Program Management

PROGRAM MANAGEMENT

Following Project Management Institute principles Pax Advisory's PMP certified consultants can support iterative, scalable process advice or implementation with experience in solution configuration and architecture for IT hardware and software lifecycles.

IT PROJECT LIFECYCLE

Project Managers can tailor processes the project lifecycle that fits the objectives by strategic goal setting through:

  • Analysis, interpretation and communicate IT services, program metrics, and system life-cycle management.

  • Clear and concise project scope statements, statements of work, responses for information/proposal, and other business documents.

  • In-depth understanding of organizational processes, information requirements, and enterprise applications needs of a Federal and DOD agencies that are nationally, and globally dispersed.

  • Strong interpersonal, customer service, and problem-solving skills.

  • Articulation and translation of technical concepts to a non-technical audience.

  • Demonstrated ability to exercise sound judgment related to controversial and/or culturally sensitive subjects. Ability to handle confidential information with tact and poise.

  • Initiative, self-motivation, and attention to detail with the ability to manage multiple projects with competing priorities.

  • Adaptability to changing organizational needs.

  • Collaboration with clients and technology partners to achieve desired results.

METHODS

Pax Advisory help your organization reach your goals by creating a series of management plans by objectives utilizing progressive elaboration. Proactively manage and guide using milestones & other project controls. We work with change control boards to control the impacts of scope change. Sometimes corrective action is necessary to repair plan defects. We measure performance against performance measurement baselines. It is essential to establish integrated change control. We can work to facilitate the resolution of conflicting objectives. We will guide you through plan initiation, stakeholder communication, scope development, and execution of projects.

IT PROGRAM LIFECYCLE SUPPORT

Pax Advisory Project Management Office effectively manage the lifecycle of your hardware and software assets. Capture your software inventory – Quickly find the software installed on your network and match it to what has been purchased and actually used. Make informed business decisions on software assets when you have all the right information.

Pax Advisory can identify and track your hardware inventory – Find and monitor hardware details on Windows and Mac OS desktops and servers. You can also do this with all other IT assets, including mobile devices, printers and routers or switches. Manage the entire lifecycle of assets with reports and alerts that notify you when they need to be replaced, upgraded or are close to the end of their warranty or lease periods.

Assist your support team and track purchases – With Pax Advisory, you can reconcile IT assets against purchase contracts. This solution allows you to also assign assets to users, departments or locations. Provide the help desk with valuable hardware and software for fast troubleshooting and quicker responsiveness.

DOD IT REFERENCES

8.1 Department of Defense Global Information Grid Architecture Architectural Vision

6/1/2007

ADA484389

8.2 Army Information Architecture Version 4.1

6/5/2013

ArmyInformationArchitecturev4-1dtd2013-06-05

8.3 DoD Information Enterprise Architecture (Version 2.0)

7/1/2012

DoD IEA v2.0_Volume I_Description Document_Final_20120730

8.4 DoD Directive 8320.02, "Data Sharing in a Net-Centric Department of Defense

12/2/2004

832002p

8.5 The Department of Defense Architecture Framework (DoDAF) version 2.02

3/1/2011

DoDAF_v2-02_web

8.6 The Clinger-Cohen Act (Chapter 25 of title 40, United States Code) see

Title 40

8.7 OMB Circular A-130 Revised, "Management of Federal Information Resources, Transmittal 4

11/28/2000

CJCSI_3170_01I

8.8 CJCSM 3170.01H: Joint Capabilities Integration and Development System

Net-Centric-Data-Strategy-2003-05-092

8.9 Department of Defense Net-Centric Data Strategy

5/9/2003

http://dodcio.defense.gov/Portals/0/Documents/DIEA/Net-Centric-Data-Strategy-2003-05- 092.pdf

8.10 OASD(NII), Net-Centric Checklist, Version 2.1.3

5/1/2004

NetCentric_Checklist_v2-1-3_

8.11 Joint Net-Centric Operations (JNO) Capability Portfolio Management (CPM), Business Plan Version 1.0

4/16/2007

JNO Business Plan Version 1 April 2007 (2)

9. Unified Capabilities and IPv6

9.1 Internet Protocol version 6 (IPv6) for the GSCR

1_7ipv6_approved6089r6104

9.2 Unified Capabilities Approved Product List Process

UCAPL_Process

9.3 Unified Capabilities Approved Product List – DISA

9.4 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6) Definitions

6/26/2008

dod-ipv6-definitions-memo-bw-rev

9.5 OMB Memorandum M-05-22, Transition Planning for Internet Protocol Version 6 (IPv6)

8/2/2005

m05-22

9.6 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6) Interim Transition Guidance

9/29/2003

http://www.hpc.mil/images/hpcdocs/ipv6/dod_cio_september_23_policy_ltr.pdf

9.7 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6)

6/9/2003

http://www.defense.gov/news/Jun2003/d20030609nii.pdf

9.8 Federal Register / Vol. 74, No. 236 / Rules and Regulations

12/10/2009

E9-28928

10. Collaboration Tools

10.1 Department of Defense (DOD) Collaboration Policy Update

12/21/2005

2007_03_07_the_smart_card_update

10.2 Collaboration products certified for use on DoD SIPRNet Networks

NIST.FIPS.201-2

10.3 DCTS CMO Product Exemption List

CACRelease1ReaderSpecificationv1Specification

11. Smart Cards

11.1 Army CAC/PKI Program Card Reader Specifications, Rev.

3/7/2007

DoD_Suppliers_Passive_RFID_Info_Guide_v15update

11.2 Personal Identity Verification (PIV) of Federal Employees and Contractors, FIPS Pub 201-1,

3/1/2006

mil-std-129pch4

11.3 Access Card Office (ACO); Common Access Card (CAC) Release 1.0 Reader Specifications, Version 1.0

9/25/2000

RF_Tag_Data_Specification_V2

11.4 Government Smart Card Interoperability Specification. Version 2.1

7/16/2003

uid_signed_policy_memo_2003.07.29

12. Radio Frequency Identification (RFID)

12.1 DOD 4140.1-R DOD Supply Chain Materiel Management Regulation

5/23/2003

p41401r

12.2 Department of Defense Standard Practice - Military Marking For Shipment and Storage (MIL-STD-129P w/CHANGE 4) 19

9/19/2007

http://www.acq.osd.mil/log/sci/ait/mil-std-129pch4.pdf

12.3 RF-Tag Format (Version 2.0)

5/10/2002

http://www.ndia.org/Divisions/Divisions/Logistics/Documents/Content/ContentGroups/Division s1/Logistics/4RF_Tag_Data_Specification_V2.pdf

12.4 Policy for Unique Identification (UID) of Tangible Items – New Equipment, Major Modifications, and Reprocurements of Equipment and Spares

7/29/2003

http://www.acq.osd.mil/dpap/UID/uid_signed_policy_memo_2003.07.29.pdf

12.5 Update to Policy For Unique Identification (UID) of Tangible Items – New Equipment, Major Modifications, and Reprocurements of Equipment and Spare

9/3/2004

http://www.acq.osd.mil/dpap/Docs/uid/Sep.%203%20UID%20%20Policy%20Update.pdf

12.6 Policy For Unique Identification (UID) of Tangible Personnel Property Legacy Items in Inventory and Operational Use, Including Government Furnished Property (GFP)

12/23/2004

http://www.acq.osd.mil/dpap/Docs/uid/UID%20Policy%20Update%20Legacy%20Items% 2012-23-2004.pdf

12.7 Department of Defense Guide to Uniquely Identifying Items (Version 1.4)

4/16/2004

http://www.acq.osd.mil/dpap/Docs/uid/guide_1_4.pdf

12.8 Department of Defense Standard Practice – Identification Marking of US Military Property (MIL-STD-130L)

12/20/2004

http://www.acq.osd.mil/dpap/Docs/uid/MIL-STD-130L%20Change1.pdf

12.9 Unique Identification 101 – The Basics

11/1/2004

http://www.acq.osd.mil/dpap/Docs/uid/UID 101.pdf

12.10 Passive RFID DFARS Clause 252.211-7006

http://www.acq.osd.mil/dpap/dars/dfars/html/current/252211.htm#252.211-7006

12.11 DOD Supplier's Passive RFID Information Guide, Version 15.0

http://www.acq.osd.mil/log/sci/ait/DoD_Suppliers_Passive_RFID_Info_Guide_v15update.pdf

12.12 Radio Frequency Identification (RFID) Policy

7/30/2004

https://acc.dau.mil/adl/en-US/142796/file/27748/RFIDPolicy07-30-2004.pdf

13. Logistics

13.1 DoD 4140.1-R DoD Supply Chain Materiel Management Regulation

5/23/2003

NIST SP800-58-final

13.2 Deputy Under Secretary of Defense (Logistics and Materiel Readiness) Logistics Enterprise Integration and Transformation

11/1/2001

http://www.acq.osd.mil/log/logistics_materiel_readiness/organizations/lsm/assetts/feb_02_i nformation/ei_info/Ent%20Integ%20and%20Transformation%20Dec%2001.doc

14. Voice Over IP (VOIP)

14.1 Security Considerations for Voice Over IP Systems, Special Publication 800-58

1/1/2005

DoDD 810002p

14.2 DISA Memo, Voice Video over Internet Protocol (VVoIP) Security Technical Implementation Guide (STIG), Version 3

12/23/2009

fips140-2

14.3 Voice and Video over Internet Protocol (VVoIP) Security Technical Implementation Guide (STIG), Version 3 Release 3

4/15/2014

http://iase.disa.mil/stigs/Documents/u_vvoip_v3r3_stig.zip

15. Wireless

15.1 Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense (DoD) Global Information Grid (GIG) (DoD Directive 8100.2)

4/23/2007

http://www.dtic.mil/whs/directives/corres/pdf/810002p.pdf

15.2 Security Requirements for Cryptographic Modules (FIPS PUB 140-2)

5/25/2001

http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf

15.3 FIPS 140-1 and FIPS 140-2 Cryptographic Modules Validation List

3/10/2009

http://csrc.nist.gov/groups/STM/cmvp/

15.4 Wireless - Security Technical Implementation Guide (Version 6, Release 8)

7/25/2014

http://iase.disa.mil/stigs/Documents/u_wireless_v6r8_stig.zip

15.5 Information Assurance Best Business Practice, Wireless Security Standards, Version 4 (09- EC-M-0010)

6/26/2013

https://bop.peostri.army.mil/sites/bop/Lists/Request%20for%20Proposals/Attachments/67/ Attachment%209%20-%20DA%2009-EC-M- 0010%20IA%20Best%20Business%20Practice%20on%20Wireless%20Security%20Stand ards%2003282014.pdf

16. Section 508

16.1 Section 508

http://www.section508.gov

16.2 Workforce Investment Act of 1998, Section 508 – Electronic and Information Technology

12/21/2000

Energy Star 6.0 Computers Program Requirements (Rev. Oct-2013)

16.3 Guide to the Section 508 Standards for Electronic and Information Technology:

Software Applications and Operating Systems (1194.21)

Web-based Intranet and Internet Information and Applications (1194.22)

Telecommuications Products (1194.23)

Video and Multimedia Products (1194.24)

Self Contained, Closed Products (1194.25)

Desktop and Portable Computers (1194.26)

17. Energy Star and Electronic Product Environmental Assessment Tool (EPEAT)

17.1 Executive Order 13221, Energy-Efficient Standby Power Devices

7/31/2001

Desktop Management Interface Specification DSP0005

17.2 ENERGY STAR Program Requirements for Computers Partner Commitments and ENERGY STAR Program Requirements Product Specification for Computers Eligibility Criteria Version 6.0 Rev. Oct-2013

6/2/2014

http://www.energystar.gov/sites/default/files/specs//Final%20Version%206.0%20Computer s%20Program%20Requirements%20(Rev.%20Oct-2013).pdf

17.3 Computer – Key Product Criteria

http://www.energystar.gov/index.cfm?c=computers.pr_crit_computers

CFR-2009-title47-vol1-part15

17.4 Imaging Equipment

http://www.energystar.gov/products/certified-products/detail/imaging-equipment

17.5 Computers

http://www.energystar.gov/products/certified-products/detail/computers

17.6 Displays

http://www.energystar.gov/products/certified-products/detail/displays

17.7 Data Center Energy Efficiency Initiatives

http://www.energystar.gov/index.cfm?c=prod_development.server_efficiency

17.8 Enterprise Server Key Product Criteria

http://www.energystar.gov/index.cfm?c=ent_servers.pr_crit_enterprise_servers

17.9 Electronic Product Environmental Assessment Tool (EPEAT)

http://www.epeat.net/

17.10 Executive Order 13423, Strengthening Federal Environmental, Energy, and Transportation Management

1/24/2007

http://www.gsa.gov/portal/content/102452

17.11 Federal Acquisition Regulation; FAR Case 2006–030, Electronic Products Environmental Assessment Tool. Federal Register / Vol. 74, No. 10 / Thursday, January 15, 2009 / Rules and Regulations (EPEAT)

http://www.epa.gov/oppt/epp/pubs/guidance/fr74no10.pdf

18. Other Regulatory and Commercial Requirements

18.1 Distributed Management Task Force Desktop Management Interface Specification (DMI Version 2.0.1s)

851001_2014

National Industry Security Program Operating Manual

18.2 Trusted Computing Group, Trusted Platform Module (TPM v1.2)

https://www.trustedcomputinggroup.org/developers/trusted_platform_module/specifications

18.3 FCC Part 15 Class B

http://www.gpo.gov/fdsys/pkg/CFR-2009-title47-vol1/pdf/CFR-2009- title47-vol1-part15.pdf

18.4 Electromagnetic Compatibility (EMC) Directive 89/336/EEC

http://www.conformance.co.uk/directives/ce_emc.php

19. System Security

19.1 Security requirements that shall be accomplished by the Contractor will be per the DoD Information Assurance Certification and Accreditation Process (DIACAP) DoD Instruction 8510.01

3/12/2014

The Contractor shall transmit and deliver any classified material/reports IAW the National Industrial Security Program Operations Manual (NISPOM) and the Industrial Security Regulation (DoD 5220.22-R). Individual system security requirements shall be accomplished as specified in the Task/Delivery Order.

National Industrial Security Program Operations Manual (NISPOM)

DoD 5220.22-R

C- Industrial Security Regulation