Click here
      Home    DAG Tutorial    Search    Available Downloads     Feedback
 
The DAG does not reflect the changes in the DoDI5000.02. Work is in progress to update the content and will be completed as soon as possible.
 
.

7.1. Introduction

Topic
Previous Page Next Page

Previous and Next Page arrows

DEFENSE ACQUISITION GUIDEBOOK
Chapter 7 - Acquiring Information Technology

7.1. Introduction

7.1. Introduction

The DoD Transformation Planning Guidance (April 2003) defines the desired outcome of transformation as "fundamentally joint, network-centric, distributed forces capable of rapid decision superiority and massed effects across the battle space." The goal of this chapter is to help PMs and Sponsors/Domain Owners implement the DoD policies that are intended to achieve this outcome. This introduction briefly explains net-centricity in context of the requirements outlined in the various other sections of this chapter.

Net-centric information sharing is "the realization of a robust, globally networked environment (interconnecting infrastructure, systems, processes, and people) within which data is shared seamlessly and in a timely manner among users, applications, and platforms. By securely interconnecting people and systems, independent of time or location, net-centricity enables substantially improved military situational awareness and significantly shortened decision making cycles. Users are empowered to better protect assets; more effectively exploit information; more efficiently use resources; and unify our forces by supporting extended, collaborative communities to focus on the mission."

The Department's approach for transitioning to net-centric operations and warfare and achieving the net-centric information sharing vision focuses on five key areas where increased attention and investment will bring the most immediate progress towards realizing net-centric goals:

  • Data and Services Deployment
  • Secured Availability
  • Computing Infrastructure Readiness
  • Communications Readiness
  • NetOps Agility

This approach uses the Information Enterprise (IE) as "the organizing and transforming construct for managing information technology throughout the Department." It envisions moving to trusted network-centric operations through the acquisition of services and systems that are secure, reliable, interoperable, and able to communicate across a universal Information Technology infrastructure, including NSS. This Information Technology infrastructure includes data, information, processes, organizational interactions, skills, and analytical expertise, as well as systems, networks, and information exchange capabilities. The rest of this chapter describes the concepts, topics, and activities to achieve this transformation.

Previous and Next Page arrows

List of All Contributions at This Location

No items found.

Popular Tags