Department Of Defense SharePoint Architecture Guide (DSAG) Part 13 Understanding How DIEA Will Evolve

The principles of the DIEA is focused on making a baseline for the framework of the rules that define and guide the Department of Defense. The core of the product is the architecture. This includes the role of the Defense Information Enterprise, the DIEA for the context of the enterprise, and the core principles of the rules that guide all of the investments. All of this information can be downloaded for review from http://www.defenselink.mil/cio-nii/cio/diea.

Even though the DIEA 1.0 offers a very strong start, it is only the beginning rather than being complete. The world of IT is one that continues to evolve so it is going to be a work in progress from day one. There are three questions that need to be answered for the enterprise architecture so that proper guidance can be established. Those questions are:

What do we need to do?

How do we need to operate?

When will we make the transition?

To answer the first two questions, a foundation has to be established with the principles and rules for the enterprise to follow. The concepts need to be embedded into the Department of Defense so that the transformation can occur. The department has to have a plan for the transition to be in place so that the guidance will make it a process that flows well.

The future releases won’t offer an increase in the number of architecture products. What will happen in the future is that the current ones will be refined and offer additional operational view such as in the areas of process models. This will help with identifying specific problems within the Department of Defense.

There are some types of views that you aren’t ever going to see in the DIEA though. One of them is the logical data models and systems that are inconsistent with the Department of Defense data and services strategies. The overall concept of the net centric system is for information sharing. The architecture products aren’t going to help with the area of various challenges such as when there is a transition in place from the current environment.

The rules and principles that are outlined in the DIEA 1.0 are very important to follow. They offer a decision making process for the Department of Defense. The goal will result in speeding up the evolution of the net centric information sharing. The key focus is for the rules and principles to be an embedded part of the process. There are plenty of steps in motion though to get this to happen. The department is taking the time to:

Focus attention on the supporting decision makers for the department. This is done with the DIEA as a type of tool for guiding and maintaining the IT investments that they have to be responsible for.

Speeding up the evolution of the approach to solving the data and services issues is being addressed by the department.

The issues that relate to the funding for the enterprise service and models continue to be explored.

The Department of Defense is working to merge the architecture guidance with the net centric operations. There is a checklist being reviewed with the DIEA. The merge is next release of the DIEA will offer a framework that is very powerful when it comes to the concerns of architecture guidance.

The DIEA compliance guidelines in place will be published so that the issues of compliance can be viewed. The goals of the net centric operations will then have the solid commitment throughout the various layers that make of the Department of Defense. The DIEA 1.0 is a very important tool for the department to be able to achieve that goal.

Share

Department Of Defense SharePoint Architecture Guide (DSAG) Part 8 Shared Computing Infrastructure

There are a variety of rules and principles that have to be established so that the IT investment allows for a program that will have the best security available according to the DIEA 1.0 structure. The information assurance process must be designed and ready for operations. It all needs to work rapidly too so that there are changes that can be implemented without it harming the flow of the resources that are part of that configuration.

Through the Department of Defense programs there is the demonstration of the network and the data it offers. The applications and setting have to be controlled so that the functions will all be enabled. They also have to be validated through the security system and engineering process.

These programs also work to ensure that the changes necessary to the configuration of the network or applications can be automated in many areas. That helps to streamline the implementation of the GIG configuration process. The global mission and dispersement allows the global network to reach the right operations so that there is a line of defense for the information process.

The various Department of Defense series that are in place have to offer both sharing and transferring of the various information. It has to be able to span over many levels of security. They also have to be centralized when it comes to the planning and coordination of the various levels.

Being able to digitally identify the different users and devices is important. They have to be authenticated so that the security can be enforced according to the controls and rules of quality that are in place. The protection of the organization has to be part of the controls of these devices.

With the metadata in place there is control over the attributes of the information. This also allows for top quality information to be part of the decisions within the DIEA 1.0.
With a shared infrastructure the resources have to be available for the needs and demands of all the missions and their requirements. There has to be a way for them to support the monitoring and the management of the GIG. The infrastructure needs the ability to design and to operate the many components. This also includes for disaster recovery in the event that there are any types of attacks or failures. Some of them can be man made and others can be natural but all need to be supported.

The capabilities of the infrastructure have to be able to survive. They can’t be lost due to some type of disaster recovery program. It needs to be able to connect to all of the different users that have been authorized. It also needs to be changed and managed to continue to meet expectations of any user.

The Computing Infrastructure Readiness, Communications Readiness, and the NetOps Agility all need to be part of the Department of Defense infrastructure environment. They all need to represent the hardware layers of the GIG. At the same time the management and operation facilities need to be able to deploy those resources to any locations. That means the resources are able to be used in critical applications and for services that involve different tactical environments.

The entire network can be deployed with a range of different capabilities so that they support the operations. There are challenges here that require a very detailed infrastructure. It has to be modular and it has to be secure so that it can work well in a variety of different environments that are located within that infrastructure.

Computing Infrastructure Readiness is referred to as CIR. For the Department of Defense the net centric vision requirements are so that it can all be trusted. The information is art of the enterprise asset and it is ready to be accessed with the various needs that have been identified. It is also ready for the unanticipated needs when new circumstances occur.

That environment is one that is often dedicated for the hardware of a given application. The information has to be tied to that particular application within the operating system. The goal is for efficient utilization of the resources of the hardware and the software to be dynamic in terms of how it is used.

The option for future growth needs to be there with a contingency plan in place. The department will move down the path for the net centric operations with that infrastructure serving as the underlying foundation. The core applications and services have to be part of it so that it won’t be just pieces of technology found here and there.

With the net centric leverage in place the GIG will be responsible for distributing the resources for computing. As a result the users of the applications will have shared computing information and access to all of the data that has been stored as long as they are authorized as a user on that level.

The ideals of virtualization in terms of how the users will view the infrastructure is important. The Department of Defense has to reduce the technical and administrative barriers that pertain to shared resources. The goal is to offer a support of information that can be shared across the GIG.

The evolution of the computing infrastructure helps to offer more support for the net centric operation. It has to look at the fact though that there are many users around the edges of the mission. They need to be able to take on the agile environment and its computations. This all has to be done so that users on the support end can adhere to various challenges including not enough bandwidth.

The priority is to make sure all of these challenges within the department are able to be cared for. That where there are levels guaranteed to offer certain capabilities to the consumers. This is all in regards to the data and services offered in the department. The need for a dynamic infrastructure that is shared, adaptable, and very sufficient in the area of support for a global net centric operation can happen.

Next >> Department Of Defense SharePoint Architecture Guide (DSAG) Part 9 Net Centric Computing Infrastructures

Share