Following Project Management Institute principles Pax Advisory's PMP certified consultants can support iterative, scalable process advice or implementation with experience in solution configuration and architecture for IT hardware and software lifecycles.
IT PROJECT LIFECYCLE
Project Managers can tailor processes the project lifecycle that fits the objectives by strategic goal setting through:
Analysis, interpretation and communicate IT services, program metrics, and system life-cycle management.
Clear and concise project scope statements, statements of work, responses for information/proposal, and other business documents.
In-depth understanding of organizational processes, information requirements, and enterprise applications needs of a Federal and DOD agencies that are nationally, and globally dispersed.
Strong interpersonal, customer service, and problem-solving skills.
Articulation and translation of technical concepts to a non-technical audience.
Demonstrated ability to exercise sound judgment related to controversial and/or culturally sensitive subjects. Ability to handle confidential information with tact and poise.
Initiative, self-motivation, and attention to detail with the ability to manage multiple projects with competing priorities.
Adaptability to changing organizational needs.
Collaboration with clients and technology partners to achieve desired results.
Pax Advisory help your organization reach your goals by creating a series of management plans by objectives utilizing progressive elaboration. Proactively manage and guide using milestones & other project controls. We work with change control boards to control the impacts of scope change. Sometimes corrective action is necessary to repair plan defects. We measure performance against performance measurement baselines. It is essential to establish integrated change control. We can work to facilitate the resolution of conflicting objectives. We will guide you through plan initiation, stakeholder communication, scope development, and execution of projects.
IT PROGRAM LIFECYCLE SUPPORT
Pax Advisory Project Management Office effectively manage the lifecycle of your hardware and software assets. Capture your software inventory – Quickly find the software installed on your network and match it to what has been purchased and actually used. Make informed business decisions on software assets when you have all the right information.
Pax Advisory can identify and track your hardware inventory – Find and monitor hardware details on Windows and Mac OS desktops and servers. You can also do this with all other IT assets, including mobile devices, printers and routers or switches. Manage the entire lifecycle of assets with reports and alerts that notify you when they need to be replaced, upgraded or are close to the end of their warranty or lease periods.
Assist your support team and track purchases – With Pax Advisory, you can reconcile IT assets against purchase contracts. This solution allows you to also assign assets to users, departments or locations. Provide the help desk with valuable hardware and software for fast troubleshooting and quicker responsiveness.
DOD IT REFERENCES
8.1 Department of Defense Global Information Grid Architecture Architectural Vision
8.2 Army Information Architecture Version 4.1
8.3 DoD Information Enterprise Architecture (Version 2.0)
8.4 DoD Directive 8320.02, "Data Sharing in a Net-Centric Department of Defense
8.5 The Department of Defense Architecture Framework (DoDAF) version 2.02
8.6 The Clinger-Cohen Act (Chapter 25 of title 40, United States Code) see
8.7 OMB Circular A-130 Revised, "Management of Federal Information Resources, Transmittal 4
8.8 CJCSM 3170.01H: Joint Capabilities Integration and Development System
8.9 Department of Defense Net-Centric Data Strategy
8.10 OASD(NII), Net-Centric Checklist, Version 2.1.3
8.11 Joint Net-Centric Operations (JNO) Capability Portfolio Management (CPM), Business Plan Version 1.0
9. Unified Capabilities and IPv6
9.1 Internet Protocol version 6 (IPv6) for the GSCR
9.2 Unified Capabilities Approved Product List Process
9.3 Unified Capabilities Approved Product List – DISA
9.4 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6) Definitions
9.5 OMB Memorandum M-05-22, Transition Planning for Internet Protocol Version 6 (IPv6)
9.6 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6) Interim Transition Guidance
9.7 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6)
9.8 Federal Register / Vol. 74, No. 236 / Rules and Regulations
10. Collaboration Tools
10.1 Department of Defense (DOD) Collaboration Policy Update
10.2 Collaboration products certified for use on DoD SIPRNet Networks
10.3 DCTS CMO Product Exemption List
11. Smart Cards
11.1 Army CAC/PKI Program Card Reader Specifications, Rev.
11.2 Personal Identity Verification (PIV) of Federal Employees and Contractors, FIPS Pub 201-1,
11.3 Access Card Office (ACO); Common Access Card (CAC) Release 1.0 Reader Specifications, Version 1.0
11.4 Government Smart Card Interoperability Specification. Version 2.1
12. Radio Frequency Identification (RFID)
12.1 DOD 4140.1-R DOD Supply Chain Materiel Management Regulation
12.2 Department of Defense Standard Practice - Military Marking For Shipment and Storage (MIL-STD-129P w/CHANGE 4) 19
12.3 RF-Tag Format (Version 2.0)
12.4 Policy for Unique Identification (UID) of Tangible Items – New Equipment, Major Modifications, and Reprocurements of Equipment and Spares
12.5 Update to Policy For Unique Identification (UID) of Tangible Items – New Equipment, Major Modifications, and Reprocurements of Equipment and Spare
12.6 Policy For Unique Identification (UID) of Tangible Personnel Property Legacy Items in Inventory and Operational Use, Including Government Furnished Property (GFP)
12.7 Department of Defense Guide to Uniquely Identifying Items (Version 1.4)
12.8 Department of Defense Standard Practice – Identification Marking of US Military Property (MIL-STD-130L)
12.9 Unique Identification 101 – The Basics
12.10 Passive RFID DFARS Clause 252.211-7006
12.11 DOD Supplier's Passive RFID Information Guide, Version 15.0
12.12 Radio Frequency Identification (RFID) Policy
13.1 DoD 4140.1-R DoD Supply Chain Materiel Management Regulation
13.2 Deputy Under Secretary of Defense (Logistics and Materiel Readiness) Logistics Enterprise Integration and Transformation
14. Voice Over IP (VOIP)
14.1 Security Considerations for Voice Over IP Systems, Special Publication 800-58
14.2 DISA Memo, Voice Video over Internet Protocol (VVoIP) Security Technical Implementation Guide (STIG), Version 3
14.3 Voice and Video over Internet Protocol (VVoIP) Security Technical Implementation Guide (STIG), Version 3 Release 3
15.1 Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense (DoD) Global Information Grid (GIG) (DoD Directive 8100.2)
15.2 Security Requirements for Cryptographic Modules (FIPS PUB 140-2)
15.3 FIPS 140-1 and FIPS 140-2 Cryptographic Modules Validation List
15.4 Wireless - Security Technical Implementation Guide (Version 6, Release 8)
15.5 Information Assurance Best Business Practice, Wireless Security Standards, Version 4 (09- EC-M-0010)
https://bop.peostri.army.mil/sites/bop/Lists/Request%20for%20Proposals/Attachments/67/ Attachment%209%20-%20DA%2009-EC-M- 0010%20IA%20Best%20Business%20Practice%20on%20Wireless%20Security%20Stand ards%2003282014.pdf
16. Section 508
16.1 Section 508
16.2 Workforce Investment Act of 1998, Section 508 – Electronic and Information Technology
16.3 Guide to the Section 508 Standards for Electronic and Information Technology:
17. Energy Star and Electronic Product Environmental Assessment Tool (EPEAT)
17.1 Executive Order 13221, Energy-Efficient Standby Power Devices
17.2 ENERGY STAR Program Requirements for Computers Partner Commitments and ENERGY STAR Program Requirements Product Specification for Computers Eligibility Criteria Version 6.0 Rev. Oct-2013
17.3 Computer – Key Product Criteria
17.4 Imaging Equipment
17.7 Data Center Energy Efficiency Initiatives
17.8 Enterprise Server Key Product Criteria
17.9 Electronic Product Environmental Assessment Tool (EPEAT)
17.10 Executive Order 13423, Strengthening Federal Environmental, Energy, and Transportation Management
17.11 Federal Acquisition Regulation; FAR Case 2006–030, Electronic Products Environmental Assessment Tool. Federal Register / Vol. 74, No. 10 / Thursday, January 15, 2009 / Rules and Regulations (EPEAT)
18. Other Regulatory and Commercial Requirements
18.1 Distributed Management Task Force Desktop Management Interface Specification (DMI Version 2.0.1s)
18.2 Trusted Computing Group, Trusted Platform Module (TPM v1.2)
18.3 FCC Part 15 Class B
18.4 Electromagnetic Compatibility (EMC) Directive 89/336/EEC
19. System Security
19.1 Security requirements that shall be accomplished by the Contractor will be per the DoD Information Assurance Certification and Accreditation Process (DIACAP) DoD Instruction 8510.01
The Contractor shall transmit and deliver any classified material/reports IAW the National Industrial Security Program Operations Manual (NISPOM) and the Industrial Security Regulation (DoD 5220.22-R). Individual system security requirements shall be accomplished as specified in the Task/Delivery Order.