Department Of Defense SharePoint Architecture Guide (DSAG) Part 13 Understanding How DIEA Will Evolve

The principles of the DIEA is focused on making a baseline for the framework of the rules that define and guide the Department of Defense. The core of the product is the architecture. This includes the role of the Defense Information Enterprise, the DIEA for the context of the enterprise, and the core principles of the rules that guide all of the investments. All of this information can be downloaded for review from

Even though the DIEA 1.0 offers a very strong start, it is only the beginning rather than being complete. The world of IT is one that continues to evolve so it is going to be a work in progress from day one. There are three questions that need to be answered for the enterprise architecture so that proper guidance can be established. Those questions are:

What do we need to do?

How do we need to operate?

When will we make the transition?

To answer the first two questions, a foundation has to be established with the principles and rules for the enterprise to follow. The concepts need to be embedded into the Department of Defense so that the transformation can occur. The department has to have a plan for the transition to be in place so that the guidance will make it a process that flows well.

The future releases won’t offer an increase in the number of architecture products. What will happen in the future is that the current ones will be refined and offer additional operational view such as in the areas of process models. This will help with identifying specific problems within the Department of Defense.

There are some types of views that you aren’t ever going to see in the DIEA though. One of them is the logical data models and systems that are inconsistent with the Department of Defense data and services strategies. The overall concept of the net centric system is for information sharing. The architecture products aren’t going to help with the area of various challenges such as when there is a transition in place from the current environment.

The rules and principles that are outlined in the DIEA 1.0 are very important to follow. They offer a decision making process for the Department of Defense. The goal will result in speeding up the evolution of the net centric information sharing. The key focus is for the rules and principles to be an embedded part of the process. There are plenty of steps in motion though to get this to happen. The department is taking the time to:

Focus attention on the supporting decision makers for the department. This is done with the DIEA as a type of tool for guiding and maintaining the IT investments that they have to be responsible for.

Speeding up the evolution of the approach to solving the data and services issues is being addressed by the department.

The issues that relate to the funding for the enterprise service and models continue to be explored.

The Department of Defense is working to merge the architecture guidance with the net centric operations. There is a checklist being reviewed with the DIEA. The merge is next release of the DIEA will offer a framework that is very powerful when it comes to the concerns of architecture guidance.

The DIEA compliance guidelines in place will be published so that the issues of compliance can be viewed. The goals of the net centric operations will then have the solid commitment throughout the various layers that make of the Department of Defense. The DIEA 1.0 is a very important tool for the department to be able to achieve that goal.


Department Of Defense SharePoint Architecture Guide (DSAG) Part 12 Understanding NetOps Agility

There are business rules and principles that have to be followed. They are in place to make sure help with reducing the complexity of the set up. They also work to help reduce the overall cost. Yet you have a system that is very reliable and that can accommodate future changes that need to be implemented into the GIG technical direction.

NetOps Agility NetOps offers a vision for changing the existing capabilities into a multiplier. It offers a way for the Department of Defense to be able to use the power of the GIG. The mission is to offer a unified GIG that is:

Oriented for the mission The information has to be processed in a way that will always support the mission.
User friendly The users need to be able to access the necessary information from anywhere. The GIG should offer this quickly even if the needs of the user happen to be unanticipated.

Global access The mission needs to offer plenty of agility regardless of the user being local or globally positioned.

The GIG NetOps has to be delivered to the organization in a way that varies based on function. It also depends on the type of information to be accessed. The independent management systems of them rarely share information about the status of the managing domain.

The Joint NetOps Concept of Operations allows the Department of Defense to improve the way in which the GIG operated as well as how to secure it. The NetOps is very effective when it comes to the role for net centric operations to be completed. The major changes that have to be addressed include:

Awareness of the information available to commanders.

GIG command and control that can offer quick decision making.

Policies for operating the NetOps have to be clear.

The electromagnetic spectrum of the NetOps needs to be addressed.

The metrics should measure the health and mission readiness of the GIG.

The development of the capabilities needs to have a central governing location
Coordinating the independent NetOps and field activities.

The challenges offer improvement for the operations of the defenses within the GIG. This is completely supported with the ongoing efforts of the mission. There is also a multi partner environment in place.

The NetOps has an environment that allows for the organizational and geographic boundaries to be put in place. For this to work though the Department has to embrace a new method of thinking. They also have to accept new processes which means some new polices. To help with this process the NetOps agility has several goals:

Enable trusted information for the enterprise the premise is for NetOps to be seamless and for the information to flow from one end to the other of the enterprise. This is all in response to what the needs of the user happens to be with the GIG resources in place and allocated parallel with the mission requirements.

To achieve this goal there are two things that have to be considered. First, the NetOps data must be visible and it needs to be accessible for all of the authorized users. Second, the NetOps needs to be understood and then shared for that information to cover all of the missions of the Department of Defense.

Command & Control of the GIG is united The Department of Defense will have a strong dependence on the GIG. This means that it has be able to deliver a variety of commands and controls to all levels of those responsible for making decisions. It is crucial that the Department of Defense is able to take the NetOps and increase the speed of it. At the same time they can take the policy based structure of the GIG domains to coordinate them.

Evolution of the NetOps Time phasing will have to define and develop the net centric portfolio. The policies will help with the overall structure and implementing of plans for a very effective transformation in the beginning as well as additional needs emerge.

There are several rules and principles that need to be established for the foundation of the NetOps to work for the department. These guidelines are very important so it is vital that all of them are implemented successfully for the Department of Defense IT investment to be one that will offer the best benefits.

The Department of Defense needs to operate and defense the GIG as an end to end information resource. They need to create a structure that offers centralized directions so that unanticipated needs can be addressed. This includes but isn’t limited to the possibility of cyber attacks.

The function of the enterprise needs to be integrated across the many management domains. This will allow for the GIG NetOps functions to be operational at different levels. They include operations, tactics, and strategies. The program has to address training and leadership materials.

The application of the GIG program will require the services to offer automation in many areas. At the same time though it has to account for an adjustment to be made so that the resources are fully allocated based on such configurations.

The vision of shared NetOps is one that calls for shared awareness to be in place. All of the applications should be visible and accessible. This allows for the various authorized users to be able to understand all of it. The GIG resources need to have an infrastructure for computing and communication that will be centralized.

Both performance and security are key issues that have to be addressed. The information system has to make it possible for situational awareness and the management of performance to be possible. The NetOps is allows to make the health and readiness of the Department of Defense the opportunity for the services and applications to be supported by the missions of the department.

Next >> Department Of Defense SharePoint Architecture Guide (DSAG) Part 13 Understanding How DIEA Will Evolve


Department Of Defense SharePoint Architecture Guide (DSAG) Part 10 Standardization of the GIG Computing Infrastructure

The net centric operating environment and applications won’t be hosted or maintained by dedicated software any longer. Instead they will be virtual on the GIG computing nodes across the various resources in the GIG. The computing nodes are IT facilities that allow for hosting the various applications and services. Data is stored and the content is controlled so that they it is delivered within the different service levels.

The computing nodes allow for security, backup, and information assurance to be in place across the IT network that is being hosted. The computing nodes can be offered in a variety of levels. This can range from a fixed enterprise scale to a regional processing area. The use of standard rules for the computing nodes is vital for the DIEA 1.0.

The GIG resources have to be on the edge and that will happen with a fixed and deployed computing node technology that is responsive. All of the computing nodes have to be NetOps certified and accredited in order for them to meet the computing service provider requirements.

The computing infrastructure has to support all of the missions of the department. It must provide the edge with an on demand access that is secure for shared spaces. The information of the assets has to work for the functionality, the security, and the integrity of all the domains.

Consolidating the computing infrastructure has fixed mode operations in place so that it is cost effective. At the same time the mission capabilities and operational effectiveness won’t be compromised. The infrastructure needs to offer security and plenty of storage for the data.

The infrastructure also needs to offer a host environment that can evolve. That way it can be adaptable to the different needs of the applications. It can also meet the demands of the increased services that are available throughout the department.

The computing infrastructure needs to be consolidated so that it I can offer the best possible extension. The resources will be the most efficient when they can be used both regionally and globally.

The platform for computing needs to have an independent locations. This will provide real time allocation for all of the shared resources. This infrastructure is responsible for supporting the needs and requirements of the edge environment. This doesn’t stop due to connectivity or a limited amount of bandwidth.

The implementation of the computing infrastructure needs to offer transparent interfaces. This will allow the users to always get top performance and a high quality of service. These abilities need to be agile so that they can continue to respond even when the demands for the computing increase.

With shared computing and data storage there are resources that have to be accessible for the virtual management and control with the GIG to occur. The GIG computing infrastructure needs to be certified and accredited by designated authorities.

There are some basic rules an principles that need to be covered. They will offer guidance for the department so that the environment can support net centric implementation of the applications and services for IT. Then it can meet the needs of the edge.

Next >> Department Of Defense SharePoint Architecture Guide (DSAG) Part 11 Communication Readiness