluations Subsystem and system level performance analyses against desired parameters Text and mission planning and analysis Range safety trajectory data and associated telemetry Risk reduction, centralized efforts, cost savings support to Systems Engineering Organization of Supporting Product Data for Analysis and Evaluation

48 th Annual NDIA Conference Targets, UAVs & Range Operations Symposium & Exhibition. Boeing QF-16 Program

48 th Annual NDIA Conference Targets, UAVs & Range Operations Symposium & Exhibition. Boeing QF-16 Program 48 th Annual NDIA Conference Targets, UAVs & Range Operations Symposium & Exhibition Boeing QF-16 Program QF-16 Full Scale Aerial Target Boeing Global Services and Support Maintenance, Modifications, &

More information

Project Name System Critical Design Review

Project Name System Critical Design Review Insert project logo Project Name System Critical Design Review Class Number Title Date Location This Critical Design Review assumes that the design team will be following a formalized design process. This

More information

LRDR Program Overview. Mr. Richard Hagy Director, Business Development March 8, 2017

LRDR Program Overview. Mr. Richard Hagy Director, Business Development March 8, 2017 LRDR Program Overview Mr. Richard Hagy Director, Business Development March 8, 2017 Today s Ballistic Missile Defense System 2 Long Range Discrimination Radar Ballistic Missile Threats are Growing more

More information

RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit) June 2001

RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit) June 2001 COST ($ in Thousands) Actual FY 2003 FY 2004 FY 2005 FY 2006 FY 2007 Cost to Total Cost 4137 Range Standardization and Automation (RSA) 48,303 84,373 65,097 74,898 69,924 66,628 72,430 72,520 Continuing

More information

Air Force Test Center

Air Force Test Center Air Force Test Center Avionics Cyber Range (ACR) Mark Erickson 46 TS/OGE 26 January 2017 DISTRIBUTION STATEMENT A: Approved for public release: distribution is unlimited. 96TW-2017-0005 1 What is the Avionics

More information

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference Benefits to the Stakeholders A Collaborative and Win-Win Strategy Lal Dias Chief Executive Officer Sri Lanka CERT CC Cyber attacks

More information

52 nd FUZE CONFERENCE. Presented by: Mr. Perry Salyers

52 nd FUZE CONFERENCE. Presented by: Mr. Perry Salyers 52 nd FUZE CONFERENCE Presented by: Mr. Perry Salyers May 13-15, 2008 OUTLINE ERGM System Overview ERGM System Operation M982 System Overview M982 System Operation System Target & Excalibur Characteristics

More information

Air Virtual At Sea (VAST) Platform Stimulation Analysis

Air Virtual At Sea (VAST) Platform Stimulation Analysis Air Virtual At Sea (VAST) Platform Stimulation Analysis Final Report Concept for Support of ONR/JFCOM Contract N00014-04-M-0074 CLIN 0001AC January 2005 1 Report Documentation Page Form Approved OMB No.

More information

Data Curation Handbook Steps

Data Curation Handbook Steps Data Curation Handbook Steps By Lisa R. Johnston Preliminary Step 0: Establish Your Data Curation Service: Repository data curation services should be sustained through appropriate staffing and business

More information

Sample Application of OOSEM to Real Time Application

Sample Application of OOSEM to Real Time Application Sample Application of OOSEM to Real Time Application Doug Ferguson INCOSE OOSEM Working Group Copyright INCOSE 2004-2007. All rights reserved. 1 m2 s13 SE Interface with Hardware/Software Inputs to SW/HW

More information

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost?

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost? Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,

More information

Systems Engineering for Test: Providing the Right Testing at the Right Time

Systems Engineering for Test: Providing the Right Testing at the Right Time Systems Engineering for Test: Providing the Right Testing at the Right Time Louisa Guise National Defense Industrial Association T&E Conference March 14, 2012 Copyright 2011 Raytheon Company. All rights

More information

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved. EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT An Insight Cyber White Paper Copyright Insight Cyber 2018. All rights reserved. The Need for Expert Monitoring Digitization and external connectivity

More information

A Supply Chain Attack Framework to Support Department of Defense Supply Chain Security Risk Management

A Supply Chain Attack Framework to Support Department of Defense Supply Chain Security Risk Management A Supply Chain Attack Framework to Support Department of Defense Supply Chain Security Risk Management D r. J o h n F. M i l l e r T h e M I T R E C o r p o r a t i o n P e t e r D. K e r t z n e r T h

More information

SC27 WG4 Mission. Security controls and services

SC27 WG4 Mission. Security controls and services copyright ISO/IEC JTC 1/SC 27, 2012. This is an SC27 public document and is distributed as is for the sole purpose of awareness and promotion of SC 27 standards and so the text is not to be used for commercial

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #193

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #193 COST ($ in Millions) Prior Years FY 2013 FY 2014 Base OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Air Force Page 1 of 5 R-1 Line #193 Cost To Complete Total Program Element - 30.944 35.657 20.806-20.806

More information

From SDTM to displays, through ADaM & Analyses Results Metadata, a flight on board METADATA Airlines

From SDTM to displays, through ADaM & Analyses Results Metadata, a flight on board METADATA Airlines From SDTM to displays, through ADaM & Analyses Results Metadata, a flight on board METADATA Airlines Omar SEFIANI - Stéphane BOUGET, Boehringer Ingelheim DH13, PhUSE Barcelona 2016, October, 12 th Outline

More information

Development of Infrared and Millimeter Wave Scene Generators for the P3I BAT High Fidelity Flight Simulation

Development of Infrared and Millimeter Wave Scene Generators for the P3I BAT High Fidelity Flight Simulation Development of Infrared and Millimeter Wave Scene Generators for the P3I BAT High Fidelity Flight Simulation Jeremy R. Farris and Marsha Drake System Simulation and Development Directorate, U.S. Army Aviation

More information

Qualification Specification

Qualification Specification BCS Level 2 Certificate in IT User Skills (ECDL Core) Version 2.0 March 2018 This is a United Kingdom government regulated qualification which is administered and approved by one or more of the following:

More information

The US National Near-Earth Object Preparedness Strategy and Action Plan

The US National Near-Earth Object Preparedness Strategy and Action Plan The US National Near-Earth Object Preparedness Strategy and Action Plan Briefing to SMPAG Lindley Johnson Program Executive / Planetary Defense Officer Science Mission Directorate NASA HQ October 18, 2018

More information

DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK

DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK GOODS AND SERVICES CONTRACTS Page 1 of 5 RFP 16-PR-DEM-33 Comprehensive All-Hazards

More information

Command and Control for Security, Port Operations, and IT Considerations for Planning and Implementation

Command and Control for Security, Port Operations, and IT Considerations for Planning and Implementation Command and Control for Security, Port Operations, and IT Considerations for Planning and Implementation Port Operations, Safety and Information Technology Seminar Gary Hicks, Science Applications International

More information

Ontology Engineering for Product Development

Ontology Engineering for Product Development Ontology Engineering for Product Development Henson Graves Lockheed Martin Aeronautics Company Fort Worth Texas, USA henson.graves@lmco.com Abstract. This analysis is to identify requirements for a Description

More information

Brown University Libraries Technology Plan

Brown University Libraries Technology Plan Brown University Libraries Technology Plan 2009-2011 Technology Vision Brown University Library creates, develops, promotes, and uses technology to further the Library s mission and strategic directions

More information

It s just software Or It s all software and it s the new normal

It s just software Or It s all software and it s the new normal NSWCDD-PN-18-00055 t s just software Or t s all software and it s the new normal John Seel, Ph.D. Distinguished Engineer for Warfare s Software 540-653-4443 John.seel@navy.mil Thoughts about software We

More information

Ensuring Proper Storage for Earth Science Data: The USGS Process to Certify Trusted Digital Repositories

Ensuring Proper Storage for Earth Science Data: The USGS Process to Certify Trusted Digital Repositories Ensuring Proper Storage for Earth Science Data: The USGS Process to Certify Trusted Digital Repositories U.S. Department of the Interior U.S. Geological Survey John Faundeen, Clara Brown, Keith Kirk PECORA

More information

Systems Engineering and System Security Engineering Requirements Analysis and Trade-Off Roles and Responsibilities

Systems Engineering and System Security Engineering Requirements Analysis and Trade-Off Roles and Responsibilities Systems Engineering and System Security Engineering Requirements Analysis and Trade-Off Roles and Responsibilities Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 8 R-1 Line #192

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 8 R-1 Line #192 Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Air Force : February 2015 3600: Research, Development, Test & Evaluation, Air Force / BA 7: Operational Systems Development COST ($ in Millions) Years

More information

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment 26 January 2017 Presented by: Mr. Chad Miller NAVAIR Cyber T&E What: Replicate Cyber Battlespace

More information

Courses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X

Courses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X 4016 Points * = Can include a summary justification for that section. FUNCTION 1 - INFORMATION SYSTEM LIFE CYCLE ACTIVITIES Life Cycle Duties No Subsection 2. System Disposition/Reutilization *E - Discuss

More information

SECURITY PLAN CREATION GUIDE

SECURITY PLAN CREATION GUIDE 2017 SECURITY PLAN CREATION GUIDE UTC IT0121-G UTC Information Technology Michael Dinkins, CISO 4/28/2017 CONTENTS 1. SCOPE... 2 2. PRINCIPLES... 2 3. REVISIONS... 2 4. OBJECTIVE... 2 5. POLICY... 2 6.

More information

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS February 22-23, 2018 Millennium Knickerbocker Hotel Chicago, IL RELATED EVENT: FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES February 21-22, 2018

More information

Welcome to a world where technology flows through the heart of your business environment. Welcome to CDC

Welcome to a world where technology flows through the heart of your business environment. Welcome to CDC Welcome to a world where technology flows through the heart of your business environment Welcome to CDC Overview 4 Urban Campus 5 Intelligent Campus Management Solution 6 Key Features 7 Integra Management

More information

Configuration Management for Component-based Systems

Configuration Management for Component-based Systems Configuration Management for Component-based Systems Magnus Larsson Ivica Crnkovic Development and Research Department of Computer Science ABB Automation Products AB Mälardalen University 721 59 Västerås,

More information

Petroleum User Group Meeting, April 2006 Houston, TX. Leveraging Semantic Technology for Improved Enterprise Search and Knowledge Discovery

Petroleum User Group Meeting, April 2006 Houston, TX. Leveraging Semantic Technology for Improved Enterprise Search and Knowledge Discovery Petroleum User Group Meeting, April 2006 Houston, TX Leveraging Semantic Technology for Improved Enterprise Search and Knowledge Discovery Petroleum User Group Meeting, April 2006 Houston, TX OR GIS as

More information

Architecting OneWeb s Massive Satellite Constellation Ground System

Architecting OneWeb s Massive Satellite Constellation Ground System Architecting OneWeb s Massive Satellite Constellation Ground System GROUND SEGMENT ARCHITECTURE WORKSHOP 2017 Information included herein has been determined to not contain any controlled technical data

More information

Cyber Attacks & Breaches It s not if, it s When

Cyber Attacks & Breaches It s not if, it s When ` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,

More information

The Success of the AMRAAM DBMS/DAS

The Success of the AMRAAM DBMS/DAS The Success of the AMRAAM DBMS/DAS John Gerdine Wyle Laboratories Inc. Niceville Florida 32579 U.S.A. 1 Overview Asymmetric Threat AMRAAM Development Test and Evaluation (T&E) History Current AMRAAM Production

More information

Exhibit A1-1. Risk Management Framework

Exhibit A1-1. Risk Management Framework Appendix B presents the deliverables produced during the execution of the risk management approach to achieve the assessment and authorization process. The steps required by the risk management framework

More information

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Introduction No matter how hard you work to educate your employees about the constant and evolving threats

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

ECDL PROFILE DO IT YOU WAY

ECDL PROFILE DO IT YOU WAY NEW ECDL using MS Office 2007, 2010 or 2013 ECDL Profile ECDL PROFILE DO IT YOU WAY Your ECDL With ECDL Profile, you choose the module combinations best suited to you. After passing the tests, those modules

More information

Canadian Chemical Engineering Conference Edmonton, Alberta October 30, 2007

Canadian Chemical Engineering Conference Edmonton, Alberta October 30, 2007 US Chemical Facility Anti-Terrorism Standards (CFATS) Overview Canadian Chemical Engineering Conference Edmonton, Alberta October 30, 2007 Dorothy Kellogg AcuTech Consulting Group Alexandria, Virginia

More information

JULES VERNE ATV DEMONSTRATION OBJECTIVES REPORT TOOL (JADOR)

JULES VERNE ATV DEMONSTRATION OBJECTIVES REPORT TOOL (JADOR) JULES VERNE ATV DEMONSTRATION OBJECTIVES REPORT TOOL (JADOR) Fran Martínez Fadrique (1), Carlos M. Casas Cuadrado (1), José Miguel Lozano González (1), (1) GMV AD, Isaac Newton 11, 28760 Tres Cantos, Spain

More information

IAA Space Debris Committee. Mark Rawlins, SDA Chairman 21 March 2017

IAA Space Debris Committee. Mark Rawlins, SDA Chairman 21 March 2017 IAA Space Debris Committee Mark Rawlins, SDA Chairman 21 March 2017 Overview The Space Data Association (SDA) is a formal, non profit association of civil, commercial and military spacecraft operators

More information

MAASTO TPIMS Systems Engineering Analysis. Documentation

MAASTO TPIMS Systems Engineering Analysis. Documentation MAASTO TPIMS Project MAASTO TPIMS Systems Engineering Analysis Documentation Date: November 18, 2016 Subject: MAASTO TPIMS Systems Engineering Analysis and Supplementary Project Documentation Summary Introduction

More information

Advanced Validation Strategies for On-Board Satellite Software in the Galileo IOV Programme

Advanced Validation Strategies for On-Board Satellite Software in the Galileo IOV Programme Olivier Croatto, Michael Uemminghaus Garching, Oct. 7th, 2008 Advanced Validation Strategies for On-Board Satellite Software in the Galileo IOV Programme Astrium Proprietary Information Agenda 1 - Overview

More information

CYBER ASSISTANCE TEAM OVERVIEW BRIEFING

CYBER ASSISTANCE TEAM OVERVIEW BRIEFING CYBER ASSISTANCE TEAM OVERVIEW BRIEFING By Mr. Derek Fleischmann Cyber Assistance Team Missile Defense Agency May 16, 2018 Agenda Introduction MDA CAT Operations MDA CAT Deployment Expectations Administrative

More information

3) Develop a user interface to facilitate discovery, delivery and rights management of media content

3) Develop a user interface to facilitate discovery, delivery and rights management of media content Position Type : Exempt, Contingent-I Position Title : Digital Collections Developer Division : Digital Systems and Stewardship Department : Software Systems Development and Research Prepared by : Ben Wallberg,

More information

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin ARC VIEW DECEMBER 7, 2017 Critical Industries Need Active Defense and Intelligence-driven Cybersecurity By Sid Snitkin Keywords Industrial Cybersecurity, Risk Management, Threat Intelligence, Anomaly &

More information

CYBER SECURITY BRIEF. Presented By: Curt Parkinson DCMA

CYBER SECURITY BRIEF. Presented By: Curt Parkinson DCMA CYBER SECURITY BRIEF Presented By: Curt Parkinson DCMA September 20, 2017 Agenda 2 DFARS 239.71 Updates Cybersecurity Contracting DFARS Clause 252.204-7001 DFARS Clause 252.239-7012 DFARS Clause 252.239-7010

More information

Level 3 Diploma in Business Administration (601/3965/1)

Level 3 Diploma in Business Administration (601/3965/1) Level 3 Diploma in Business Administration (601/3965/1) This document lists the units available in this qualification and how they compare to units in the previous version of this qualification. Units

More information

Question & Answer #2

Question & Answer #2 DARPA Blackjack Reference: HR001118S0032 Link: https://www.fbo.gov/spg/oda/darpa/cmo/hr001118s0032/listing.html Question & Answer #2 Question 9: Table 5 Thermal requirement shows a Nominal Requirement

More information

Digital The Harold B. Lee Library

Digital The Harold B. Lee Library Digital Preservation @ The Harold B. Lee Library CIMA 23 May 2013 How we got here? 1. Understanding Digital Preservation 2. Search for Content 3. Maintain Optical Disc Storage 4. In House Preservation

More information

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP ARINC cybersecurity solutions DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP Getting started is as simple as assessing your baseline THE RIGHT CYBERSECURITY SOLUTIONS FOR YOUR UNIQUE NEEDS Comprehensive threat

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Cyber Security Requirements for Supply Chain. June 17, 2015

Cyber Security Requirements for Supply Chain. June 17, 2015 Cyber Security Requirements for Supply Chain June 17, 2015 Topics Cyber Threat Legislation and Regulation Nuts and Bolts of NEI 08-09 Nuclear Procurement EPRI Methodology for Procurement Something to think

More information

SEER-H Space Guidance

SEER-H Space Guidance SEER-H Space Guidance Revision 2.2 June 8, 2016 Table of Contents 1. Introduction 2. Mapping SEER to NASA WBS 2.1. NASA Work Breakdown Structure 3. Starting a New Project 4. Project Structure in SEER 4.1.

More information

Agenda. Bibliography

Agenda. Bibliography Humor 2 1 Agenda 3 Trusted Digital Repositories (TDR) definition Open Archival Information System (OAIS) its relevance to TDRs Requirements for a TDR Trustworthy Repositories Audit & Certification: Criteria

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

Disaster Management and Security Solutions to Usher in the IoT Era

Disaster Management and Security Solutions to Usher in the IoT Era Disaster Management and Solutions for a Safe and Secure Way of Life Overview Disaster Management and Solutions to Usher in the IoT Era Takeshi Miyao Toshihiko Nakano, Ph.D. 1. The Bright and Dark Sides

More information

Module 3 Introduction to the. Architecture Development Method. Introduction to the. Architecture Development Method (ADM)

Module 3 Introduction to the. Architecture Development Method. Introduction to the. Architecture Development Method (ADM) Module 3 Introduction to the Development Method 8.1.1 Edition Copyright November 2006 All Slide rights reserved 1 Published by The Open Group, November 2006 Development Method Introduction to the Development

More information

Data Verification and Validation (V&V) for New Simulations

Data Verification and Validation (V&V) for New Simulations Data Verification and Validation (V&V) for New Simulations RPG Special Topic 9/15/06 1 Table of Contents Introduction 1 Data V&V Activities During M&S Development 1 Determine M&S Requirements Phase 2 V&V

More information

Ransomware. How to protect yourself?

Ransomware. How to protect yourself? Ransomware How to protect yourself? ED DUGUID, CISSP, VCP CONSULTANT, WEST CHESTER CONSULTANTS Ransomware Ransomware is a type of malware that restricts access to the infected computer system in some way,

More information

System Assurance For Smart House Smart House Team ( Nara Institute Science And Technology )

System Assurance For Smart House Smart House Team ( Nara Institute Science And Technology ) System Assurance For Smart House Smart House Team ( Nara Institute Science And Technology ) Khana Chindamaikul, Uematsu Yusuke, Jun Komeda Schedule 8/21-9/1-9/11-9/21-10/1-10/11-10/21-0. Preparation for

More information

Modular Open Systems Approach (MOSA) Panel on Standards

Modular Open Systems Approach (MOSA) Panel on Standards Modular Open Systems Approach (MOSA) Panel on Standards Ms. Phil Zimmerman Deputy Director, Engineering Tools and Environments Office of the Deputy Assistant Secretary of Defense on Systems Engineering

More information

Technical Document Preparation Plan For License Application Design Selection Feature Report: Aging and Blending

Technical Document Preparation Plan For License Application Design Selection Feature Report: Aging and Blending WBS: 1.2.3.3 QA: L MOL.19981104.0001 Civilian Radioactive Waste Management System Management & Operating Contractor Technical Document Preparation Plan For License Application Design Selection Feature

More information

Qualification Specification NCFE Level 2 Diploma in Business Administration (601/3964/X) Business, Administration and Law

Qualification Specification NCFE Level 2 Diploma in Business Administration (601/3964/X) Business, Administration and Law Qualification Specification NCFE Level 2 Diploma in Business Administration (601/3964/X) Business, Administration and Law Aims and objectives of this qualification This qualification aims to develop learners

More information

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure

More information

PROBABILITY OF FAILURE ANALYSIS STANDARDS AND GUIDELINES FOR ELVS

PROBABILITY OF FAILURE ANALYSIS STANDARDS AND GUIDELINES FOR ELVS PROBABILITY OF FAILURE ANALYSIS STANDARDS AND GUIDELINES FOR ELVS Federal Aviation Administration 6th IAASS Conference Session 10: Launch Safety Part 1 By:, Elisabeth Morse (Valador Inc.), Paul Rosati

More information

HOW TO SELECT AVAILABILITY SOLUTIONS FOR OPERATIONS-CRITICAL TECHNOLOGIES AND APPLICATIONS

HOW TO SELECT AVAILABILITY SOLUTIONS FOR OPERATIONS-CRITICAL TECHNOLOGIES AND APPLICATIONS PHARMA INDUSTRY DECISION GUIDE HOW TO SELECT AVAILABILITY SOLUTIONS FOR OPERATIONS-CRITICAL TECHNOLOGIES AND APPLICATIONS simplify and modernize automation CAN YOU AFFORD TO OPERATE IN THE DARK DUE TO

More information

Introducing Cyber Resiliency Concerns Into Engineering Education

Introducing Cyber Resiliency Concerns Into Engineering Education Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

TEST AND EVALUATION (T&E) METADATA REFERENCE MODEL

TEST AND EVALUATION (T&E) METADATA REFERENCE MODEL DOCUMENT 176-11 DATA SCIENCES GROUP TEST AND EVALUATION (T&E) METADATA REFERENCE MODEL WHITE SANDS MISSILE RANGE REAGAN TEST SITE YUMA PROVING GROUND DUGWAY PROVING GROUND ABERDEEN TEST CENTER ELECTRONIC

More information

An Update on Security and Emergency Preparedness Standards for Utilities

An Update on Security and Emergency Preparedness Standards for Utilities An Update on Security and Emergency Preparedness Standards for Utilities Linda P. Warren, Launch! Consulting Safety and Security in the Workplace March 28, 2013 Overview 1 Review of AWWA Standards in Water

More information

LPD 17 PRA Testbed VV&A Database: A Disciplined Approach for VV&A. Vincent M. Ortiz AVW Technologies 9 March, 2006

LPD 17 PRA Testbed VV&A Database: A Disciplined Approach for VV&A. Vincent M. Ortiz AVW Technologies 9 March, 2006 LPD 17 PRA Testbed VV&A Database: A Disciplined Approach for VV&A Vincent M. Ortiz AVW Technologies 9 March, 2006 VV&A DATABASE OVERVIEW An Example of Making VV&A Work The Simulation The Simulation Development

More information

Mobility best practice. Tiered Access at Google

Mobility best practice. Tiered Access at Google Mobility best practice Tiered Access at Google How can IT leaders enable the productivity of employees while also protecting and securing corporate data? IT environments today pose many challenges - more

More information

SEER-H Space Guidance

SEER-H Space Guidance SEER-H Space Guidance Revision 2.0 April 25, 2016 Table of Contents 1. Introduction 2. Mapping SEER to NASA WBS 2.1. NASA Work Breakdown Structure 3. Starting a New Project 4. Project Structure in SEER

More information

POSITION DESCRIPTION

POSITION DESCRIPTION UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Certificate III in Telecommunications Digital Reception Technology

Certificate III in Telecommunications Digital Reception Technology ICT30410 Qualification Notes Certificate III in Telecommunications Digital Reception Technology Descriptor This qualification reflects the role of an individual in the telecommunications industry who can

More information

Libraries, Repositories and Metadata. Lara Whitelaw, Metadata Development Manager, The Open University. 22 Oct 2003

Libraries, Repositories and Metadata. Lara Whitelaw, Metadata Development Manager, The Open University. 22 Oct 2003 Libraries, Repositories and Metadata Lara Whitelaw, Metadata Development Manager, The Open University. 22 Oct 2003 Libraries Libraries are the traditional realm of metadata Use well defined standards and

More information

Continuity of Business

Continuity of Business White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be

More information

PCTE Program Management Update. Liz Bledsoe Acting Product Manager Cyber Resiliency and Training

PCTE Program Management Update. Liz Bledsoe Acting Product Manager Cyber Resiliency and Training PCTE Program Management Update Liz Bledsoe Acting Product Manager Cyber Resiliency and Training elizabeth.e.bledsoe.civ@mail.mil PCTE Stakeholder Landscape TRAINING TEST US CYBER COMMAND CYBER RANGE EXECUTIVE

More information

SVIL GPSIIR Modernization Using NI Technology

SVIL GPSIIR Modernization Using NI Technology SVIL GPSIIR Modernization Using NI Technology 2012 FSW Workshop November 7, 2012 Anthony Vescovi 1 1 SVIL Business Case - Executive Summary Four foundational SVIL capabilities promise to increase execution

More information

ROSESAT -- A GRAPHICAL SPACECRAFT SIMULATOR FOR RAPID PROTOTYPING

ROSESAT -- A GRAPHICAL SPACECRAFT SIMULATOR FOR RAPID PROTOTYPING ROSESAT -- A GRAPHICAL SPACECRAFT SIMULATOR FOR RAPID PROTOTYPING Xavier Cyril Space Systems Engineering, CAE Electronics Ltd. 8585 Cote de Liesse, Saint Laurent, Quebec, Canada H4T 1G6 FAX: (514) 734

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Metadata Architectures

Metadata Architectures Metadata Architectures Evaluating Metadata Architectures Introduction The IT world has practiced metadata management in one form or another for more than twenty years. IT has developed three models for

More information

Implementation of a Middleware Based Ground System March 2, 2005, GSAW2005 Conference

Implementation of a Middleware Based Ground System March 2, 2005, GSAW2005 Conference Implementation of a Middleware Based Ground System March 2, 2005, GSAW2005 Conference Presented By Everett Cary Emergent Space Technologies, Inc. Teammates NASA GMSEC NASA SSMO Honeywell Technology Solutions,

More information

Continuing Development of the Proportional Flow Control Valve (PFCV) for Electric Propulsion Systems

Continuing Development of the Proportional Flow Control Valve (PFCV) for Electric Propulsion Systems Continuing Development of the Proportional Flow Control Valve (PFCV) for Electric Propulsion Systems IEPC-27-346 Presented at the 3 th International Electric Propulsion Conference, Florence, Italy David

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

HVAC&R Technical Requirements for The Commissioning Process. Charles E Dorgan, PE, PhD, CxAP Professor Emeritus University of Wisconsin - Madison

HVAC&R Technical Requirements for The Commissioning Process. Charles E Dorgan, PE, PhD, CxAP Professor Emeritus University of Wisconsin - Madison HVAC&R Technical Requirements for The Commissioning Process Charles E Dorgan, PE, PhD, CxAP Professor Emeritus University of Wisconsin - Madison Guideline 1-2007 Purpose of this presentation is: to assist

More information

align security instill confidence

align security instill confidence align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed

More information

A400M. Flares trajectories calculation from a chase aircraft

A400M. Flares trajectories calculation from a chase aircraft A400M. Flares trajectories calculation from a chase aircraft Francisca Coll Herrero 1, Israel Lopez Herreros 2 1: Airbus, francisca.coll@airbus.com 2: Airbus, Israel.Lopez@airbus.com Flight Test Airbus

More information

NB Appendix CIP NB-0 - Cyber Security Personnel & Training

NB Appendix CIP NB-0 - Cyber Security Personnel & Training This appendix establishes modifications to the FERC approved NERC standard CIP-004-5.1 for its specific application in New Brunswick. This appendix must be read with CIP-004-5.1 to determine a full understanding

More information

: Course CDFOM : Certified Data Centre Facilities Operations Manager

: Course CDFOM : Certified Data Centre Facilities Operations Manager Module Title Duration : Course CDFOM : Certified Data Centre Facilities Operations Manager : 3 days Course Description Managing the facilities of today s hi-end and hi-availability data centres is an extremely

More information

Methodology for Dynamic Characterization of Fragmenting Warheads

Methodology for Dynamic Characterization of Fragmenting Warheads Methodology for Dynamic Characterization of Fragmenting Warheads Jason Angel - U.S. Army Research Laboratory April 22, 2008 Guns & Missiles symposium New Orleans, LA OUTLINE BOTTOM LINE UP FRONT 1 - PROPOSED

More information

Securing Buildings & Facilities From Emerging Cyber Threats

Securing Buildings & Facilities From Emerging Cyber Threats Session 5: [Session Title] Securing Buildings & Facilities From Emerging Cyber Threats Michael Mylrea Manager, Cybersecurity & Energy Technology Pacific Northwest National Lab August 10, 2016 Rhode Island

More information

Easy Projects Custom Fields Infinite Possibilities

Easy Projects Custom Fields Infinite Possibilities Easy Projects Custom Fields Infinite Possibilities Custom Fields are the Swiss Army Knife of Easy Projects! They greatly extend the capabilities of Easy Projects enabling you to capture and report on any

More information