Program Management
PROGRAM MANAGEMENT
Following Project Management Institute principles Pax Advisory's PMP certified consultants can support iterative, scalable process advice or implementation with experience in solution configuration and architecture for IT hardware and software lifecycles.
IT PROJECT LIFECYCLE
Project Managers can tailor processes the project lifecycle that fits the objectives by strategic goal setting through:
Analysis, interpretation and communicate IT services, program metrics, and system life-cycle management.
Clear and concise project scope statements, statements of work, responses for information/proposal, and other business documents.
In-depth understanding of organizational processes, information requirements, and enterprise applications needs of a Federal and DOD agencies that are nationally, and globally dispersed.
Strong interpersonal, customer service, and problem-solving skills.
Articulation and translation of technical concepts to a non-technical audience.
Demonstrated ability to exercise sound judgment related to controversial and/or culturally sensitive subjects. Ability to handle confidential information with tact and poise.
Initiative, self-motivation, and attention to detail with the ability to manage multiple projects with competing priorities.
Adaptability to changing organizational needs.
Collaboration with clients and technology partners to achieve desired results.
METHODS
Pax Advisory help your organization reach your goals by creating a series of management plans by objectives utilizing progressive elaboration. Proactively manage and guide using milestones & other project controls. We work with change control boards to control the impacts of scope change. Sometimes corrective action is necessary to repair plan defects. We measure performance against performance measurement baselines. It is essential to establish integrated change control. We can work to facilitate the resolution of conflicting objectives. We will guide you through plan initiation, stakeholder communication, scope development, and execution of projects.
IT PROGRAM LIFECYCLE SUPPORT
Pax Advisory Project Management Office effectively manage the lifecycle of your hardware and software assets. Capture your software inventory – Quickly find the software installed on your network and match it to what has been purchased and actually used. Make informed business decisions on software assets when you have all the right information.
Pax Advisory can identify and track your hardware inventory – Find and monitor hardware details on Windows and Mac OS desktops and servers. You can also do this with all other IT assets, including mobile devices, printers and routers or switches. Manage the entire lifecycle of assets with reports and alerts that notify you when they need to be replaced, upgraded or are close to the end of their warranty or lease periods.
Assist your support team and track purchases – With Pax Advisory, you can reconcile IT assets against purchase contracts. This solution allows you to also assign assets to users, departments or locations. Provide the help desk with valuable hardware and software for fast troubleshooting and quicker responsiveness.
DOD IT REFERENCES
8.1 Department of Defense Global Information Grid Architecture Architectural Vision
6/1/2007
8.2 Army Information Architecture Version 4.1
6/5/2013
ArmyInformationArchitecturev4-1dtd2013-06-05
8.3 DoD Information Enterprise Architecture (Version 2.0)
7/1/2012
DoD IEA v2.0_Volume I_Description Document_Final_20120730
8.4 DoD Directive 8320.02, "Data Sharing in a Net-Centric Department of Defense
12/2/2004
8.5 The Department of Defense Architecture Framework (DoDAF) version 2.02
3/1/2011
8.6 The Clinger-Cohen Act (Chapter 25 of title 40, United States Code) see
8.7 OMB Circular A-130 Revised, "Management of Federal Information Resources, Transmittal 4
11/28/2000
8.8 CJCSM 3170.01H: Joint Capabilities Integration and Development System
Net-Centric-Data-Strategy-2003-05-092
8.9 Department of Defense Net-Centric Data Strategy
5/9/2003
http://dodcio.defense.gov/Portals/0/Documents/DIEA/Net-Centric-Data-Strategy-2003-05- 092.pdf
8.10 OASD(NII), Net-Centric Checklist, Version 2.1.3
5/1/2004
8.11 Joint Net-Centric Operations (JNO) Capability Portfolio Management (CPM), Business Plan Version 1.0
4/16/2007
JNO Business Plan Version 1 April 2007 (2)
9. Unified Capabilities and IPv6
9.1 Internet Protocol version 6 (IPv6) for the GSCR
9.2 Unified Capabilities Approved Product List Process
9.3 Unified Capabilities Approved Product List – DISA
9.4 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6) Definitions
6/26/2008
dod-ipv6-definitions-memo-bw-rev
9.5 OMB Memorandum M-05-22, Transition Planning for Internet Protocol Version 6 (IPv6)
8/2/2005
9.6 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6) Interim Transition Guidance
9/29/2003
http://www.hpc.mil/images/hpcdocs/ipv6/dod_cio_september_23_policy_ltr.pdf
9.7 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6)
6/9/2003
http://www.defense.gov/news/Jun2003/d20030609nii.pdf
9.8 Federal Register / Vol. 74, No. 236 / Rules and Regulations
12/10/2009
10. Collaboration Tools
10.1 Department of Defense (DOD) Collaboration Policy Update
12/21/2005
2007_03_07_the_smart_card_update
10.2 Collaboration products certified for use on DoD SIPRNet Networks
10.3 DCTS CMO Product Exemption List
CACRelease1ReaderSpecificationv1Specification
11. Smart Cards
11.1 Army CAC/PKI Program Card Reader Specifications, Rev.
3/7/2007
DoD_Suppliers_Passive_RFID_Info_Guide_v15update
11.2 Personal Identity Verification (PIV) of Federal Employees and Contractors, FIPS Pub 201-1,
3/1/2006
11.3 Access Card Office (ACO); Common Access Card (CAC) Release 1.0 Reader Specifications, Version 1.0
9/25/2000
11.4 Government Smart Card Interoperability Specification. Version 2.1
7/16/2003
uid_signed_policy_memo_2003.07.29
12. Radio Frequency Identification (RFID)
12.1 DOD 4140.1-R DOD Supply Chain Materiel Management Regulation
5/23/2003
12.2 Department of Defense Standard Practice - Military Marking For Shipment and Storage (MIL-STD-129P w/CHANGE 4) 19
9/19/2007
http://www.acq.osd.mil/log/sci/ait/mil-std-129pch4.pdf
12.3 RF-Tag Format (Version 2.0)
5/10/2002
12.4 Policy for Unique Identification (UID) of Tangible Items – New Equipment, Major Modifications, and Reprocurements of Equipment and Spares
7/29/2003
http://www.acq.osd.mil/dpap/UID/uid_signed_policy_memo_2003.07.29.pdf
12.5 Update to Policy For Unique Identification (UID) of Tangible Items – New Equipment, Major Modifications, and Reprocurements of Equipment and Spare
9/3/2004
http://www.acq.osd.mil/dpap/Docs/uid/Sep.%203%20UID%20%20Policy%20Update.pdf
12.6 Policy For Unique Identification (UID) of Tangible Personnel Property Legacy Items in Inventory and Operational Use, Including Government Furnished Property (GFP)
12/23/2004
http://www.acq.osd.mil/dpap/Docs/uid/UID%20Policy%20Update%20Legacy%20Items% 2012-23-2004.pdf
12.7 Department of Defense Guide to Uniquely Identifying Items (Version 1.4)
4/16/2004
http://www.acq.osd.mil/dpap/Docs/uid/guide_1_4.pdf
12.8 Department of Defense Standard Practice – Identification Marking of US Military Property (MIL-STD-130L)
12/20/2004
http://www.acq.osd.mil/dpap/Docs/uid/MIL-STD-130L%20Change1.pdf
12.9 Unique Identification 101 – The Basics
11/1/2004
http://www.acq.osd.mil/dpap/Docs/uid/UID 101.pdf
12.10 Passive RFID DFARS Clause 252.211-7006
http://www.acq.osd.mil/dpap/dars/dfars/html/current/252211.htm#252.211-7006
12.11 DOD Supplier's Passive RFID Information Guide, Version 15.0
http://www.acq.osd.mil/log/sci/ait/DoD_Suppliers_Passive_RFID_Info_Guide_v15update.pdf
12.12 Radio Frequency Identification (RFID) Policy
7/30/2004
https://acc.dau.mil/adl/en-US/142796/file/27748/RFIDPolicy07-30-2004.pdf
13. Logistics
13.1 DoD 4140.1-R DoD Supply Chain Materiel Management Regulation
5/23/2003
13.2 Deputy Under Secretary of Defense (Logistics and Materiel Readiness) Logistics Enterprise Integration and Transformation
11/1/2001
14. Voice Over IP (VOIP)
14.1 Security Considerations for Voice Over IP Systems, Special Publication 800-58
1/1/2005
14.2 DISA Memo, Voice Video over Internet Protocol (VVoIP) Security Technical Implementation Guide (STIG), Version 3
12/23/2009
14.3 Voice and Video over Internet Protocol (VVoIP) Security Technical Implementation Guide (STIG), Version 3 Release 3
4/15/2014
http://iase.disa.mil/stigs/Documents/u_vvoip_v3r3_stig.zip
15. Wireless
15.1 Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense (DoD) Global Information Grid (GIG) (DoD Directive 8100.2)
4/23/2007
http://www.dtic.mil/whs/directives/corres/pdf/810002p.pdf
15.2 Security Requirements for Cryptographic Modules (FIPS PUB 140-2)
5/25/2001
http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
15.3 FIPS 140-1 and FIPS 140-2 Cryptographic Modules Validation List
3/10/2009
http://csrc.nist.gov/groups/STM/cmvp/
15.4 Wireless - Security Technical Implementation Guide (Version 6, Release 8)
7/25/2014
http://iase.disa.mil/stigs/Documents/u_wireless_v6r8_stig.zip
15.5 Information Assurance Best Business Practice, Wireless Security Standards, Version 4 (09- EC-M-0010)
6/26/2013
16. Section 508
16.1 Section 508
16.2 Workforce Investment Act of 1998, Section 508 – Electronic and Information Technology
12/21/2000
Energy Star 6.0 Computers Program Requirements (Rev. Oct-2013)
16.3 Guide to the Section 508 Standards for Electronic and Information Technology:
Software Applications and Operating Systems (1194.21)
Web-based Intranet and Internet Information and Applications (1194.22)
Telecommuications Products (1194.23)
Video and Multimedia Products (1194.24)
Self Contained, Closed Products (1194.25)
Desktop and Portable Computers (1194.26)
17. Energy Star and Electronic Product Environmental Assessment Tool (EPEAT)
17.1 Executive Order 13221, Energy-Efficient Standby Power Devices
7/31/2001
Desktop Management Interface Specification DSP0005
17.2 ENERGY STAR Program Requirements for Computers Partner Commitments and ENERGY STAR Program Requirements Product Specification for Computers Eligibility Criteria Version 6.0 Rev. Oct-2013
6/2/2014
17.3 Computer – Key Product Criteria
http://www.energystar.gov/index.cfm?c=computers.pr_crit_computers
17.4 Imaging Equipment
http://www.energystar.gov/products/certified-products/detail/imaging-equipment
17.5 Computers
http://www.energystar.gov/products/certified-products/detail/computers
17.6 Displays
http://www.energystar.gov/products/certified-products/detail/displays
17.7 Data Center Energy Efficiency Initiatives
http://www.energystar.gov/index.cfm?c=prod_development.server_efficiency
17.8 Enterprise Server Key Product Criteria
http://www.energystar.gov/index.cfm?c=ent_servers.pr_crit_enterprise_servers
17.9 Electronic Product Environmental Assessment Tool (EPEAT)
17.10 Executive Order 13423, Strengthening Federal Environmental, Energy, and Transportation Management
1/24/2007
http://www.gsa.gov/portal/content/102452
17.11 Federal Acquisition Regulation; FAR Case 2006–030, Electronic Products Environmental Assessment Tool. Federal Register / Vol. 74, No. 10 / Thursday, January 15, 2009 / Rules and Regulations (EPEAT)
http://www.epa.gov/oppt/epp/pubs/guidance/fr74no10.pdf
18. Other Regulatory and Commercial Requirements
18.1 Distributed Management Task Force Desktop Management Interface Specification (DMI Version 2.0.1s)
National Industry Security Program Operating Manual
18.2 Trusted Computing Group, Trusted Platform Module (TPM v1.2)
https://www.trustedcomputinggroup.org/developers/trusted_platform_module/specifications
18.3 FCC Part 15 Class B
http://www.gpo.gov/fdsys/pkg/CFR-2009-title47-vol1/pdf/CFR-2009- title47-vol1-part15.pdf
18.4 Electromagnetic Compatibility (EMC) Directive 89/336/EEC
http://www.conformance.co.uk/directives/ce_emc.php
19. System Security
19.1 Security requirements that shall be accomplished by the Contractor will be per the DoD Information Assurance Certification and Accreditation Process (DIACAP) DoD Instruction 8510.01
3/12/2014
The Contractor shall transmit and deliver any classified material/reports IAW the National Industrial Security Program Operations Manual (NISPOM) and the Industrial Security Regulation (DoD 5220.22-R). Individual system security requirements shall be accomplished as specified in the Task/Delivery Order.
National Industrial Security Program Operations Manual (NISPOM)