Tutorial 1: SADIE Architecture Environment (Navy)
Overview of SADIE functionality and capabilities.
This tutorial will demonstrate how DoD program managers and architects can utilize a web-based Cloud Environment called the SYSCOM Architecture Development & Integration Environment (SADIE) to build architectural products and workflow interoperability interfaces between different tool sets. SADIE provides a web-enabled, secure (PKI-enabled CAC(Common Access Card)), single point of access to enterprise architecture applications and information on demand. It includes a robust suite of DoD Architecture Framework (DoDAF) compliant tools that support the shared development of operational, system or technical artifacts.
Tutorial 2: Federated Architecture & DM2 Compliant Web Services (JFCOM)
This tutorial covers work being done by Joint Architecture Federation and Integration Project to support discovery, accessibility, and reuse of DoDAF architecture data using DM2 compliant web services. The tutorial will cover project management, collaborative development, business processes involved, data structure and normalization, configuration management, federation governance, and web service development using JAVA based REST and .NET services.
Tutorial 3: Architecture Analysis Demo
High level (Tier I) Joint Mission Thread development is being managed by US Joint Forces Command. These Service and COCOM validated threads provide the baseline architecture for the way DoD conducts business. Participants will receive a presentation on JMT Tier I composition and configuration management. Examples of Tier II and Tier III products will be provided, supporting testing and certification on interoperable solutions across the Services. A roadmap will be presented describing how JMTs are supportive of mission-based acquisition, testing, certification, and requirements processes. The workshop will include a demonstration of current and future portal access to JMT Tier I-III data.
Tutorial 4: Data Strategy for C2 Capabilities: The C2 Core and Authoritative Data Source Management (JFCOM)
There are two distinct but related topics within one tutorial. The first topic is the Enterprise Authoritative Data Source (EADS) Registry and C2 authoritative data sources. The second topic is the C2 Core (XML based data exchange standard) as an extension of Universal Core. The EADS portion of the tutorial will provide the current status and an orientation on the newly established Enterprise ADS Registry with a focus on the Joint C2 ADS portion including ongoing exposure verification efforts. It will describe how to review and leverage the current ADS data as well as how to make proposed additions and changes to the content. EADS directly supports the visible and accessible objectives of the Net Centric Data Strategy policy. The C2 Core portion of the tutorial will provide an overview of C2 Core and walk through the developer support tools available on C2 Core Developer Network (C2CDN). C2 Core directly supports the understandable and interoperable objectives of the N et Centric Data Strategy policy.
Tutorial 5: Selecting DoDAF 2.0 Views and Models to Use for DoDAF Projects, their Integration and Analysis.
With the introduction of DoDAF 2.0 many are struggling with how to utilize the new materials. Many are confused about guidance on what models to use to what purpose, and what the various views look like as deliverables. This tutorial addresses these concerns by presenting how one plans for an EA project in the context of 2.0, selects appropriate views and models and develops a viable statement of work to be done.
The concepts presented here are further developed in the FEAC DoDAF 2.0 Certification Program.
Outline:
- High-level overview the 2.0 Structure and changes from 1.5
- Review of each of the 2.0 viewpoints and associated models
- The use of the 6-step process in the context o 2.0
- How to develop a statement of work for 2.0 projects
- Some case study examples
- An exercise in choosing models for a 2.0 project
Tutorial 6: DARS
Participants will gain an understanding of what DARS, the DoD Architecture Registry is and how to use all of DARS main features. Briefings and demonstrations will cover how to establish and manage register, post, release, and search architectures. New user interface features and plan for future upgrades will also be presented. The DARS Team technical staff will be on hand to answer questions and collect feedback from participants that will help to shape future plans for DARS.
Tutorial 7: CADIE Architecture Environment (Army)
This tutorial covers work being done by the US Army Training and Doctrine Command, Architecture Integration and Management Division in support of the Army’s architecture community of practice. The Army Capability-based Architecture Development & Integration Environment (CADIE) provides a common environment for both architects and stakeholders to discover, develop, collaborate, use, and reuse authoritative architecture data and artifacts to support systems development, Warfighter functional integration, and organizational development and management. This tutorial will cover the basic process flow associated with the use of CADIE, the federated architecture catalog and metadata registry system, the data warehouse and application of DM2, a specialized application for linking basic DoDAF style architecture with Army Force Management (e.g. TO&E, Force Design Updates, BOI, etc.), the use of standardized web-services for push/pull of data in/out of the warehouse, and the web-based reporting services providing “fit for purpose” views of data in support of Army processes.
Tutorial 8: Architecture and Standards Registry
The Defense Information Systems Agency executes the mission of the DoD Information Technology (IT) Standardization Executive Agent. The DoD EA for IT Standards engineering responsibilities’ identify, research, and aid development and promulgation of open, commercial, and military-unique IT standards and standards profiles to meet DoD product and service needs and priorities. This tutorial track will present the various aspects of this mission including:
-
DoD IT Standards Policy and Governance process used to identify and select the best commercially available standards, develop standards implementation guidance, and designate IT standards for DoD use
-
DoD IT Standards research, development, and engineering.to identify and develop standards that address DoD Global Information Grid (GIG), Net Centric Enterprise Services, and Net Centric Warfare requirements
-
Lifecycle management for all DoD-unique IT standards and maintenance of a comprehensive baseline of standards profiles and technical implementation guidance
-
Collaborative community support tools that deliver the DoD IT Standards Registry and GIG Technical Guidance in support of DoD Architecture and Acquisition requirements
Tutorial 9: Joint Mission Thread (JMT) for Architectures and Testing Working Group (JMTAT WG)
JMTs are being developed with reusable, consistent information sets by the JFCOM J89-facilitated Joint Mission Thread Architecture and Testing Working Group (JMTAT WG), comprised of ~200 representatives from across the COCOMs, Services, Agencies, OSD, and Joint Staff. The JMTAT WG is also establishing means to manage and share standardized JMT information sets across the DoD enterprise. COCOM-validated JMTs will support DoD-wide capability development, Joint Testing and Evaluation (JT&E) and capability assessment. this session will be an actual JMTAT Working Group meeting with additional background and overview provided up front.
Tutorial 10: Enterprise Authoritive Data Source Registry (JFCOM) (Repeat of Tutorial 4)
There are two distinct but related topics within one tutorial. The first topic is the Enterprise Authoritative Data Source (EADS) Registry and C2 authoritative data sources. The second topic is the C2 Core (XML based data exchange standard) as an extension of Universal Core. The EADS portion of the tutorial will provide the current status and an orientation on the newly established Enterprise ADS Registry with a focus on the Joint C2 ADS portion including ongoing exposure verification efforts. It will describe how to review and leverage the current ADS data as well as how to make proposed additions and changes to the content. EADS directly supports the visible and accessible objectives of the Net Centric Data Strategy policy. The C2 Core portion of the tutorial will provide an overview of the C2 Core, development and implementation plans, to include: Concepts Review; Technical Analysis & Results; Ongoing Development; and Implementation examples." C2 Core directly supports the understandable and interoperable objectives of the Net Centric Data Strategy policy.
Tutorial 11: Enterprise Architecture Analytics
For participants unfamiliar with enterprise architecture, we begin with a review of the value that enterprise architecture delivers to the Department of Defense warfighter and a general overview of an enterprise architecture structure. Next, participants of all skill levels, are introduced to an overview of the application of enterprise architecture analytics with a focus on the Analytic Hierarchy Process (AHP), a technique for structuring complex or multi-criteria analysis and decision making.
The session will explore various applications of AHP within the enterprise architecture development lifecycle such as alternatives analysis, criteria ranking, and group decision making for qualitative information. In teams participants will experience the AHP utility by actively engaging in the use of an AHP automated tool, to identify, select and prioritize competencies for selecting a Chief Architect.
Tutorial 12: UPDM
The Unified Profile for DoDAF and MODAF (UPDM) is an Object Management Group (OMG) initiative to standardize how UML and UML dialects (e.g., SysML) represent both the US Department of Defense Architecture Framework (DoDAF) and the UK's Ministry of Defense Architecture Framework (MODAF) can accomplish architecture exchange. The standardization is expected to result in significant improvements in the consistency, quality, and tool interoperability of enterprise architectures that comply with these frameworks. UPDM enables an architect using one architecture tool to share that architecture with another architect using different architecture tool. This tutorial will show how details of the implementation of UPDM and demonstrate how UPDM can be used to model DoDAF compliant architectures.