March 1, 2000
EXECUTIVE SUMMARY
The NATO CALS Office (NCO) published Draft 2 of the NATO CALS Handbook in
January 1996. That product has been circulated around the world and has been translated by
other nations into their native language. This in itself shows the interest and desire by nations
and associated industry to learn and use the CALS concept.
This product is Draft 3. It is intended to service as an extension and update Draft 2 and is
being circulated for comments and recommendations. It is our intention to finalize this
document by June 2000. However, the NCO views this handbook as a living document. To
meet that objective, the NCO will make this a Web-based product to be continuously
updated, as new information becomes available.
A summary of the contents of the NATO CALS Handbook Draft 3 follows.
SECTION ONE: INTRODUCTION
This section sets the stage. It begins with a succinct definition and background for CALS and
looks at the challenges faced by decision-makers. The military, industry, and multinational
program perspective for CALS is addressed next.
A basic tenet of CALS is that information is an asset. From the Defense System (DS)
perspective, technical information is a vital asset required to support the DS across its
lifecycle. Accordingly, this section closes with an overview of the Staged Process for
Through Life Information Management (TLIM), which is the central theme for the remainder
of the handbook.
SECTION TWO: STAGE 1: DEVELOPING A THROUGH LIFE INFORMATION
MANAGEMENT STRATEGY
This section describes the process for developing a Through Life Information Management
(TLIM) Strategy. A careful examination of the business and IT environment in which the
program will operate is conducted and an assessment of the options for adding value from a
Shared Data Environment (SDE) is made. Alternative options are then examined in relation
to their ability to contribute to achieving business goals and using cost/benefit and risk
management techniques. The culmination of this process is the strategy for designing,
developing and implementing TLIM within an organization.
SECTION THREE: STAGE 2: DEVELOPING A THROUGH LIFE INFORMATION
MANAGEMENT PLAN
The goal of this section is to provide the tools needed to build an Information Management
Plan (IMP). The IMP is a comprehensive document used to support the intended program
business strategy as developed in Stage 1. The IMP should address both government and
industrial requirements and be under program management control throughout the life-cycle.
All parties (NATO, nations, armed services, contractors, etc.) must agree to the IMP. The
methodology and content of the IMP is fully developed in this section.
SECTION FOUR: STAGE 3: IMPLEMENTING A SHARED DATA ENVIRONMENT
After the IMP is developed it is time to get physical. Today, most of the DS technical
information required to support program operations is created and managed within the
industrial infrastructure.
In addition, a NATO/Multi-national infrastructure is needed to
ES-i
manage this information throughout NATO and nations. TLIM using a Shared Data
Environment (SDE) concept is designed to help address these problems.
Implementation of a SDE or the best alternative is accomplished through the execution of the
program IMP described in the previous section. This section is intended to provide the
project manager with an understanding of what makes up an SDE and give him the
information needed to implement an SDE.
SECTION FIVE: STAGE 4: MANAGING INFORMATION THROUGH LIFE
This section addresses the role and responsibilities associated with managing DS information.
The goal is to provide correct information to the right user, when it is needed, where it is
needed, and in the form it is needed.
The program manager (PM) will need to assign information management responsibilities
within the program office. The PM can assign information management to one or more
program office members as an "other duty as assigned" or recruit a dedicated Information
Manager (IM) to the team. Information management, like configuration, security and change
management, is the responsibility of program management and is an integral part of the IMP.
SECTION SIX: MODELS
This section presents three different concepts (NATO CALS Through Life Business Model
(TLBM), NATO CALS Data Model (NCDM) and Life-Cycle Cost (LCC)) designed to help
implement the NATO CALS concept.
The TLBM is a tool to help decision-makers manage change. It presents a vision of how
NATO can improve its acquisition and logistics process for multinational programs by
making best use of information technology over the life-cycle of a DS.
The NCDM is a formal description of the data required to support the logistics process for the
acquisition and support of major systems.
LCC looks at the total cost of ownership of a process, system, or piece of equipment. For
installation of new equipment, a LCC analysis can assist in deciding which options add the
most economic benefits to the program.
SECTION SEVEN: TOOLS
This section provides an overview of the selection of user tools. Acquiring proper tools is as
important as designing and implementing the Shared Data Environment. These tools are an
integral part for providing connectivity with a common basis for sharing DS information in
ready-to-use formats. It is important to note that data stored within the SDE is useless unless
it can be extracted, analyzed, manipulated, updated, formatted, and presented in a user
friendly manner by the appropriate software application tool.
In parallel with the analysis used to determine the SDE requirements, tool selection must be
considered within the SDE context. The ideal situation is to provide an environment that
separates information from applications and is based on open system standards. This will
help ensure future flexibility in upgrading to new software solutions as technology evolves.
ES-ii
ES-iii
TABLE OF CONTENTS
EXECUTIVE SUMMARY ........................................................................................................ES-i
LIST OF FIGURES ...................................................................................................................... xvi
LIST OF TABLES....................................................................................................................... xviii
1.0 INTRODUCTION .................................................................................................................... 1
1.1 Background ................................................................................................................... 1
1.1.1 Continuous Acquisition and Life -cycle Support ............................................ 1
1.1.2 The Challenge to Decision Makers................................................................ 1
1.1.3 Industry Perspective ....................................................................................... 2
1.1.4 Military Perspective ....................................................................................... 2
1.1.5 The Multi-National Program Perspective ...................................................... 2
1.1.6 NATO Perspective ......................................................................................... 3
1.1.7 NATO CALS .................................................................................................4
1.1.7.1 Going Digital Now .......................................................................... 5
1.1.7.1.1 Through Life Management .............................................. 5
1.1.7.1.2 Through Life Information Management .......................... 5
1.1.7.1.3 Shared Data Environment ................................................ 6
1.2 Managing the Life-cycle Process .................................................................................. 7
1.2.1 NATO CALS Environment ........................................................................... 7
1.2.2 Program Management Issues ......................................................................... 9
1.2.2.1 Relationship Management .............................................................. 9
1.2.2.2 Continuous Review and Approval.................................................. 9
1.2.2.3 Contract Management..................................................................... 9
1.2.2.4 Financial Management .................................................................... 9
1.2.3 Technical Information Management Issues .................................................10
1.2.3.1 Requirement Management ............................................................10
1.2.3.2 Configuration Management ..........................................................10
1.2.3.3 Quality Assurance .........................................................................10
1.2.3.4 Information Management ..............................................................10
1.2.4 The Staged Process for Through Life Information Management ................11
1.3 Purpose of the NATO CALS Handbook ....................................................................12
2.0 STAGE 1: DEVELOPING A THROUGH LIFE INFORMATION MANAGEMENT
STRATEGY..........................................................................................................................13
2.1 Develop Improvement Targets....................................................................................13
2.2 Analyze Environment and Options .............................................................................14
2.2.1 Business Environment and Options .............................................................14
2.2.1.1 External Environment...................................................................14
2.2.1.2 DS Program Process Improvement Tool ......................................14
2.2.1.3 DS Program Process Improvement Tool Tailoring ......................15
2.2.1.4 DS Program Forecasting...............................................................16
2.2.1.5 Content of Program Strategy for TLIM ........................................16
2.2.2 IT Environment and Options .......................................................................18
2.3 Analyze Cost and Benefits..........................................................................................19
2.4 Decide Through Life Information Management Strategy ..........................................23
3.0 STAGE 2: DEVELOP A THROUGH LIFE IN FORMATION MANAGEMENT PLAN...24
3.1 Analyze User Requirements........................................................................................27
3.2 Define Information Requirements ..............................................................................27
3.3 Define Infrastructure Requirements............................................................................27
3.4 Develop Information Management Plan.....................................................................28
3.5 Develop a Business Case for Through Life Information Management ......................29
3.5.1 Business Case Need .....................................................................................29
3.5.2 Why Do We Need It Now?..........................................................................29
3.5.3 Benefit Determination..................................................................................30
3.5.3.1 Benefit Indication..........................................................................30
3.5.3.2 Benefit Classification ....................................................................30
3.5.4 Cost Determination ......................................................................................32
3.5.4.1 Unit Costs ......................................................................................32
3.5.4.2 When Costs Are Accrued..............................................................32
3.5.5 The Analysis ................................................................................................32
3.5.5.1 Rollout Model...............................................................................32
3.5.6 The Financial Model....................................................................................33
3.5.7 Sensitivity Analysis .....................................................................................33
3.5.8 Project Specific Aspects...............................................................................33
4.0 STAGE 3: IMPLEMENTING A SHARED DATA ENVIRONMENT ................................34
4.1 Develop the Statement of Work..................................................................................34
4.2 Place CALS on Contract.............................................................................................35
4.3 Implement the Information Technology .....................................................................35
4.4 Implement Data Models ..............................................................................................36
5.0 STAGE 4: MANAGING INFORMATION THROUGH LIFE ............................................37
5.1 General Considerations...............................................................................................37
5.1.1 Information Manager ...................................................................................37
5.1.2 Contractor Involvement ...............................................................................37
5.1.3 Data Management Scheme...........................................................................38
5.2 Input Information ........................................................................................................39
5.3 Update Information .....................................................................................................39
5.4 Access/Distribute Information ....................................................................................39
5.5 Store Information ........................................................................................................39
6.0 MODELS ................................................................................................................................41
6.1 The Through Life Business Model .............................................................................41
6.1.1 Purpose of a Through Life Business Model ................................................41
6.1.2 Developing a TLBM ....................................................................................43
6.1.2.1 TLBM Definition..........................................................................43
6.1.2.2 TLBM Scope .................................................................................43
6.1.2.3 Purpose..........................................................................................43
6.1.2.4 TLBM Viewpoint..........................................................................44
6.1.2.5 Manage a Defense System Through Life......................................44
6.1.2.5.1 Defense System..............................................................45
6.1.2.5.2 TLBM Principles ...........................................................45
6.1.2.5.2.1 Concurrent Engineering Approach .................46
6.1.2.5.2.2 Life-cycle Integration......................................46
6.1.2.5.2.3 The Use of a Shared Data Environment .........46
6.1.2.5.2.4 Multi- Disciplinary Groups .............................46
6.1.2.5.3 Information as an Asset .................................................47
6.1.2.5.4 Organizational Interfaces ...............................................47
6.1.2.5.4.1 NATO CALS Handbook.................................47
6.1.2.5.4.2 NATO CALS Data Model ..............................47
6.1.2.6 Manage a Defense System Through Life - First Level
Breakdown....................................................................................47
ii
iii
iv
vi
vii
viii
ix
xi
xii
xiii
10.5.3
10.5.4
10.5.5
10.5.6
xiv
xv
LIST OF FIGURES
Figure 1-1 NATO Multi-National Environment.......................................................................3
Figure 1-2 Managing the Weapon System over Its Life-cycle ..................................................6
Figure 1-3 Representative Shared Data Environment ...............................................................7
Figure 1-4 NATO "Should Be" CALS DS Environment ..........................................................8
Figure 1-5 NATO CALS Four Stage Process .......................................................................... 11
Figure 3-1 Through Life Information Management Plan Steps .............................................. 24
Figure 3-2 Develop an Information Management Plan (IMP)................................................ 27
Figure 3-3 Strength of Benefits............................................................................................... 31
Figure 4-1 Implement a Shared Data Environment................................................................. 34
Figure 5-1 Manage the Information......................................................................................... 39
Figure 6-1 Weapon System Information Sharing .................................................................... 41
Figure 6-2 (Top Level Diagram) .............................................................................................. 45
Figure 6-3 (Diagram A0) ......................................................................................................... 48
Figure 6-4 (Diagram A1) ......................................................................................................... 50
Figure 6-5 (Diagram A12) ....................................................................................................... 51
Figure 6-6 (Diagram A13) ....................................................................................................... 53
Figure 6-7 (Diagram A133) ..................................................................................................... 54
Figure 6-8 (Diagram A136) ..................................................................................................... 55
Figure 6-9 (Diagram A2) ......................................................................................................... 56
Figure 6-10 (Diagram A21) ..................................................................................................... 58
Figure 6-11 (Diagram A3) ....................................................................................................... 59
Figure 6-12 Number of Interfaces without a Common Vocabulary........................................ 63
Figure 6-13 Number of Interfaces Using the NCDM as a Common Vocabulary ................... 63
Figure 6-14 Integrated Product Database Data Sources .......................................................... 65
Figure 6-15 Building an IT System Around the NCDM ......................................................... 67
Figure 6-16 Abstract view of NCDM...................................................................................... 69
Figure 6-17 Extended Abstract View of NCDM..................................................................... 70
Figure 6-18 The NCDM High Level Planning Model............................................................. 70
Figure 6-19 The Product Entities............................................................................................. 72
Figure 6-20 EXPRESS-G of product_structure ....................................................................... 73
Figure 6-21 Product structure presented as a tree.................................................................... 73
Figure 6-22 An Instance of a Product Structure ...................................................................... 74
Figure 6-23 EXPRESS-G of Breakdown................................................................................. 75
Figure 6-24 One Anomaly Caused by 2 Others ....................................................................... 78
Figure 6-25 Example of Failure Roll-up.................................................................................. 79
Figure 6-26 Task Method Sequence ........................................................................................ 81
Figure 6-27 ICOM Notations ................................................................................................... 84
Figure 6-28 General Form of Characteristic ............................................................................ 86
Figure 6-29 Characteristic Assignment ................................................................................... 87
Figure 7-1 Development Steps for Information Management Capability ............................... 92
Figure 7-2 Configuration Management Process Model - Overview........................................ 95
Figure 7-3 NATO CALS Data Architecture...........................................................................103
Figure 7-4 Recursive Approach ..............................................................................................112
Figure 7-5 NATO CALS Standardization Architecture .........................................................115
Figure 8-1 The CALS NCoO in the Contracting Process.......................................................166
Figure 8-2 NCoO Development Process.................................................................................169
Figure 8-3 Refinement............................................................................................................180
Figure 8-4 CITIS Implementation ..........................................................................................186
xvi
xvii
LIST OF TABLES
Table 2-1 Cost Benefit Life-cycle Matrix................................................................................ 21
Table 2-2 Cost Benefit Risk Assessment................................................................................. 22
Table 3-1 Major System Life-cycle Phases and Information Management Activities............ 25
Table 3-2 IT Infrastructure Analysis ........................................................................................ 28
Table 3-3 Information Management Plan (IMP) Content ........................................................ 29
Table 7-1 Typical NATO and Contractor CM Roles and Responsibilities ............................. 98
Table 7-2 TLBM Version 4.0 Data Assemblies by DA Categories .......................................105
Table 8-1 Typical Data Type Deliverables .............................................................................169
Table 8-2 Data User Infrastructure and Capabilities ..............................................................172
Table 8-3 Data Users ...............................................................................................................175
Table 8-4 Data Types ..............................................................................................................176
Table 8-5 CITIS Decision Scorecard......................................................................................184
Table 8-6 CITIS Services and Functions - Supplemental Details ..........................................189
Table 8-7 Digital Data Deliverables .......................................................................................232
Table 8-8 Advantages and Disadvantages of Delivery Options .............................................242
xviii
1.0 INTRODUCTION
1.1 Background
1.1.1 Continuous Acquisition and Life -cycle Support
The United States Department of Defense launched the Continuous Acquisition and Lifecycle Support (CALS) initiative in 1985 to accelerate the use of digital product information in
acquiring and supporting defense systems.
So, what exactly is CALS? CALS is a joint government/ industry strategy focused on
reengineering existing business processes into highly automated and integrated defense
system life-cycle management process.
Life-cycle in this context covers concept,
design/develop, build, maintain, and dispose of a defense system (DS).
The purpose of CALS is to reduce defense system time to market, reduce total ownership
cost, and improve quality, across the life-cycle. Information Technology (IT) is an enabler
used to support the adoption and use of a shared data environment based on international
standards to manage the DS technical information. Embedded in the CALS philosophy is the
adoption of a rational approach to manage the production, access, management, maintenance
and distribution of digital technical information. This will enable more effective creation,
exchange, and use of defense system and equipment technical information over the life-cycle.
In this context, information is of vital importance and must be treated as a valuable asset.
The CALS strategy integrates information technology, business process re-engineering
(BPR), concurrent engineering (CE), multi-disciplinary work groups (MDG) and electronic
commerce/electronic data interchange (EC/EDI) to achieve very specific governmentindustry business objectives.
CALS addresses the total life-cycle of a DS. The Continuous Acquisition side of CALS
means optimizing customer-contractor processes during the concept, design/develop and
build phases. It is necessary to understand that these phases are continuous throughout the
life of the program because DSs last for up to 50 years and are constantly being modified due
to technology and emerging threats. Life-cycle support addresses the maintenance, repair,
and modification of DSs. Life-cycle support begins at the onset of the DS program where a
heavy emphasis is placed on the maintenance and in-service support processes during the
design and manufacture stages. Huge reductions in total ownership cost can be realized by
considering the maintenance and support processes at the onset of the program while they are
still malleable. Therefore, one of the primary business precepts of CALS is to make adequate
up-front investment to achieve long term savings for the end-customer while providing
operational excellence in the event of military operations.
1.1.2 The Challenge to Decision Makers
Throughout the world, information and communications technologies are generating a new
industrial revolution already as significant and extensive as those of the past. It is a
revolution based on information. Technological progress now enables us to process, store,
retrieve, and communicate information in whatever form it may take - oral, written, or visual
- unconstrained by distance, time and volume. This revolution adds huge new capabilities
and is a resource that is going to change the way we work together and the way we do
business together. Yet, nothing will happen automatically. The ability to participate, to
adapt, and to exploit the new technologies and the opportunities they create is the challenge
facing decision-makers both in Industry and Government. Those who fail to meet the
challenge, and make use of the opportunities presented, will not succeed in the changed
environment.
1.1.3 Industry Perspective
Individual Companies all over the world are investing heavily in Information Technology
(IT). They are applying Business Process Re-engineering (BPR) to refine internal process,
Concurrent Engineering (CE) practices to build multi-disciplinary teams, Electronic Data
Interchange (EDI) technology to exchange information in digital form. They make these
investments more or less independently, at each companys own pace and as its finances
permit. The motivation for each company is very straightforward - it is to optimize internal
efficiency, maximize profit, and maintain a competitive edge in the market.
Those
companies that make early investment in IT technologies will reap the greatest rewards. By
contrast, companies that temporize, or favor half-hearted solutions, could, face disastrous
declines in the market in a few years. Transition to digital processes and technologies is a
matter of survival in the industrial arena. For those manufacturing companies which supply
Defense systems to NATO and national MoD/DoD customers, the desire to improve
customer support, increase operational reliability, and to reduce costs is sometimes
challenged by the customers cultural and infrastructure weakness in dealing with new
technologies.
1.1.4 Military Perspective
The military has long perceived that advanced computer technology and telecommunications
capabilities could greatly reduce the lead times and costs associated with acquisition and
support of defense systems, while improving their quality. The paper flow between industry
and MoDs/DoDs today includes a massive volume of technical data: engineering drawings,
technical manuals illustrated part list, etc. Processes based on such paper documents are
error-prone, labor-intensive and do not provide the needed levels of operational readiness and
reliability. The necessity to migrate to lean and fast processes, based on digital data, is felt
with more and more urgency within the military, and MoD/DoD have started developing and
implementing their own organizations to address the problem.
1.1.5 The Multi-National Program Perspective
Multi national defense system programs operate in an environment of extra-ordinary
complexity. This is illustrated below:
BE
CA
DK
FR
GE
GR
IC
IT
LU
NL
NO
PO
SP
TU
UK
US
M
O
D
Supplier
Air Force
Navy
M
O
D
Army
PROJECT
P
R
I
M
E
M
O
D
C
O
N
T
R
A
C
T
O
R
Sub
Contr
Supplier
Supplier
Supplier
Supplier
Sub
Contr
Supplier
THROUGH-LIFE
INFORMATION MANAGEMENT
single nation. It is extremely expensive to manufacture and maintain these complex systems
in isolation. There is a need for intense cooperation and extensive multinational information
exchange throughout the customer, prime contractor, and sub contractors, supplier chain.
The CNAD, the NATO decision makers in the field of armaments, gave a clear signal of their
commitment to exploit CALS new technologies by establishing the NATO CALS
Organization in 1994.
1.1.7 NATO CALS
In 1989, the Conference of National Armaments Directors (CNAD) took the lead on all
NATO CALS issues by establishing a CALS working group under Allied Committee 301
(Standardization of Material and Engineering Practices) subgroup D. In 1993, the CNAD
endorsed the creation of the NATO CALS Organization responsible for the overall direction
of al CALS activities within NATO. The NATO CALS objective is to improve readiness,
increase quality, shorten time to market, and reduce total life-cycle costs.
NATO CALS is a co-operative activity, funded by 11 of the 19 NATO Nations, to improve
NATOs ability to exploit information and communications technology, in the acquisition
and life-cycle support of complex DSs. The NATO CALS Mission is:
1. To: increase interoperability, decrease defense equipment life-cycle costs, ensure the
readiness of NATO forces and decrease acquisition lead times,
2. By: facilitating continuous improvement of business processes,
3. Through: the use of international standards and practices, application of advanced
tools and technologies, and increased co-operation with industry,
4. Thereby: creating an opportunity for NATO industry to enhance its global
competitiveness.
NATO CALS has three main components:
1. The NATO CALS Management Board (NCMB) which meets 3 times per year, to
control the work program Strategic Plan. The NCMB is comprised of senior level
national representatives tasked to provide and maintain the NATO CALS Strategy,
Goals, and Objectives needed to meet the CNAD mission for CALS. This mission is
executed by the NATO CALS Office .
2. The NATO CALS Office (NCO) was established in 1994, under the leadership of the
NCMB, to implement CALS within NATO. The NCO has a -full-time staff located at
NATO Headquarters. The NCO consists of nine national CALS experts from BE, FR,
GE, IT, NO, SP, TU, UK and US with DK and NL contributing financially. Hungary,
Poland, Finland, and Sweden collaborate with the NCO and, the NCO has extensive
contacts within NATO, nations, and industry.
3. And the NATO Industrial CALS Group (NICG) who provide industrial advice and
assistance.
The NCO, with extensive industrial participation provided through the NATO Industrial
Advisory Group (NIAG), began its work by sponsoring a series of studies, workshops, and
development projects. A major outcome of these efforts was the development of the NATO
CALS Policy and Strategy.
The Strategic Plan offers both a short term and long term approach. The short-term approach
encourages the maximum use of available commercial tools across the government/industry
boundary for new NATO DS programs. The long-term approach proposes the development
of new information standards for product life-cycle support data to improve the ability to
share technical data across the whole DS environment.
A more detailed discussion of NATO CALS is included in Appendix A.
1.1.7.1 Going Digital Now
NATO CALS advocates going digital now (e.g., get out of paper), by using COTS and
industry solutions, and by adopting international standards where possible. Programs should
also adopt a through life management (TLM) approach to program management and view
information as an asset utilizing a through life information management (TLIM) philosophy
implemented through a Shared Data Environment.
1.1.7.1.1 Through Life Management
Through Life Management (TLM) is a business strategy for optimizing the overall success of
a program by focusing on the life-cycle return for major DS programs. Return in this
instance can be measured in many different ways, e.g., reduced time to market, reduced
acquisition cost, reduced support cost, improved performance, improved maintenance
turnaround time etc. The objective here is to make it faster, better and cheaper.
1.1.7.1.2 Through Life Information Management
TLIM focuses on how to define and communicate the technical information needed by users
to acquire, plan and execute support for complex, long life defense assets. Because products
are growing more complex, it is becoming ever more difficult to keep the technical
information required for maintenance in line with the changing product. The volume of
information needed to conduct maintenance is also growing. This information is created at
the beginning of the DS life-cycle and needs to be managed across the life-cycle,
e.g., Configuration data, diagnostic data, failure modes, connection diagrams, assembly
drawings, special tools and test equipment data, spares details, test requirements, etc. The
absence of any of this information may stop the work in progress. Improved feedback is also
needed to track maintenance costs and eliminate the causes of downtime. (Depicted in
Figure 1 -2)
Business Processes
Design/Develop
Acquire
Maintain
User
Feedback
Archive
Archive
Data
Data
Dispose
SATISFY
The Shared Data Environment
Supply Chain
Support
Management
Engineering
Core Product Data
Maintenance
Managing
The
Weapon System
Over Its
Lifecycle
CALS
CALS OBJECTIVES
OBJECTIVES
Improve
Interoperability
Interoperability
Lower Life
Life Cycle
Cycle Costs
Costs
Reduce Acquisition
Lead
Lead Time
Time
Ensure NATO
Weapons System
Readiness
Improve Quality
Quality
Business
Business Processes
Processes Linked to Through Life Information Management (The
Shared Data Environment and International Standards) Operating in an
Electronic Environment Satisfy the NATO CALS Objectives
Figure 1-2 Managing the Weapon System over Its Life -cycle
1.1.7.1.3 Shared Data Environment
The DS Program Shared Data Environment (SDE) will help programs establish the
foundation for the new ways of working. Ideally, it will provide an information infrastructure
which supports digital communication and allows data to be controlled, accessed, and shared
electronically between all industrial and governmental participants through-out a programs
lifetime. To achieve this, the Program SDE must operate with, and may indeed be part of, a
wider national or NATO infrastructure for defense system logistic support.
In practice, it is neither sensible nor cost effective for NATO to develop a single, integrated
system to meet the needs of all parties associated with a DS over its life-cycle. NATO CALS
has developed a strategy to improve the capability to share information across the Alliance by
encouraging new programs to develop program SDEs that can bridge the
government/industry based on the latest commercial software. A Program SDE should cover
the widest possible range of functions, and the largest number of participants that the
Program can afford to connect. SDEs will vary from Program to Program. Integration with
the existing logistic systems and with the rest of the supply chain will be achieved
progressively, partly by tailored interfaces, and partly by the progressive development of new
information standards. Initially, these standards will address the requirements of product lifecycle support.
The Program SDE must be available at all stages of the life-cycle. During development,
multi-disciplinary groups use the SDE to accelerate and improve the design and development
processes. In operations, the SDE provides rapid controlled access to the defense system
technical information needed to ensure combat readiness. The Program SDE also helps DS
support managers maximize availability and reduce support costs by providing the necessary
operating history and feedback for in-service maintenance and support.
The SDE should be established at the beginning of the program, be accessible to all
participants, and evolve continuously through the life-cycle to exploit the latest IT deemed to
be of value. In a multi-national environment such as NATO, turning this SDE vision into
reality presents some significant problems, in particular, at the boundaries between
government and industry, and between the many logistic infrastructure systems that support
national and NATO operations.
CRITICAL DS
INFORMATION
REQUIREMENTS
Government
Industry
LOGISTICS
NATO Forces
Data Access
PERSONNEL
COMMON SUPPORT APPS
FINANCE
INFRASTRUCTURE SERVICES
CONFIGURATION
MANAGEMENT
KERNEL
Security System
Management
Database
ACQUISITION
DRAWINGS
(CAD/CAM)
HISTORICAL
FILES
FRAMEWORK project. The vision is presented in more detail in the NATO CALS Through
Life Business Model (TLBM).
In the NATO Should Be CALS DS Environment (Figure 1-4), certain key functions must
be managed consistently over the life-cycle. If a through life perspective is not adopted at the
outset, then the myriad of system changes that iterate across the life-cycle process become
impossible to manage. However, if a life-cycle management approach is applied from the
outset, significant cost savings and major quality improvements can be achieved. These in
part result from minimizing the errors, delays, and disruptions occurring at organizational
boundaries and at major transition points. A good example of this is system hand over which
transpires between the acquisition project office and the operational service.
Manage
Inform. Services
Manage
Quality Assurance
Manage
Configuration
Continuous Processes
Programmatic Development /Deployment Disciplines
Need Definition
and Analysis
Feasibility
Study
System
Definition
Design and
Development
Production
Deployment
Operation /
Support
Disposal
Workflow
Standards
play their part, but a rational DS life-cycle management approach is impossible without a
view of the total DS life-cycle cost.
1.2.3 Technical Information Management Issues
1.2.3.1 Requirement Management
The requirement for the DS starts with the statement of mission need. This drives all of the
life-cycle processes. From the outset, the requirement statement should be written in a form
that facilitates a continuous through life comparison of actual to specified performance.
Other elements that need to be included in the requirement are DS capability, availability, and
cost. These also need to be stated in a manner that facilitates the comparison between actual
and specified performance.
The requirement should be maintained in a current and
authorized form, over the whole life-cycle, which is readily available to all program
participants needing to check their performance. This process can be facilitated through the
implementation and use of a shared data environment (SDE).
1.2.3.2 Configuration Management
Product identification and configuration control is essential to product control and logistics
operations, and must be managed through life. Configuration Management (CM) must begin
by establishing control of the requirement statement. CM must be applied to the DS contract
documentation, design, manufacture, product use, technical information, and the support
equipment needed to operate and maintain the product in service.
A Shared Data Environment, incorporating an electronic CM module, makes it much easier
to apply CM by providing a central authoritative source of secure and integrated data directly
associated with the end item. This makes system changes easier and cheaper to manage and
maintain; thus, significantly reducing DS life-cycle costs. (If I know what it is, I know what
to buy, and how to support it).
1.2.3.3 Quality Assurance
In the Should be CALS Environment (Figure 1-4), quality assurance is achieved primarily
through self regulating processes, in which the people responsible for doing the work have
access to the information they need to assess their own performance. The SDE not only
makes this possible, but also makes it easy to achieve, and the approach is entirely consistent
with the use of Concurrent Engineering.
In cases like DS safety, where external inspect or audit is still required, the SDE adds value
by providing a consistent mechanism for recording and storing quality assurance records,
linked by identifier, to the appropriate part. The Should Be CALS Environment improves
quality directly by providing maintainers and operators with ready access to design or
manufacturing data, which is relevant to the product in their hand. The quality of in-service
feedback is improved by capturing information automatically, as work is done, rather than the
error prone process of filling in forms after the event.
1.2.3.4 Information Management
The NATO CALS goal of electronic DS life-cycle information management is to ensure the
accuracy, integrity, and availability of the DS technical information throughout its life.
10
Managing information in an SDE, with multiple users, requires significant planning and
control.
Security, property rights, controlled user access, system administration and
information quality control is as complex as the configuration management and control of the
product itself. In the NATO CALS Environment, the Information Management activity is
very complex. DS technical information crosses enterprise and national boundaries, and
involves several heterogeneous infrastructures.
The informations form and
inter-relationships is also very complex and must be preserved as the information is created,
accessed, shared, transported, and delivered to the end user. For these reasons, in the NATO
CALS Environment, information is treated as an asset, to be managed over the DS life-cycle.
1.2.4 The Staged Process for Through Life Information Management
TLIM encompasses several basic steps, or activities, that should be conducted in conjunction
with the program and systems development life-cycle to yield the maximum benefit. At a
high level the activities are:
1. Determine the targets for the program and develop a Program Strategy;
2. Determine through life data and Information Technology (IT) requirements and
develop an Information Management Plan (IMP) that supports the Program Strategy;
3. Contract for and implement shared data capabilities based upon the Information
Management Plan;
4. Manage the information based upon the terms in the contract.
The four-stage process is illustrated in Figure 1-5:
Management
Vision
Develop Program
Strategy for
CALS
Program
Strategy
for CALS
Develop
Through-Life
Data and IT
Requirements
CALS Information
Management Plan
Implement
Shared Data
Capabilities
Shared Data
Environment
Manage
Information
Archive
Data
User Feedback
11
12
Cut development time scale from release of Staff Target to first operational use by
30% from last similar project.
Reduce cost of providing technical information needed to conduct level 1 and 2
maintenance by 40%, from the average of the last four programs.
Reduce the number of QA deficiencies, found on final inspection to less than one a
week.
Opportunities for improvement are numerous. A limited listing of improvement targets and
opportunities, based on current best practice, is presented below. These are described in a
generic form, and are intended to act as a starting point for selecting the specific
improvement target that the DS program will seek to pursue. Ideally, selection of targets
should be based on a full analysis of through life cost, risks and benefit applicable to the
program in question. In practice, some intuitive judgment will be needed to select a limited
range of options for analysis in further detail.
13
14
A generic defense system TLBM has been developed by NATO CALS to illustrate the
improved business processes for through life management, enabled by a Shared Data
Environment. (See Chapter 6)
2.2.1.3 DS Program Process Improvement Tool Tailoring
The NATO CALS TLBM defines a new approach to defense system management, showing
how integrated product and support data contained in one single source could improve the
process for acquiring, operating, supporting, and disposing of a defense system. It reflects
many new ideas and improved ways of working, not all of which will be achievable on any
single program. By tailoring this model to reflect the specific program, it is possible to
explore and to illustrate how the digital environment can be exploited on the program in
question.
Tailoring the NATO TLBM should be based on:
By studying each activity box in the generic TLBM, it is possible to understand whether
particular activities apply to the program in question, who is likely to perform them, and what
improvements might be possible from an SDE. The use of a TLBM will also function as a
question generator to identify issues deserving attention within the CALS Strategy and for
the rest of the program. The NATO CALS TLBM is a guide, not a standard. Each Program
Manager must decide which improvements to implement, and how to apply them in his
context.
This tailoring and analysis process will also be of benefit to programs buying an existing
system, whether military or commercial-off-the-shelf (COTS). The use of a TLBM will help
clarify the strategy for supporting the system through life, the level of dependence on the
intended supplier over the life-cycle and the opportunities for exploiting IT.
DS Program Analysis Key Questions
The TLBM should be used to analyze, in sufficient detail, the nature of the information
required to support the intended way of working. The following are examples of questions
that the model may help to resolve:
Program Management (See Chapter 6)
How will key resources (money, people, and information) be managed?
What are the roles, responsibilities of the many participants who will perform the
various activities over the life-cycle?
How might these change over time? How will such changes be managed?
How are requirements kept current over the life-cycle?
What kind of incentive arrangements would be most appropriate between the
government and industrial prime contractor?
What teaming concepts are to be used?
How will program changes be managed?
How will the program be controlled?
Quality Assurance (See Chapter 6)
15
16
17
This analysis, enhanced by the business analysis, may be used to develop a steadily
improving picture of the intended extent of digital working to be applied to the program.
This, in turn, begins to define a set of options for the scale, extent, and capability of the
Shared Data Environment that the program will seek to deploy. Areas to be addressed
include, but are not limit to the following:
18
Specific attention should be given to the boundaries of the SDE. Complete and free access to
program data, as assumed by the TLBM, is some years away from reality due to industry
proprietary, data and security issues. In practice, no single program SDE will encompass all
of the program participants. Limitations must be set on the extent of shared information
access. Every boundary drawn for the SDE will create a border across which information
will need to be exchanged. DS Program SDE chosen boundaries determine the information
exchange requirements with the rest of the world.
In exploring the CALS environment, and the possible SDE options, particular attention
should be paid to the recent experience of other relevant programs. The NATO CALS Office
provides a natural focal point for such learning through its attendance at international
conferences and contacts with participating nations. The Internet is also a valuable CALS
information source through the various home pages maintained by the national CALS offices.
Several relevant periodicals and other publications are also starting to appear, some free of
charge.
Although these documentary sources are of significant value, programs developing a CALS
Strategy are encouraged to visit other program offices and/or industrial sites that have recent
relevant experience.
The contractual aspects of alternatives developed through analysis and tailoring of the TLBM
and the CALS Environment for the program should be considered at the earliest possible time
given the complexities of international contracting and through life support of NATO/Multinational armament programs. A more complete discussion of contracting issues is covered in
Chapters 4 and 10.
2.3 Analyze Cost and Benefits
Defense Program Managers are under enormous pressure to reduce program costs. They are
also expected, at the same time, to raise productivity and product quality by improving
business processes. The Information Technology (IT) revolution offers a significant potential
for improvement. However, demonstrating the potential gains is difficult for several reasons:
19
20
Define/Design/test
(tested sol ution)
Production
(products,
processes and services)
Deployment
Operations
Disposal
Concurrent Eng/ILS
Shared
Environment
- Information sharing
Program
Management (PM)
- Data maintenance/mgt is
"immediate,"
technical
workers are alleviated from
being knowledge clerks
0
Multi-Disciplinary
Groups (acquisition)
- Disposal is engineered
into technical solution
+
Easier and more
accurate
identification
of data holdings for
disposal
0
Produceability inherent in
design
Quality
(QA)
0 Quality is built in
from start, so fewer
design
changes,
no
savings from QA yet
- It works as specified,
more frequently
0
Start CM is a CE
environment but not much gain
0
Shop floor not impacted
positively or negatively but
integrated CM
- Integrated incremental
rollout
Meets
specified
supportability requirements,
and
operability
requirements.
more
frequently
Manage configuration
items for improved support
and change mgt.
Data
Assurance
Configuration
Management (CM)
21
MDT
CM
PM
Electronic form
Timeliness
Transaction cost
Electronic processing, exchange and storing
System security
Legacy data
Systems incompatibility
Communications capability
Baseline control
Fleet management
Engineering change
Real-time configuration control
Takes longer
Costs more
Culture change does not happen (internal
MDT comms. and PM)
Location
Volatility of changes and baseline,
complexity of new systems
(incremental functional delivery)
CE Supportability
(ILS) War fighting capability
QA
Benefits
Version Control
Accessibility
Quality
Data management
Initial investment
prod=0
JIT - Maintenance, Training, Ops plus IP and
supportability (Delivery?)
Ops: Reliability, maintainability and operability
= war fighting capability and reduced cost of
infrastructure
Continuous
quality
measurement,
cost/performance trade-offs
Risk Management
Security is still and issue - manage it: firewalls,
encryption, minimize conversion, standardize
data formats (esp. new data)
Initial cost of integration and information
architecture w/sustaining cost
Flexible communications strategy allowing for
technological upgrades
Schedule management
Cost management
Team training/team building
Collocation
SDE, change management, change tracking from
common
database
managing
end
item
relationships
Reduced defects
Incremental delivery
Improved:
change management
maintainability
reliability
supportability
operability
22
The TLIM Strategy in this section describes the CALS Environment the program intends to
develop and implement for use throughout the DS life-cycle. A properly developed TLIM
Strategy will lay a firm foundation for Stage 2 The Development of a Through Life
Information Management Plan.
This in turn will provide the basis for establishing the
contractual requirement for information to support the intended ways of working over the rest of
the DS life-cycle.
23
Analyse User
Requirements
Define
Information
Management
Plan
Define
Information
Requirements
Define
Infrastructure
Requirements
Figure 3-1 Through Life Information Management Plan Steps
The mechanism for developing and supporting this Shared Data Environment is a Through Life
Information Management Plan. This TLIM Plan is necessary to provide an orderly transition of
information and data requirements throughout the life-cycle of a defense system. There are a
number of different owners of the data throughout the evolution of a defense system. The ability
to transition in an orderly manner from one owner to another is key to providing life-cycle
support to a defense system.
This SDE will support the systems engineering process through which technical data can be
collected, managed, and used to support concurrent engineering, continuous design and program
reviews, and can be continued into the operational phase of a defense systems life-cycle.
Even if an SDE cannot be created for this specific program, a TLIM Plan will be needed to
address the orderly management of information. In such case, the TLIM Plan should address the
specifics of data exchange and Interchange Specifications.
Similar to selecting the logistics support concept early in a programs life-cycle, the SDE
concept must be established as early as possible. The activities of the information management
group closely parallel those of all other groups, i.e., design, logistics, and production engineers.
The information management group must be given equal status with other DS program groups
such as design, logistics, and production. The products of the information systems engineers
must fully support, and be used by, the other traditional engineering disciplines. The means for
24
achieving this is through an Information Management Plan and the concurrent development of
data, software, and hardware infrastructures to support program management, engineering, and
logistics data needs. Early buy-in of this concept is essential for the successful implementation
of an integrated CALS-supported environment.
By achieving this Shared Data Environment, the other benefits of concurrent engineering,
continuous review and approval processes, and better configuration management can be attained.
The SDE provides the structure and the mechanism on which the defense systems technical and
operational data will reside.
Table 3-1 shows the relationships of each phase in a product life-cycle to its associated
information management planning function and activity.
Table 3-1 Major System Life -cycle Phases and Information Management Activities
Program Phase
Pre-concept
25
Program Phase
Production and/or construction
[Production]
System use and life-cycle
(consumer)
[Deployment and Operations]
support
System retirement
[Disposal]
The scope of the information covered by the TLIM Plan is up to the individual program.
However, to clearly identify and standardize all of the information on a program is too complex
an effort and not necessary from a NATO perspective. The NATO CALS focus is on throughlife product identification and in-service logistics support. In particular, NATO is focused on
keeping the product related technical information to support these business functions in
synchronization with the changing product.
NATO is developing a NATO CALS Data Model to support the following product related
technical data and information:
Figure 3-2 depicts the scope for the NATO TLIM Plan.
development of the TLIM Plan for an individual program.
26
Program
Strategy
Analyse User
Requirements
Information
Requirements
Define
Infrastructure
Requirements
Infrastructure
Requirements
Develop
Information
Management
Plan
Information
Management
Plan
IT Infrastructure Analyses
Telecommunications
Policies
Network Architecture
Protocols
Bandwidth
Security
Internet
Information Standards
Software
Operating System
Database
Workflow
CAD/CAM
Product Data Management
Documentation
LSA
GroupWare
EDI
Internet
Email
Bulletin Board
Hardware
Computer architecture
System Back-up
Physical Media
Output Devices
Computer Graphics and Monitors
Input Devices
28
Implementation Plan
Functions
Hardware
User
Software
Information
Services
Infrastructure
Data Management
Schedule
Contractual
Legal
Financial
Program
IMP
Risk Management
Responsibilities
Technical risk
Governmental
Commercial risk
Industrial
29
An organization needs time to overcome the "sticker shock" that is usually associated with these
Projects. If one waits until after Vendor Selection to determine and publish cost information, the
project will likely be on hold while the cost/benefit information is scrutinized and validated.
Meanwhile, the project has lost momentum and the team will become demoralized or be
disbanded. That is why it is important to complete the Business Case right after the scope is
determined in the Initial Requirements Study.
Newcomers to this technology usually have a difficult time in determining the costs; vendors can
help in setting product costs, while consultants can aid in determining overall project costs.
Of course, the cost estimates will evolve as the Project matures through the Requirements phase.
Now there is a cost model that can be used to assess the impact of decisions made during the
Requirements phase.
A more complete discussion of this topic with a sample outline of "how to" may be found in
Section 8.1.4 of this handbook.
3.5.3 Benefit Determination
3.5.3.1 Benefit Indication
The benefits of an EDM or PDM implementation are numerous. Many individual benefits that
can be determined by brainstorming, interviewing, research in industry publications, engaging
consultants, etc.
3.5.3.2 Benefit Classification
A business case presentation is an exercise undertaken to answer one question in the mind of the
approver(s): "Convince me that this investment is financially sound." Therefore, the validity of a
given benefit is primarily a perception of the listener and only secondarily an inherent property
of the benefit. Benefits therefore must be classified into what are perceived as "strong" and
"weak" arguments. Obviously, the "strong" benefits are emphasized while the "weak" benefits
are de-emphasized or eliminated.
Figure 3-3 shows benefits classified in terms of specificity and technique. A "broad brush"
analysis is usually stated in very general wording. For instance, "Engineers spend XX% of their
time looking for information. With EDM system, we will save some portion, say 50%, of that
time." This is much less convincing than an analysis of a specific situation. Specific situations
may include shop floor drawing retrieval, ISO quality manual management and distribution,
supplier drawing review and approval.
30
Specificity
Situational
Broad
Brush
Interesting
Convincing
Very
Convincing
Totally
Unconvincing
Interesting
Somewhat
Convincing
Conjecture
Statistical
Deterministic
Analysis Technique
Figure 3-3 Strength of Benefits
The analysis technique also impacts how the benefit argument is perceived. Here is an example
of such an argument based on conjecture. A Sales Executive says, "If we managed our
documents better when we are preparing bids for our customers, we would win about 10% more
of the work that we compete for." This argument, while it might be correct, is difficult to
substantiate, so it is only compelling to the extent that the Executive is respected in the
organization. It will only work when he is personally promoting it.
A statistical analysis is stronger than guessing, for example, using this method in analyzing how
the frequency of scrap and rework events related to the timing of drawing availability, in a fast
track design/construction environment.
In this case, detailed information was available
regarding the timing and frequency of events associated with drawing transmittal. In addition,
detailed information was available which related scrap events to drawing errors that could have
been avoideda necessity since not all scrap can be avoided by implementing EDM. Statistical
arguments are difficult to convey because of the complexity of the mathematics involvedif you
use them, you must pay close attention to how the data is presented. A prime benefit of EDM is
cycle time reduction, often demonstrated using a statistical analysis.
A deterministic analysis is the most compelling. This involves a detailed analysis of a specific
business process. Consider: "A person in the plant requires about 30 minutes to walk to the
drawing vault, identify the drawing needed, and get a print. This happens 7,300 times a year.
This time would be reduced to, say, 3 minutes per transaction, with EDM on the shop floor."
This type of analysis can be applied to any business process that is observable and can be
measured in real time.
31
Costs are, in fact, a time serieshardware, software and service cost events usually occur
repeatedly.
3.5.5 The Analysis
Unit costs and unit benefits are necessary, but do not provide sufficient information to determine
the viability of a project. We must know when these cost and benefit events occur, and this is
determined in the Rollout Model.
3.5.5.1 Rollout Model
In larger systems, e.g., large, multi-discipline engineering organization, weapons production and
deployment, manufacturing company, the entire system is not installed on day 1. In practice, an
"initial system" is installed, and then deployed or "rolled out" elsewhere. The dimensions of the
rollout include adding:
Users
Concurrent users
32
New applications
New functions
Departments
Buildings and special facilities
Remote sites
Depreciation
Leasing
Maintenance costs
Manpower costs
Capitalization of services
Infrastructure costs (e.g., networks)
33
CALS
Information
Management
Plan
Develop
SOW
Contract
Implement IT
IT
Infrastructure
Implement
Data
Models
Shared
Data
Environment
34
The SOW should specify all requirements that the offeror must propose and adhere to once the
contract is awarded. In many cases, the offeror will be required to provide services in support of
the SDE. This is called a Contractor Integrated Technical Information Service (CITIS). When
industry is requested to provide an on-line information service, a Service Level Agreement
should be required. A Service Level Agreement specifies the following:
Service Level Agreement
Description of On-line Services
Interoperability and Integration
Systems Administration
Access and Availability
Data Rights and Protection
Security
User Training and Support
Charges and Fees
Licensing
Upgrade and Migration
Rights and Warrantees
CITIS reference and SOW information is located in Section 8 of this Handbook
It is recommended that the offeror submit a CALS Implementation Plan (CALSIP) as a separate
cohesive item in the offer. This serves the purposes of isolating the CALS requirements so they
can be specified, evaluated, priced, measured, and modified.
Reference information on developing a SOW and sample SOW language for a CALSIP is
located in Section 10 of this Handbook
4.2 Place CALS on Contract
In selecting an offer, significant value should be placed upon the CALS response. The following
is a prioritized list of general areas to be examined for cost, benefit, and risk:
35
The solicitation should not prescribe a specific system solution for this reason, and the industrial
implementation may be phased at the start of the contract to accommodate the following:
36
37
38
Shared Data
Environment
New
Information
Update
Information
Updated
Information
Access/Distribute
Information
Current
Information
Archive
Data
Store
Information
Feedback
39
40
6.0 MODELS
6.1 The Through Life Business Model
6.1.1 Purpose of a Through Life Business Model
The Through Life Business Model (TLBM) is a tool designed to help defense system programs
manage change. It presents a vision of how NATO can improve its acquisition and logistic
processes for multi-national programs by making best use of information technology over the
DSs life-cycle.
Information is going digital. This is changing the way work is done. DS programs have a
growing requirement to share information across boundaries. See Figure 6-1.
NATO
Armed
Forces
Program
Office
Sub
Contractor
Prime
Contractor
A Baseline Description of the Life -cycle: The TLBM provides a common, agreed
description of the major life-cycle activities and information flows that a program will
need to address.
41
Exploring Boundaries: the TLBM can be used to explore the allocation of roles and
responsibility across organizational boundaries. Marking TLBM activities to show the
responsible organization(s) can provide a deeper understanding of:
Current responsibilities
Information exchange requirements
Opportunities for Change
Implementing Change: For maximum benefits the TLBM should be used, and further
developed, as one active component in a program of business change.
Most change programs have an IT component. The TLBM is one of a series of tools developed
by NATO to help managers make best use of IT. The others are:
DS programs embarking on change can use the TLBM, in conjunction with other NATO CALS
products, as a starting point for modeling their future processes and as a tool for developing their
information requirements. The TLBM illustrates the improvements that are possible when
information is fully exploited. The TLBM provides:
Enablers:
A Concurrent Engineering approach.
Multi Disciplinary Groups, or Integrated Project Teams,
Electronic interaction between participants, based on a Shared Data Environment,
maintained for the life of the program.
Techniques:
Improved requirements management, sustained through life.
Consistent life-cycle Strategies for managing risk, quality, configuration, acquisition
(and re-supply), support, and program information.
Project Optimization over the life-cycle.
Early through life cost modeling, and improved cost awareness.
Trade-off studies: capability, supportability, cost, risk, and in-service date are treated
as independent variables.
Continuous review and approval of predicted or measured performance against the
current requirement.
Optimization of the supply chain for acquisition and for support.
Optimization of support management based on feedback of in-service performance.
life-cycle management of roles and relationships giving a flexible boundary with
industry.
Information is managed as an asset.
42
An outcome:
Faster and cheaper acquisition.
Improved system availability.
Cheaper in-service support.
Safer disposal or re-use.
6.1.2 Developing a TLBM
6.1.2.1 TLBM Definition
A model to illustrate NATOs improved business processes for the through life management of a
defense system (DS) as enabled by a Shared Data Environment.
6.1.2.2 TLBM Scope
The model illustrates the core activities that are required to respond successfully to the Validated
Mission Need and Business Directives for the specific defense system program over its full lifecycle. Integration of the DS into any wider organizational or business context (e.g., armed force
or industrial company) is assumed to occur outside the model and is reflected by the acronym of
Input, Control, Output, Mechanism (ICOM) crossing the TLBM boundary, as shown in the
context diagram.
The TLBM model does not define the order in which these activities are to be performed, or the
organization/activity that may undertake them. In using the TLBM, DS programs will need to
tailor the model to reflect their specific relationships with Armed Forces and Industry. The
TLBM can be used to identify information exchanges between organizations by selecting the
activities (boxes) each organization will perform and noting the arrows that cross the
organizational boundary, as shown within the TLBM or at its boundary.
DSs will vary in the degree to which their support is integrated with the support of other DSs
operated by the relevant Armed Forces. The model includes all activities required to provide
support for a specific DS. Information required by others to support the integration of support
for the specific DS with the support of others DSs is reflected by ICOMs crossing the TLBM
boundary. The model reflects several activities that could be performed under contract. It does
not attempt to define relationships or interfaces into the industrial supply chain beyond the Prime
Contractor.
6.1.2.3 Purpose
Provide an illustration of SDE enabled improved business processes for DS through life
management.
The TLBM should be used as follows:
43
Provide a top level over view of the main activities through the DS life-cycle, as
enabled by an SDE.
- Draw attention to certain key activities that need to be managed in a consistent
manner through all life-cycle phases (CM, QA, ILS, IM).
- Illustrate, at a high level, the major information flows within the DS program lifecycle, so that the program management can see the totality of information to be
managed through life.
Support discussions and decisions of the likely impact, on responsibilities and on
information flows across boundaries arising from:
- Different organizational boundaries (within the project, between the project and
industry, between the project and the Armed Forces).
- Different SDE boundaries and capabilities.
- Show where the IM processes fit into through life activities.
- Provide a basis for the development of a program specific TLBM or other activity
models required solving specific problems.
- By members of NCO, and others, in presenting CALS concepts and ideas during
awareness activities.
- By other NATO or national agencies who are seeking to explore life-cycle issues
(e.g., Co-operative Logistics).
The TLBM was developed from the results of a series of workshops, arranged by the NATO
CALS Organization. Experts from NATO nations were brought together to establish how
information technology can be used to reduce costs, accelerate delivery and improve the
availability of a defense system, over its life-cycle.
The processes illustrated by the TLBM assume that a Shared Data Environment (SDE) will be
implemented within the defense system program, to captures information in digital form, as it is
created. Through the SDE, all program participants can access the information when and where
needed, in an appropriate form, for use many times without loss of intelligence or the need for
data re- entry. This SDE, which may be specific to the program, or part of a wider IT
44
infrastructure, enables the improvement of processes for acquiring, operating, supporting and
disposing of a defense system, as illustrated by the TLBM.
USED AT:
NCO
DATE: 3/10/98
WORKING
REV: 10/7/99
DRAFT
READER
DATE
TOP
RECOMMENDED
NOTES: 1 2 3 4 5 6 7 8 9 10
CONTEXT:
PUBLICATION
Business
Directives
Def
Pol.&
Stds
Laws &
Gov
Policy
Usage&support Ops
Policy
Prog
MANAGE A DEFENCE
SYSTEM THROUGH LIFE
DS Data to Others
Disposed Items
Inst to Ops
A0
Project
Pers
Existing
Infrastructure
Viewpoint: the viewpoint taken in the TLBM is that of the life-time owner of the
Defense System (DS). The life time owner is accountable for providing and
sustaining the specific DS, over its full life cycle, to meet the Validated Mission
Need and Business Directives agreed and maintained for that DS.
Responsibility for performing this role may be held by different organisations over time.
TITLE:
A-0
NUMBER:
TLBM 6.01
45
46
47
USED AT:
DATE: 3/10/98
WORKING
REV: 10/6/99
DRAFT
READER
DATE
CONTEXT:
RECOMMENDED
NOTES: 1 2 3 4 5 6 7 8 9 10
Validated Business
Directives
Mission
Need
Def
Pol.&
Stds
PUBLICATION
A-0
Ops Prog
Usage&support Policy
Inst to Ops
Feedback
fm Ops
Prg Dir
Current Req
Perf Rep
Core Product Data
Support Info
Trg Req
A1
Req Feedback
Eval Def
Spares & Components
OBTAIN DS
Goods &
Services
fm
others
Information
Services
Program
SDE
DS
ready
for
Ops
Predicted Perf
Tools & Facs.
A2
Returned
Items
SUPPORT THE USE of
the DS
TestFindings
Proc Spec
External
Data
DS
Data to
Others
Disposed
Items
Change Impact
A3
DS
needing
support
Feedback fm Maintenance
Evaluation Findings
Required Items
Project
Pers
NODE:
TITLE:
DISPOSE or
RECYCLE
A4
Items
for
Rfb
Existing Infrastructure
A0
NUMBER:
TLBM 6.01
48
Box A2 undertakes the work needed to obtain a successful DS and provide a support capability.
The scope of this work required can vary widely. At a maximum it includes all of the tasks
needed to establish the system concept, design, produce, test and deploy the system itself and
design, develop and commission a "special to type" support and disposal system, to provide inservice support. At a minimum, it could be limited to renting an existing system, owned and
supported by a third party, for use by the Armed Forces. The Obtain function generates a DS
ready for Operation, plus its "special to type" tools and facilities and all necessary spares and
components. It also provides as an output, ideally through the SDE, all of the data needed to
support the use of the system, including a prediction of its life-cycle performance. A2 also
undertakes the refurbishment of Items returned from A4.
Box A3 provides the support needed to sustain the DS fit for operational use, including
Operational and Servicing Tasks. Work is planned and executed as required by the Operational
Program. Tools, facilities, spares, and information needed for this are obtained from A2 or from
the Existing Infrastructure. Items no longer needed are returned to A4 for disposal or recycling.
Feedback on maintenance activities, and on evaluation findings is provided to A1.
Box A4 accepts the retired defense system and DS Items removed from service for disposal or
refurbishment. Items for refurbishment or recycling are returned to A2. Items no longer needed
are disposed of.
6.1.2.6.1 Establish and Control Defense System Program Through Life
Box A1 provides the control mechanism for managing the DS program over its life-cycle
through four linked activities.
In Figure 6-4 (Diagram A21), box A11 translates and develops the Validated Mission Need,
Business Directives, Usage and Support Policy, and other constraints imposed on the program by
external authorities into a program Current Requirement. This Current Requirement establishes
the performance and supportability characteristics that the DS program team is actually striving
to deliver. It is maintained over the life of the system, in an accurate and up to date form, to
communicate all approved changes. The Current Requirement includes all life-cycle support
requirements such as life, readiness, supportability, and availability characteristics. It includes
information on how the System will be used and maintained (a Use Study). Support Information
is fed back from A2 to assist in developing the requirement. Proposed changes to the
requirement are fed back from A14. Approved changes are communicated as updates of the
Current Requirement.
49
USED AT:
NCO
DATE: 3/10/98
WORKING
REV: 10/7/99
DRAFT
READER
DATE
CONTEXT:
RECOMMENDED
NOTES: 1 2 3 4 5 6 7 8 9 10
PUBLICATION
A0
Usage&support
Policy
Business
Directives
Ops
Prog
Support Info
Current Req
A11
DEVELOP LC
STRATEGIES
& POLICY
Change Impact
External Data
Required Items
Proc Spec
Information Services
Program SDE
A13
Predicted LCC
Perf Rep
COMPARE ACTUAL
SYSTEM STATE &
PERFORMANCE WITH
REQUIRED
Predicted Perf
TestFindings
Feedback fm Maintenance
Feedback fm Ops
Evaluation Findings
Inst to
Ops
A14
Change Proposal
NODE:
TITLE:
A1
NUMBER:
TLBM 6.01
Information on actual performance is fed back from Operations, from Maintenance and from
Support Evaluations to identify the need for change. The assessment activity generates a
performance report, noting any shortfalls evident and may result in change proposals affecting
the requirement, the defense system, of the DS Program. This activity will also address the
acceptability or otherwise of requests for waivers or concessions for components which fall short
of the design intent.
6.1.2.6.1.1 Develop Life -cycle Strategies and Policy
Certain key processes can benefit dramatically from the power of the Shared Data Environment,
provided they are managed over the life-cycle in a consistent manner.
In Figure 6-5 (Diagram A12), A122 identifies the requirement to develop address life-cycle
issues when developing an acquisition strategy. The acquisition strategy must consider what role
the original designers and suppliers will be expected to play after the initial acquisition, in order
to identify what, rights, information and experience the through life support authority will need
to acquire.
USED AT:
NCO
DATE: 3/27/98
WORKING
REV: 10/16/98
DRAFT
READER
DATE
CONTEXT:
RECOMMENDED
NOTES: 1 2 3 4 5 6 7 8 9 10
PUBLICATION
A1
External Data
LC Strat & Pol.
DEFINE LC
STRATEGY
AND POLICIES
DEFINE
ACQUISITION
STRATEGY
A121
A122
DEFINE RISK
STRATEGY
A123
Acq Strat
DEVELOP ILS
STRATEGY
Risk Mgt
Strategy
A124
DEVELOP CM
STRATEGY
AND PLAN
A125
ILS Strategy
CM Strategy
DEVELOP QA
STRATEGY
AND PLANS
A126
QA Strategy
DEVELOP CALS
STRATEGY & PLAN
A127
CALS Strategy
NODE:
TITLE:
A12
NUMBER:
TLBM 6.01
51
Environment, with a Concurrent Engineering approach and Multi Disciplinary Groups at last
makes it truly possible to integrate logistic activities fully into the rest of the life-cycle.
A125 draws attention to the importance of Configuration Management, which, in a Shared Data
Environment is both easier to do and has critical significance. The major CM data flows are
illustrated in the TLBM. A125 is added to TLBM to draw attention to the need to develop a
clear life time strategy for configuration management, as early as possible in the life-cycle
addressing the requirements of all parties over the life-cycle who will need configuration data or
make configuration changes.
A126. Quality Assurance over the life-cycle involves massive volumes of data and is crucially
dependent on reliable access to historic records.
Appropriate early action, linked to the
development of the program SDE, offers the prospect for major improvements in quality through
access to better data, and substantial reductions in quality related costs.
A127 highlights the requirement to invest significant effort in the analysis of the life-cycle
information requirement, by developing a CALS Strategy. Full guidance on this topic is
provided by the NATO CALS Concept of Operations (NCOPS), and is not repeated here.
6.1.2.6.1.2 Establish and Run the Defense System Organization
This activity defines what needs to be done to deliver a DS program to fully satisfy the Current
Requirement (A131). It also identifies who will do the work (A132), establishing the necessary
contracts (A133) and managing the three key resources needed to deliver the program: money
(A134), people (A135), and information (A136).
In Figure 6-6 (Diagram A13), A131 defines the tasks to be performed and services to be
provided, in response to the Current Requirement and Change Proposals and develops a Program
WBS to define the necessary tasks. The WBS is also assumed to include the development of any
Service Level Agreements needed to specify the standard of ongoing services. A131 also
initiates the work needed to assess the impact of proposed change, and based on the results,
decides whether to implement or reject the change. Approved changes are implemented by
updating the WBS or Task list, amending the Current Requirement if needed. A131 also
develops and publishes the high-level program plans needed to define when activities should be
undertaken.
52
USED AT:
NCO
DATE: 3/26/98
WORKING
REV: 10/15/98
DRAFT
READER
DATE
CONTEXT:
RECOMMENDED
NOTES: 1 2 3 4 5 6 7 8 9 10
PUBLICATION
A1
Current Req
Change Proposal
Program WBS
MANAGE
PROGRAM
SCHEDULE
Proc Spec
Prg Dir
Program Schedule
Org Structure
A131
ESTABLISH
ROLES and
RELATIONSHIPS
A132
Activities to be contracted
Perf Rep
Required
Items
PLACE &
MANAGE
CONTRACTS
Contracts
& ITTs
Contract Dir.
A133
Budget Req
External
Data
Available Funding
MANAGE DS LC
FUNDING
Change
Impact
Predicted LCC
A134
MANAGE HUMAN Allocated Manpower
RESOURCES
Financial Implication
A135
MANAGE DS
INFORMATION
Information
Services
Program
SDE
A136
SDE Req.
TITLE:
A13
NUMBER:
TLBM 6.01
publishing Technical Manuals, which are replaced by information provided through the SDE.
Outputs are provided to A133 to define the information and IT products to be acquired by
contract.
6.1.2.6.1.2.1 Place and Manage Contracts
Figure 6-7 (Diagram A133) briefly illustrates the major activities in placing and managing
contracts. The requirement should be noted for historic data from other programs in developing
a contract strategy (External data) and for significant feedback from maintenance and operations,
to assess the performance of reliability or in service availability clauses. This is provided by the
Performance Report. The proposals received in response to the ITT are treated as part of
External Data.
USED AT:
NCO
DATE: 4/3/98
REV: 10/7/99
WORKING
READER
DATE CONTEXT:
DRAFT
RECOMMENDED
NOTES: 1 2 3 4 5 6 7 8 9 10
Program
Schedule
PUBLICATION
A13
Available Funding
External Data
Required Items
DEVELOP CONTRACT
STRATEGY
Activities to be contracted
Contract
Strategy
Proc Spec
A1331
A1332
ASSESS PROPOSALS
A1333
Selected
Contractor
Contracts
& ITTs
RUN CONTRACT
Contract Dir.
Perf Rep
A1334
NODE:
TITLE:
A133
NUMBER:
TLBM 6.01
54
USED AT:
NCO
DATE: 4/14/98
REV: 10/16/98
WORKING
READER
DATE CONTEXT:
DRAFT
RECOMMENDED
NOTES: 1 2 3 4 5 6 7 8 9 10
PUBLICATION
Program
Schedule
A13
SDE Req.
Program
WBS
DEVELOP
IM PLAN
External Data
A1361
IM
Plan
ESTABLISH &
OPERATE
Program SDE
A1362
PROVIDE
INFORMATION
SERVICES
Information Services
A1363
NODE:
TITLE:
MANAGE DS INFORMATION
A136
NUMBER:
TLBM 6.01
55
USED AT:
NCO
DATE: 5/20/98
REV: 10/15/98
WORKING
READER
DATE
CONTEXT:
DRAFT
RECOMMENDED
NOTES: 1 2 3 4 5 6 7 8 9 10
PUBLICATION
A0
Prg Dir
Current Req
Ops
Prog
Trg Req
Proc Spec
Eval Def
External Data
Req Feedback
Support Info
DEVELOP DS
Predicted Perf
Goods &
Services fm
others
Change Impact
Core Product Data
Test Def
As-built Config
PRODUCE DS
DS for Deployment
Items for Rfb
A22
TestFindings
CONDUCT TESTING
Items
for
Test
DS ready
for Ops
A23
Users
DEPLOY DS
Spares &
Components
Tools & Facs.
A24
Project Pers
NODE:
TITLE:
OBTAIN DS
A2
NUMBER:
TLBM 6.01
56
outputs are an Operation System, components, and spares, in their required locations and ready
for operational use.
6.1.2.6.2.1 Develop Defense Syste m
The activity of developing potential or actual solutions to the VMN starts as a response to the
first issue of the Current Requirement by developing and selecting a DS concept (A211),
Figure 6-10 (Diagram A21). External Data is required to allow alternative concepts to be
explored and evaluated, in the form of necessary information on the performance, costs and risks
of other DS options.
The DS Concept must address both operational (e. g system performance capability) and support
aspects (e.g., life, readiness and availability).
A212 begins the process of turning the concept into an engineered solution by defining a
functional architecture for the intended system and defining the test and evaluation criteria
against which solutions will be evaluated. Although this task will be performed early in the
system life-cycle, it may need to be repeated many times in response to shortfalls of performance
or proposed changes to the operational system or to its support. A212 also undertakes the work
needed to decide whether various elements of the intended DS will be designed and produced
under the direct control of the life-cycle owner, or be purchased by contract. Details of Required
Items are fed- back to A13 for purchase planning and contract action. The Functional
Architecture is fed forward to provide a start point for the engineering design.
The design of the Operational System and its related support is undertaken concurrently, by an
MDG, through three linked activities: Engineering Design (A213), Failure Modes and Criticality
Analysis (A214), and the design of the support system, through Logistic Support Analysis
(A215). Engineering Design provides two outputs. The Core Product Data provides a definition
of the product to the level needed for the purposes of support and operations. Core Product data
includes the identity, version, definition, properties, classifications and characteristics of all parts
likely to be exchanged during the in- service life and the assembly structure of the defense
system (the Design Configuration) including permitted options and variants. A second output
provides the additional data needed for production and refurbishment. The detailed models,
calculations, and design data used to derive and justify the design are retained within A212, and
are not made available to other program activities. For this reason a feedback loop is through
A212 to establish the technical implications of any proposed changes, or off- design condition.
A214 uses the functional architecture and product structure to identify failure modes, symptoms
and effects as an input to LSA and as an aid to subsequent maintenance.
57
USED AT:
DATE: 3/27/98
WORKING
REV: 10/15/98
DRAFT
READER
DATE
CONTEXT:
RECOMMENDED
NOTES: 1 2 3 4 5 6 7 8 9 10
PUBLICATION
A2
Prg Dir
Current
Req
External
Data
In Service Goals
TestFindings
DEVELOP
CONCEPTUAL
OPTIONS DS Concept
Change Impact
Proc Spec
A211
Test Def
DEFINE DS
Eval Def
Functional Architecture
A212
Mfr & Rfb data
ENGINEERING
DESIGN
A213
FAILURE
ANALYSIS
Support Info
A214
Existing
Business
Info
FMECA
Data
DESIGN THE
SUPPORT
SYSTEM
Req Feedback
Trg Req
Predicted
Perf
PREDICT LIFE CYCLE
PERFORMANCE
A215
Support Equipment Requirements
A216
Users
NODE:
TITLE:
DEVELOP DS
A21
NUMBER:
TLBM 6.01
58
A32 provides storage, transportation, and issue as required of spares and other items needed for
maintenance, based on the deliveries from A2.
USED AT:
NCO
DATE: 3/10/98
REV: 10/16/98
WORKING
READER
DATE CONTEXT:
DRAFT
RECOMMENDED
NOTES: 1 2 3 4 5 6 7 8 9 10
Prg Dir
Current Req
PUBLICATION
Ops
Prog
A0
Req
Feedback
Eval Def
Trg Req
External Data
Required
Items
PLAN
SUPPORT
Spares &
Components
A31
Support Plan
Req Config
STORE
TRANSPORT &
ISSUE ITEMS
A32
Items for
Use
Returned
Items
MAINTAIN,
UPDATE &
PROVIDE
FEEDBACK
Support Info
DS needing support
Feedback fm
Maintenance
Maintained
DS
O&S TASKS
A33
As-maint Config
A34
MANAGE
FACILITIES
A35
Trained People
TRAIN
SUPPORT
STAFF
A36
CONDUCT
EVALUATIONS
Predicted Perf
A37
In-Scope EvalFindings
Tools & Facs.
NODE:
Evaluation
Findings
TITLE:
Existing Infrastructure
A3
NUMBER:
TLBM 6.01
59
A37 evaluates the performance of the support system, in relation to predicted performance, in
accordance with the definition provided from A212.
6.1.2.6.4 TLBM Activity Definitions
Activity definitions are included in Appendix C.
6.2 NATO CALS Data Model
6.2.1 Introduction
6.2.1.1 Motivation
Modern defense systems cannot operate without ready access to large quantities of technical
information. This information is an asset as valuable as the physical hardware itself.
Today, technical information is created in digital form. This behaves differently from the same
information on paper.
The opportunities are enormous but new problems and risks are
implicated.
A major problem arises when multiple organizations need to use the same
information. Differences in data definition and data format block communications between
partners and require development of expensive interfaces. Too often, data is locked into the
application in which it is created forcing the use of proprietary solutions. As a result, many IT
systems that ought to be offering business improvement act, in practice, as barriers.
To address the above issues, the NATO CALS Data Model (NCDM) defines a common set of
data definitions that can be used to achieve consistency of interfaces at the information level
without requiring standardization of hardware or software. The role of the NCDM is to
standardize content of a life-cycle repository for defense system technical information with the
objective that Armed Forces with different Information Technology infrastructure, e.g., different
hardware and software platforms, can make use of the same technical information.
6.2.1.2 Information Modeling
Raw data is not information. Two parties can only exchange data in conjunction with an
agreement on the meaning of the data. Consider the number 1964. This number is data
without information. The data becomes useful if we add the information that it is a year (1964),
or the number of people attending the 98 CALS Europe Conference. Although the data is the
same in both cases, the information is different.
An information model addresses the underlying meaning of data regardless of technology. A
model describes meaning through structure and correctness constraints. It does not specify
encoding techniques for data values.
The NATO CALS Data Model uses EXPRESS as a formal language for specifying information
requirements.
60
EXPRESS is an ISO standard (ISO 10303-11) and has been used by STEP, POSC, and other
projects to describe the information requirements of many engineering activities.
The function of EXPRESS is to describe information requirements and correctness conditions
necessary for meaningful data exchange. An EXPRESS information model is organized into
schemas. The NCDM, for instance, is organized in five schemas. These schemas contain the
model definitions and serve as a scoping mechanism for subdividing large information models.
Within each schema are three categories of definitions:
NCDM in this sense is very similar to what is done today when data elements are contracted
according to legacy standards (e.g., MIL STD 1388). The advantage of using the NCDM resides
in the quality of the contracted data. The model gives an integrated view of data where design
data like system physical and functional breakdowns are integrated with support data and with
the data needed to make technical documentation available.
Text appearing as [times roman italics] in the following paragraph is provided as a sample
language that can be used in developing the data requirements for a Request For Proposal (RFP)
or Request for Quotation (RFQ) SOW.
The contractor shall provide configuration and design data that could support the
production of Bill of Material (BOM) Reports and of Labeled Occurrence, Multilevel,
Indented Product Structure Reports. This data shall be in the form of instances of the
following NCDM entities:
-
The contractor shall provide NATO STOCK NUMBERS (NSN), in the format
defined by the NATO Codification System, for the items delivered. The NSNs shall
be in the form of instances of the following NCDM entities:
-
Product
Product_version
Structured_product_definition and its subtypes as needed
External_product_identifier
Product_identification_assignment
Product_identification_category
Characteristics and Management data associated with the NSNs shall be provided in
the form of instantiation of the following NCDM entities:
-
Characteristic_assignment
Characteristic and its subtypes as needed
The business case to evaluate opportunities to move from legacy standards to the NCDM is
outside the scope of this document.
6.2.1.3.2 Defining a Common Vocabulary
There is a flow of information (e.g., Defense System Technical Information) between the
industry, originator of the data, and the Armed Forces, users of the same data.
There could also be a need for data exchanged between Armed Forces of different NATO
nations. When parties with different software and hardware platform need to share the same
information, the need for interfaces arises. These are sophisticated and expensive software that
acts as translators between different systems.
62
B
A
D
E
B
C
A
NATO CALS
Data Model
D
E
63
The strength of relational systems is in their ability to store large amounts of data in a highly
normalized, tabular form, and to perform efficient queries across large data sets. Relational
systems use SQL for both data definition and data manipulation.
Unfortunately, EXPRESS does not include a construct to create relational tables automatically.
A method of mapping the NCDM to a relational database was experimented during the Rig Test.
In this method, each entity is mapped to a table with columns for attributes. Each table has a
column with a unique identifier for each instance. Attributes with primitive value are stored in
place and composite values like selects, and aggregates are stored as foreign keys containing the
unique instance identifier. Inheritance is normalized out of the tables. The table for each entity
type contains the local attributes defined by the entity and uses the instance identifier as the
primary key. A complete entity instance, with all inherited attributes, can be reconstructed by a
join on the identifier across all tables in the type hierarchy.
Other conflicts that ought to be addressed to implement the NCDM in a relational database are
the following:
The relational model does not directly support the union construct. EXPRESS Selects are
simulated by a table with a column for each possible member type. Only one column in
each row contains a value. The remaining columns are empty;
Relational systems primitive data types are not as extensive as those of EXPRESS are. A
mapping is therefore needed to link the NCDM data types with those supported by the
selected relational system;
Relational systems need to know the length of the each field in the database. This
requires further data analysis since no attribute length is defined in the NCDM;
Finally, EXPRESS imposes no limit on the length of type or attribute names, while the
NCDM define entities and attributes with long names. Some relational systems restrict
the length of table and column names to 30 characters. Name length conflicts in this case
need to be resolved.
Potential users of an Integrated Product Database build around the NCDM are the industry,
Defense System project teams, and the NATO Armed Forces.
6.2.1.3.3.1 In the Industry
The need for the industry to integrate their engineering processes around integrated product
database is becoming increasingly evident.
Engineering applications have unusually complex information models.
These information
models are complex because engineering applications manipulate simulations of the real world.
Models for areas such as CAD geometry, tolerances, materials, and manufacturing plans are
structurally and semantically rich. Applications are similarly complex, and are tightly bound to
the models. Often, the information exists only as program language structures taken from a
primary application, usually a PDM or CAD system. Subsequent applications must be modified
whenever the primary application changes.
64
The resulting situation is that only special-purpose databases, controlled by PDM and CAD
vendors, are used to describe complex products.
Designers and Manufacturers do not have any control over their product databases, which is
clearly undesirable for strategic reasons. In addition, the customers request for complex design
data together with the logistic support information in an open format accessible by off-the-shelf
DBMS, is not easily addressed.
To overcome the above problems, design and manufacturing companies need to integrate their
engineering processes around product databases (Figure 6-14).
CAD/CAM
PDM
LSA tools
Integrated Product
Data Base
users
In a Project
65
A major value of an Integrated Product Database is that it can support remote access by any
authorized user. The project team can make use of this feature to obtain ready access to the data
while it is created. The advantages of this are obvious, for instance:
Verification that system requirements are met can be assessed in real time;
Verification of database accuracy and completeness can be assessed more easily and
accurately.
Text appearing as [italics] in the following paragraph is provided as a sample language that can
be used in developing the data requirements for a Request For Proposal (RFP) or Request for
Quotation (RFQ) SOW:
The contractor shall provide a cost effective method of implementing an
integrated product technical database based on the NATO CALS Data Model
such that appropriate configuration and version control of the system is
maintained aligned with technical information needed to support it through-life.
6.2.1.3.3.2 In NATO Armed Forces
Several NATO nations are investing heavily in major infrastructure programs to provide logistic
support for their armed forces. The NATO CALS Organization does not intend to recommend a
specific hardware or software solution that all the various parties would be required to adopt and
integrate with their existing infrastructure systems.
The NCDM, by standardizing at the information level, offers the opportunity to define a new
Information Infrastructure built around a Defense System Technical Information Database.
The benefits of such repository of technical information for all available weapon systems are
self-evident.
Benefits that are even more dramatic could be achieved if the Defense System Technical
Information Database is implemented in a consistent way across NATO by all Nations. In this
case, the realization of a NATO Distributed Database for Defense System Technical
Information will be achieved. NATO Nations working together (e.g., Combined Joint Task
Force) could then be allowed to access each-others weapon system technical database on a need
to know basis.
6.2.1.4 How to Implement the NCDM in a Program
NCDM could be implemented in a program. The following diagram loosely follows IDEF0
notation and illustrates the activities required to build an IT system around the NCDM.
66
Entities/Subtypes
Attributes
Relationships
Integrity Rules
Business Model
Data Requirements
Technical Environment
Business Rules
Attribute Formats
Create Physical
Data Model
Performance Consideration
Input Data
Tables
Columns
Keys/Indicies
Triggers
Empty Database
Business Processes & Funct.
Create &
Update Data
Populated Database
Software Applications
Import/Export Interfaces ( STEP/PDM)
NATO nations should confirm acceptance of model definitions and formally endorse the
NCDM;
NATO should define Attribute Formats and seek agreement of nations;
NATO should develop and agree with partners a set of Business Rules.
The followings do not need to be agreed at NATO level and can vary from program to program:
67
These three groups have had equal priority. This is necessary, as the contractual boundaries
between them are becoming increasingly variable.
This information has been covered by several existing standards, such as MIL-STD 1388,
AECMA Spec 1000D, and AECMA Spec 2000M. The NCDM takes an integrated approach to
the data covered by these specifications but also recognizes the possibilities for other kinds of
data such as design information and multi-media. It does so in a way that should enable current
approaches to be followed while enabling richer and more effective new methods to be applied.
The NCDM is presented as a data model so that it can be used as the basis for data exchange,
sharing and for system development. The approach being followed is related to that used in the
ISO 10303, Standard for Product Data Exchange (STEP). Like STEP, the NCDM is intended to
be equally applicable in both civil and military arenas.
6.2.2.2 Business Drivers
To justify change there has to be advantages and benefits from the new approach over the old.
The objective of this section is to identify some of the reasoning behind the development of the
model in terms of the business problems and requirements it addresses.
The NCDM forms an integrated model that has been achieved in such a way that:
The resulting database can both act as a common-source database for technical
publications and hold the base information used to create (some of) the documents. The
model enables SGML strings to be stored directly. This matches the conclusions of the
Technical Publications sub-group of the harmonization workshops;
The various legacy-numbering schemes such as LCNs can be incorporated and used if
desired but are not required (and can therefore be changed and adapted as required in the
future). The model should allow for easy integration of analyses performed separately;
The capabilities of MIL-STD-1388 for describing tasks and resources have been
generalized to provide complete information rather than forcing short-cuts which lose
necessary information;
68
The existing approaches make considerable use of encoding. In the model most of these encoded
items are modeled as the real data (that which is obtained by looking up the meaning of the
encoding. However, to support legacy data, provision has been made for the encoding (and the
identity of the standard which defines the encoding) to be held. This is always optional.
6.2.2.3 The High Level Model
A very basic simplified view of the model is shown below:
Product
Task
Anomaly
69
Information
Object
Product
Task
Anomaly
generates_uses
personnel
facility
spare_
part
support_
equipment
procures_
provides_
owns
operates
realised_as
tech_pubs.tech_information
requirement
for_product
is_maintained_by
product of_product
packaging
_handling
_storage_
transport
resource requires
task
defines
product_
analysis of_
_data product usage
component_
assembly
usage
characterized
_by S[1:?]
of_product
S[0:?]
information
defined_
by
organisation
supports
conditions
product_
definition
describes
representation
illustration
shows
70
There are other major aspects and specific details applicable to the current content, both in the
existing standards and outside of them, which will be developed in future versions of the model.
6.2.3 The Core Model (CoreModel)
6.2.3.1 Overview
The core of the model centers on the following:
Product identification;
Product structure (how products are used to build other products);
Product definitions, including functional and other breakdowns.
Here (and throughout the model), the term product is taken to have a very general meaning. A
complex item (such as a helicopter) is a product but so is a simple washer, nut, or bolt. Clearly,
we are unlikely to provide a functional breakdown of a nut or bolt but they are still products in
that someone will have to provide identifiers, to design, manufacture and potentially to sell them.
This general view of product is taken from the STEP standard where a product is defined as: a
thing or substance produced by natural process or manufacture.
The starting point for the NCDM was to re-use aspects of the STEP model to ensure general
compatibility with STEP. Hence, the central product area of the NCDM follows the STEP form
and re-uses the STEP approach to product structure. (Here product structure means the way in
which one product is assembled from other products.) The ability to define other views of a
product, such as functional or zonal breakdowns was then added. These additional views are
then used to attach related information.
6.2.3.2 Description
The starting point is product. From STEP, the NCDM follows the convention that the product
entity represents the core concept of a product, i.e., its identity, and not the information that is
associated with the product. Such information includes the identification, any versions, and any
more information that defines some things about the product. These two concepts are handled as
separate entities. This gives the starting point for the model as below:
71
*of_product
product
of_version
product_version
product_
definition
72
structured_product_
definition
parent_product_
definition
child_product_
definition
supplied_
version_
relationship
product_definition_
relationship
product_definition_usage
1
assembly_
component_
usage
measure_
with_unit
make_from_
usage_option
container_
usage
quantity quantified_assembly_
component_usage
next_assembly
usage_occurrence
specified_higher_ promissory_
assembly_usage usage_
occurence
Main assembly
Major subassemblies
73
SPD
NAUO
SPD
NAUO
NAUO
NAUO
NAUO
SPD
NAUO
NAUO
NAUO
SPD
NAUO
NAUO
NAUO
Physical
Functional
System
Zonal
and others
All of these basically define a hierarchy and are treated the same way in the NCDM. The
starting point is the breakdown entity (a kind of product definition) that identifies the specific
breakdown by name and description (all product definitions have these) and gives the type of
breakdown (e.g., functional). A number of standard types are allowed for in the NCDM and
additional types may be specified. The breakdown entity also points to the starting elements in
the breakdown. (Usually for a breakdown with a single root, there will only be one starting
element.)
Thereafter additional levels of breakdown are specified by means of
element_relationship entities. Both the EXPRESS-G and an instance are illustrated below.
74
form
breakdown_
type
breakdown
includes S[1:?]
definition
element_
definition
element
relating
related
element_
relationship
The links between elements are captured using the element_relationship entity. This is also true
of the links between levels of indentation in the traditional LCN numbering scheme. Thus for
the following LCN breakdown:
id
28
2801
2802
name
Fuel system
Fuel storage system
Fuel pressurization
There will be an explicit element relationship between the element with id 28 and that with id
2801. (Note it is also permissible to make the id of the fuel storage system element 01. The fact
that the fuel storage system is a part of the fuel system is captured by the explicit relationship and
so there is no longer a need to repeat the 28 in the id of the fuel storage system element.).
There are several types of element_relationship defined in the NCDM. These are necessary to
capture all the different links established in the breakdowns currently used for logistics, in the
MIL-STD-1388 LSAR or in breakdowns established for catalogues and manuals.
The following types of element relationship are allowed:
76
77
The NCDM treats the propagation of anomalies differently to the legacy standards. Instead of
following the logic dictated by the breakdown(s) being used (such as a functional breakdown), it
captures the cause-effect relationships. Thus, the effects of a given failure can be traced in a
manner that reflects the real physics and its equivalent functional impact.
6.2.4.2 Description
The obvious starting place is the product_anomaly entity. As explained above there are two
specific types of anomaly identified. These are failure_mode and damage. Failure results from a
physical problem of the product concerned while damage is externally caused. Damage is
treated as a special type of failure_mode. Either of these can also be specified as a
failure_mode_from_a_specified_source, which allows the source to be identified. This is to
allow for failure_modes defined in standard references, such as the predicted failures for certain
types of printed circuit boards.
Now for each failure, we may get some effects. These can be seen as falling into two major
categories: local symptoms (for example, increased engine smoke) and other failures (for
example, failure in an oil-pump bearing leading to failure of the engine)
6.2.4.2.1 Effects
Local symptoms are captured using the effect entity. This allows the effect to be described.
Effects are specified as an entity so that the same effect can be shared across multiple failures.
(This also allows the query: show me the failures that have this effect).
There is no direct link from failure_mode to effect. Instead, there is the mode_effect_assignment
entity that allows an effect to be associated with a failure_mode or with a combination of a
failure mode in an operational phase. Thus, the fact that the effect of a landing gear failure mode
is different during taxi than flight can be captured.
6.2.4.2.2 Causal Relationships
Traditionally the means to document a failure has been to capture its cause/effect via a functional
or hybrid breakdown. The NCDM allows the direct cause/effect relationship to be captured,
independent of the breakdown. The NCDM provides a general relationship entity between
anomalies. This is then subtyped to be the consequential_failure_relationship. At a simple level
the use of the consequential_failure_relationship is as shown below
failure mode 1
consequential
_failure_
relationship
causes
failure mode 3
failure mode 2
78
This figure says that failure modes 1 and 2 act as the causes of failure mode 3. In this case,
failure mode 3 will be specified as a consequential_failure_mode (a subtype of failure_mode). It
is possible that failure modes 1 and 2 are primary failures (the start of a cause-effect chain) in
which case they can be specified using the primary_failure entity. Alternatively, one or both of
them could be consequences of other failures.
Primary failures have a cause_description attribute that refers to a separate entity
(cause_description) to allow a common set of fundamental causes to be re-used across many
failure modes. Examples of such a cause description could be cracking through fatigue or
personnel error.
Now life is not always so simple and it may be that a particular failure will occur only if two
other failures occur together or if a third failure occurs on its own (not with the first two). This
accumulative logic, showing what combinations will occur, is known as roll-up.
failure mode 1
consequential
_failure_
relationship
failure mode 2
causes
xor_consequential_
failure_relationship
failure mode 4
failure mode 3
consequential
_failure_
relationship
xor_consequential_failure_relationship
and_consequential_failure_relationship
or_consequential_failure_relationship
together
79
80
methods
LIST
logistic_
task_method
Open hatch...
advisory_
task_method
logistic_
task_method
logistic_
task_method
Remove parts .
logistic_
task_method
Install new ..
81
This is
Both of these are aimed at two significant requirements: the reduction of duplicated descriptions
(by enabling sharing of the same information) and the intelligent (electronic) processing of task
descriptions (so that the LSAR can act as a direct source for interactive manuals).
Now it is appropriate to look at all the options for structuring tasks:
82
Specification documents
Engineering and other drawings
Manuals for products, including support equipment, calibration tools, etc.
Maintenance manuals for major sub-systems
EDIFACT and E-Mail messages
In fact, there will be such a variety that no attempt has been made to sort these types of
information into pre-defined buckets. Instead, the NCDM provides a kind of library facility for
holding information and linking it to the detailed information covered by the rest of the model.
Such links may be very general in nature, simply indicating some relevance of the document.
6.2.6.2 Description
The information object area of the data model is very general in that it can be used to support
several different processes. Some of these are identified below by listing the input, controls, etc.
An additional column identifies the suggested target for an information link from the resulting
information object(s).
83
Input
1. Task and task
method,
resources, etc.
Control
AECMA
1000D spec
Mechanism
Technical
writer
(person)
Various
(could be
AECMA or
in-house
defined
format)
Query and
report
function
Various
(could be
AECMA or
in-house
defined
format)
Various
(could be
AECMA or
in-house
defined
format)
Query and
report
function
4. Many tasks
and associated
data
Technical
editors
and/or report
generators
Output
One information
object containing
the Data Module
according to
1000D DTD
Two information
objects, one
containing the task
description, and
one containing the
parameters/instruct
ions for the
query/report.
One information
object, one
containing the
parameters/instruct
ions for the
query/report.
Publication
collection
equivalent to a
maintenance
manual
Linked To
Task method
assignment,
Product
Task method
assignment,
Product
Task method
assignment,
Product
This is the current traditional process of giving a technical writer access to the LSAR to
produce a data module. The NCDM lets the resulting SGML be stored in the same
database and potentially linked to the task description in the database.
The database is queried to produce a report that is the task description. Both the resulting
task description and the query are stored in the database. In the case of the query, this
allows the report to be updated as and when necessary.
In this case, the query only is held in the database and it is invoked when necessary. This
will support the use of the database as the source for an IETM.
A collection of task descriptions is published together as a maintenance manual.
This part of the NCDM is fundamentally simple but does not seem so because it contains many
recursive relationships. To help understand what this part of the NCDM supports, consider the
following analogy:
84
We have a collection of specialist papers (in electronic form) and a database that deals
with the same area.
The database includes a list of the papers and some key links from the list to the
corresponding data.
It also contains references to papers held in other collections.
New papers are created which are based on queries against the database and on the
existing papers and even the external references.
If a specific new paper is considered useful or valuable or is to be made available
externally, it is added to the collection of papers.
Occasionally an expert in the topic publishes either a single paper or a collection of
papers together. Extra information (such as the date of publication) is held in the
database for such publications.
This is roughly how the information object part of the model is structured:
Each paper, whether old or new, is an information object. New papers are added firstly
as information objects.
In the case where a new paper is the result of a query against the existing data, it is
marked as such (this is a derived information object).
The query itself is also stored (as an information object derivation). It is possible that the
query is more useful than the resulting paper and so only the query is kept (so it can be
re-executed on demand).
A paper that is not held in the local database is held as an information object too.
However, it has an external reference as content (using the curiously named document
entity).
The links from the papers back to the database are held using the information link entity.
Published papers are held using the publication collection entity that allows the date of
release and other similar information to be held.
85
6.2.7.2 Description
6.2.7.2.1 Scenario and Role
In the NCDM allowance is made for the likelihood that a system may be supplied to different
customers who may not only use it in different ways and environments but may also have
different resources (such as personnel skills) and different policies on maintenance. However it
is inevitable that the same failures will probably occur and that many tasks will be common
(e.g., the NH90 helicopter is intended for 11 different services across 4 nations). Rather than
force a separate copy of the database to be developed for each customer, the NCDM provides for
these differences through the scenario entity. This is then used in many places as the context for
assignments (such as a task to a product) to indicate that the assignment is applicable in the
scenario.
As a further refinement to this, the system may have multiple roles (for the NH90 these could be
submarine warfare, search and rescue, etc.) that lead to different maintenance requirements. A
scenario may include several roles.
6.2.7.2.2 Characteristics
It became clear during the creation of the NCDM that there is an enormous amount of data that is
covered by the existing legacy standards that is attached to the key ideas of product, anomaly,
and task (and the relationships between them). The data provides for many characteristic values,
varying from the familiar ideas, such as mean time between failures to much more obscure
values. Furthermore, many of these are provided twice (in the LSAR), once as a requirement
(from the assumed single customer) and later as a predicted value (provided by the
system/equipment supplier).
However, in the NCDM, these values can be specified as
requirements by different organizations (i.e., applying in a different scenario). Furthermore,
taking a view that goes through the life of the product, a measured value (based on fact rather
than prediction) may also be provided.
Given the potential number of such characteristics (see the combined data element lists of the
legacy standards), the NCDM takes a more general approach. Firstly, a characteristic (or one of
many subtypes) is used. In general terms, this defines a name, description, and value.
name
Characteristic
description
value
measure with unit
86
Characteristic
assignment
target
form
Characteristic
required
measured
...
87
88
The LCC models available today are Database Managers that have the capability, to varying
degrees, to import, modify, analyze, integrate, and manage large amounts of data from many
different sources. From this data, reports are generated that display or project the overall effects
and results of program decisions on existing or alternative system designs, including risks
thereof. These LCC models store a baseline of program decisions that can also be used to
provide a valuable, systematic audit trail. One major advantage of a few (but not most) of these
available LCC models is their ability to provide early input to the front-end design analysis stage
of the Concurrent Engineering (CE) and ILS processes. This early LCC influence on design
ensures the systematic and simultaneous design of both the end-item system, and the processes
by which they are produced, tested/evaluated and supported for their life-cycle.
Both NATO Program Managers and Industry CE and ILS teams need greater awareness of the
availability and capabilities of these LCC models. This knowledge must include how they can
best be used to ensure that fielded systems are successful (i.e., meet reliability, maintainability
and availability goals), both initially and over the life-cycle, and remain within, or below, their
established LCC budgets.
6.3.1.3 Life -cycle Cost Model Characteristics
LCC models are primarily Database Managers that accept and manage large amounts of data
imported from other programs, such as:
1. Level of Repair Analysis Models (LOR/LORA), (e.g., EDCAS, MCLORA, MIL-STD1390, NRLA, OSSAM, etc.)
2. Reliability Models (e.g., R1, RPP, Relex, etc.)
3. Spares Optimization Models (e.g., VMetric)
4. Failure Modes, Effects and Criticality Analysis Models (FMECA)
5. Work Breakdown Structure (WBS) Models (e.g., SDU)
6. Constructive Cost Model for Software LCC Analysis (e.g., COCOMO)
7. LSAR Databases (MIL-STD-1388-2B), (e.g., LEADS, L-Base, OMEGA, SLIC, etc.)
8. External ASCII Databases (e.g., Bills of Material, Provisioning, Engineering, etc.)
The LCC models should be capable of modifying (i.e., adding-to, updating, changing),
analyzing, calculating, mixing, and then sorting this imported data into information.
This
information is usable to determine which approaches are the most economical in terms of
Design-to-LCC analysis, including LOR decisions, during the front-end design analysis
stage.
The primary differences between the available LCC models can be grouped into one of the
following categories:
1. How user-friendly each model is for collecting and entering input hardware
configurations and required data elements and in running each model.
2. Each models capability to sort, present and produce usable, comprehensive output
reports.
3. The flexibility and effectiveness in application of each model to a variety of other
design-to issues required in the front-end design analysis stage [e.g., design to a 2-level
89
4.
5.
6.
7.
8.
The five most popular U.S. DoD approved LCC models are as follows:
1.
2.
3.
4.
5.
90
7.0 TOOLS
7.1 Tools
Selection of user tools is as important as designing and implementing the Shared Data
Environment. These tools are an integral part for providing connectivity with a common basis
for sharing DS information in ready-to-use formats. It is important to note that data stored
within the SDE is useless unless it can be extracted, analyzed, manipulated, updated, formatted,
and presented in a user friendly manner by the appropriate software application tool.
In parallel with the analysis used to determine the SDE requirements, tool selection must be
considered within the SDE context. The ideal situation is to provide an environment that
separates information from applications and is based on open system standards. This will help
ensure future flexibility in upgrading to new software solutions as technology evolves.
7.1.1 Desktop User Applications
If information is to be effectively used, the user(s) must be able to apply appropriate application
software to it. The application(s) software is used to create, analyze, modify, simulate, or
interpret the information generated by business processes.
This software may address
information of a technical or a business aspect, e.g., a CAD/CAM modeler or an EDI transaction
generator.
There are as many application packages as there are processes and users. Some are so generic
that they may be better identified as an Infrastructure Desktop Element, such as office
automation products (word processors, spreadsheets, etc.). Some are very much discipline
specific such as a finite-element modeler. In any case, the applications provide the mechanisms
to the user to form and finalize the ultimate deliverable of the business process, i.e., the
information product or package.
91
Lo
inf gistic
orm s
ati
on
SDE
Product
information
Design
information
$
Target Concept
$
$
$
$
$
Digital document
information in
standardized formats
modular
product related
contently structured
PaperDocumentation
Digital
documents
in various
proprietary
formats
Digital data
model based
information
in standardized
formats
Digital
documents
with presentation
separated form
content
in standardized
formats (SGML today)
E-Mail
Word processing
Internet Browsers
Spreadsheets
Presentation Graphics
Office Suites
Electronic calendaring
Imaging
92
Desktop publishing
Lotus Notes
Allaire Forums
Microsoft Exchange, NetMeeting
Xerox
Documentum (Documentum, Inc.)
OPTIX (Blueridge Technologies)
CMStat
C*Gate
CMIS
Baan
PTC
SAP
People Soft
Product Data Management (PDM) - Product data management in the broad sense
addresses all data that directly or indirectly supports the concept exploration, design,
fabrication, assembly, testing, and life-cycle support of a product. This includes primary
93
and derived requirements and the cost/schedule information required to support tracking
of progress and timely corrective action.
Metaphase
Sherpa
Windchill
Drawing Computer Aided Design/Computer Aided Manufacturing (CAD/CAM) Software that enables developing digital master product models that makes it possible to
create, simulate, optimize, document, build, and test products within a single electronic
environment.
Catia
Optegra
AutoCAD
I-DEAS Master Series
Performance Measurement
Metrics
Capability Assessment
- E-BAT (Britain)
- IDA-BAT (U.S.)
SEI CMM Assessment Tools
7.1.4 Configuration Management
Configuration management embodies two concepts: (1) the configuration management of items
and their defining technical data, referred to herein as configuration documentation; and (2) the
application of CM principles to digital data in general. Because, digital data management is
critical to the control of configuration documentation and therefore to the configuration
management of Weapon Systems, document management rules are integral to the CM process.
Configuration management is defined by the Electronics Industry Association (EIA) Standard
649 as a process for establishing and maintaining consistency of a products performance,
functional and physical attributes with its requirements, design and operational information
throughout its life. Figure 7-2 is a top-level activity model depicting the CM process showing:
CONSTRAINTS
INPUTS
Mission Need
Program Initiation
Syst Eng. Reqmts,
Funct Analysis,
Alloc & Synthesis
Logistics &
Maintenance Plans
Configuration
Management
Process
Performance
Measurements
Communication
Management support
Effective working
relationship among Govt &
Contractor CM, Program
Management, Systems
Engineering, Logistics &
Quality
Facilities
Resources
Training
Guidance Handbooks &
Standards
OUTPUTS,
RESULTS
Verified changes
Documented CM process
incorporated in all
consistent with planning
affected items,
Consistent & Appropriate:
documents
RFP & Contract CM/DM Status accounting data
Acquisition of data; EDI
base appropriate to
Items identified
each phase
Performance attributes CM-competent
identified and achieved
contractor base
Supported items
CM process
documented
performance measured
Identification and
& continuously
marking sufficient for
improved
support
Lessons learned
Proposed changes dispositioned Program image
expeditiously
enhanced
MECHANISMS/
FACILITATORS
Configuration items
Documents that define the performance, functional, and physical attributes of an item.
These documents are referred to as configuration documentation.
Other documents which are used for training, operation, and maintenance of an item
Associated and interfacing items used for training, operation, or maintenance of the
configuration item.
95
96
It does not mean that NATO or any other configuration control authority can unilaterally
authorize change to configuration documentation throughout the life-cycle. Each configuration
document has a current document change authority (CDCA), i.e., an agency, activity, or
organizational entity that is responsible for the content of the document and is the only authority
that can effect changes to the document.
The concept of current document control authority (CDCA), introduced in MIL-STD-2549,
establishes that configuration control authority to effect a product configuration change under a
contract does not automatically mean that a change can be directed or made to a document for
which another organization is the controlling design activity and has content responsibility. An
activity that uses a product and its documentation, but is not the CDCA, is referred to as an
Application Activity (AA). An AA can only approve for use (adopt) the document, but cannot
direct changes to it. These concepts become increasingly more important as acquisition looks to
the commercial industrial base. It is central to the management of an automated information
system concerning documentation used by different application activities.
The CM process is applicable both to development of new systems and items and to
modifications of existing systems and items. A typical distribution of CM related roles is shown
in Table 7-1 ; responsibilities included for continuity that are not primarily configuration
management activity are italicized.
97
IPT participation
Metrics
Performance reviews
Baselines selected product performance configuration
documentation after verifying (e.g. FCA) that
performance requirements have been achieved
Continues as CDCA for selected performance
configuration documentation; may become CDCA for
other documentation as contractually established
Consistent with support approach for selected Cis,
baselines selected product (design) configuration
documentation after verifying (e.g. at a PCA for the CI)
that the design documentation matches the delivered
configuration
Continues as configuration control authority for the
System/CI during its life as a NATO asset and CDCA
for selected performance and design documentation, as
contractually established.
EIA-649 summarizes
98
Both
99
system to reduce costs, improve quality and reduce time cycles. The NATO CALS Concept of
Operations (NCOP) describes how to achieve the vision of a Shared Data Environment (SDE) in
support of a defense system through life. Taken collectively these tools and techniques can be
used on individual programs and across programs and provide a framework for CALS in NATO.
7.1.5.2 Background
The need to exchange and to share product related data has long been recognized, and the NATO
business requirements are to establish a standard method of identifying products and their
structure as a means of:
Acquisition Workshop Stage 2 Overview and Results; NATO CALS Management Board;
NATO Industrial CALS Group; NATO Unclassified; March; 1996; page 18.
6
Ibid.
101
The team that developed the generic high level model during the 1995 Acquisition Workshop
selected the ISO 10303 Standard for the Exchange of Product Model Data (STEP) as the
appropriate standard for a NATO CALS model.
The NCDA has been developed as a follow on to the NATO CALS Workshops and the NATO
CALS Data Model (NCDM) developed as part of the Pilot Project #1 activity that focused on the
Acquisition Logistics domain.
Considerable input has been received from the ISO STEP
community and experts from the NATO community, both governmental and industrial. The
architecture is currently conceptual and requires further development of the NCDM for
implementation. This is a planned activity as part of the NATO CALS Office 1998 Strategic
Plan and is discussed further in Section 3.4. The NATO CALS Office has chaired a ISO project
to identify the requirements in the area of Product Life-Cycle Support (PLCS). The activity is
complimentary to the NCDA and will provide the basis for the additional standardization
required to support the NCDA. Since the work of the ISO PLCS project and the NCDA are
connected, references are provided where appropriate. The NATO work is to be performed as a
contribution to the ISO STEP standards.
Once fully developed, the NCDA will consist of:
Consistent Core
Data Model(s)
Data Definitions
Documentation
The NCDA is independent of time, organization, and implementation, and it is not inherent in the
processes it supports. This enables the NCDA to support the entire life-cycle in a manner where
data is created only once and used many times. The following graphic depicts the NCDA.
102
Operate
Support
Effectivity
Support
Inventory
State
Engineering
Management
Core
D
e
s
i
g
n
Configuration
Organisation
Task
Requirements
Identification
Item
Physical Product
Configuration
Effectivity
Anomaly
Administration
Documentation
Consistent
Linking &
Referencing
Product
ID
CM/Change
Control
Product
Maintenance
Produce
Management
ManagementInformation
Information
NATO CALS Data Architecture
Darch4_0.ppt
103
associated with programs that support the defense system. There is a significant amount of
information identified in the TLBM that is not product centric meaning that it does not require
product information as part of its content. An example is a budget. This type of information is
not currently detailed in the NCDA, but is part of the overall concept of managing information in
support of a defense system. The management category of the NCDA is large and merits further
study.
The categories of information in the NCDA are:
Management
Design
Production
Operations
Support
104
The following table details the classification of the information requirements in the TLBM into
these categories.
Table 7-2 TLBM Version 4.0 Data Assemblies by DA Categories
Management
Acquisition Strategy
Authorization
Budget
CM Plan
Contractor or Government Entity
Disengagement Intention
External Data and Information
ILS Plan
Information Management Plan
Mission Need Document
Operational Plans
Proposal
SDE Changes
Solicitation
Design
Defined Conceptual Options
Functional Architecture
Product Data
Quality Data
Validated Mission Need (NST)
Production
Accepted Defense System
Defense Product
New Defense System
Operation
Mission Feedback
Operational Defense System
Operational Feedback
Operational Performance Data
Support
Cannibalization Data
Allocated Funding
Available Funding
Business Plan
Concept of Operations
Contractual Mechanism
DS Life-cycle Strategy
Government/Industry Policies, Legal
System, International Cooperation
In-Service Goals
Mission Need
Multi-Disciplinary Groups
Procedures, Regulations and Standards
QA Plan
Shared Data Environment
Through Life Business Model
Configuration Data
Design Data
Operational Requirements
Proposed Conceptual Solution
Test Findings
Support (continued)
Disposal Data
End of Use Data
ILS Data
Non-Operational Defense System
Non-Operational Support System
Operational Support System
Retired Defense System
Support Data
Support System
Support System Performance Data
Transfer Data
Used Defense System
105
Requirements
document.
for
through-life
standards:
106
13/11/97;
ISO
SC4/TC184/WG3/T8;
draft
multiple
Those responsible for defining the requirements for the end-item or system
Users and maintainers of the end-item or system (such as governments)
Manufacturer and assembler of the end-item or system
11
Ibid.
THE NATO LOGISTICS ARCHITECTURE PLAN or the need for conceptual logistics
standardisation; NAMSA; NATO Unclassified; 6/30/97; page 1.
12
108
A key element of the NATO CALS Framework is a specific data model that was originally
developed to harmonize the requirement of three existing military standards, MIL-STD-1388-2B
(US), AECMA 2000M (Europe) and AECMA 1000D (Europe). This work was based upon the
results of a NATO CALS Workshop on Acquisition Logistics conducted in 1993. This model,
named the NATO CALS Data Model (NCDM), has been encoded in EXPRESS and is intended
to be the instantiation of the NCDA. It is currently limited in that it does not meet all of the
requirements of the core, contains certain legacy characteristics, and needs to be modularized
in accordance with the NCDA. It is part of the NATO CALS Office Strategic Plan to modify the
NCDM in accordance with the NCDA.
This focus on Logistics is reflected in the NCDM and is the foundation for the instantiation of
the NCDA. It is also the major input to the ISO STEP work on product life-cycle support.
7.1.5.14 Information Sharing and Exchange
The NATO CALS Handbook13 contains information and guidance for selecting and using
information standards for general types of digital information exchange. The purpose and focus
of the NCDA is to go beyond general information exchange and focus directly on clearly defined
data elements and relationships associated with a product as defined by the data models in STEP
and the NCDM. Data models are powerful tools that are used to define information objects and
the relationships amongst them. With existing technology, the utilization of an EXPRESS data
model enables significant advancements in the ability to use information beyond that of simple
data exchange. Systems utilizing a common data model either as an internal structure or as a
system interface can communicate directly and operate as a single logical unit, rather than
separate distinct systems that require translation and physical movement of data to perform
operations. Applications built upon the data model can then operate anywhere in the systems
environment and access data through the model in ways not possible in data exchange, which,
for example, must rely on external referencing to identify information and relationships
(e.g., LCN to product). In a data model, this referencing is inherent within the model. These
powerful concepts represent and enable new ways of doing business.
The NCDM was built to take advantage of these powerful concepts and enable improved access
and management of information about a product and its support throughout the total life of the
product, not only during acquisition.
Much of this information is created, stored, and
managed, within the industrial enterprise supporting the defense system (i.e., product and its
support system).
The NCDM will change the way industry creates, manages, and makes available product and
logistics information. It will also change the nature of the interfaces between all the enterprises
associated with a defense system throughout its life-cycle. Traditional forms of data exchange
can be supported through data models, and the analysis of the TLBM along with the utilization
13
NATO CALS HANDBOOK; NATO CALS Office; 2nd Draft; NATO Unclassified; March
1996.
109
of the NCOPS will provide an Information Management Plan (IMP) that identifies the optimal
use of EXPRESS schemas and the NCDM.
The preferred method of data exchange for the NCDA/NCDM is defined in the STEP Standard
as a Part 21. The details concerning STEP Part 21 are covered later in this document. These
physical files can be transported by a wide variety of information envelopes from attachments
to EDI messages, to MIL-STD-1840 and Internet FTP (File Transfer Protocol), as well as on
physical media such as magnetic disks. The Part 21 form of exchange preserves the relationships
between the entities in the data model so that they can be retained and utilized in the receiving
system. Some forms of exchange do not support this important feature. In addition to a STEP
Part 21 physical file transfer between systems, the following types of exchanges can be
supported using the NCDM in a CALS Environment.
110
The generalization of these can be built derived into the following states:
Targeted
Predicted
Tested/Evaluated
Accepted
Actual
7.1.5.15 Methodology
A methodology for determining Through Life Interchange Specifications (TLIS) using the
TLBM is the first step in developing a Concept of Operations for a Program. It yields the
information requirements that are input to the programs Information Management Plan (IMP).
Refer to the NATO CALS Concept of Operations for details on the IMP.
14
NATO CALS HANDBOOK; NATO CALS Office; 2nd Draft; NATO Unclassified; March
1996; Section 5.
111
Define Scenario
Define Government/Industry Interface
Apply Scenario to TLBM
Determine Purpose of TLIS
Select Type/Style of Exchange
Determine Nature of the TLIS
Define Content of TLIS
Refine Scenario
The steps should be used recursively because both at the scenario level and at the activity level
the government-industry interface and relationship had to be examined and fed back/refined at
the previous steps. The following graphic depicts this recursive approach.
SCENARIO
IS
GVNT-IND INTERFACE
TLBM
112
As you apply a scenario to the TLBM and make decisions while doing so, you will need to revisit the scenario recursively to refine it. The scenario should be defined as unambiguously as
possible.
7.1.5.15.2 Apply the Scenario to the TLBM
Apply the scenario to the TLBM with the aim of developing a tailored business model by:
1. Analysing applicability of activities and their definitions;
2. Analysing applicability of ICOMs and their definitions;
3. Consolidating the tailored business model.
After selecting and defining activities and ICOMs, the connection between applicable activities
has to be re-established. Some activities may be found not be applicable for the scenario and
tailoring of the TLBM may be required.
7.1.5.15.3 Define Government/Industry Interface
The interfaces between government and industrial participants in the programme may be
different for each activity, and will most likely change over time. The nature of the interface will
impact the decision on the type of interchange selected. Refer to the NATO CALS Concept of
Operations for details on analysing the implementation of a CALS Environment for a
programme. The interfaces between all participants should to be defined at the lowest possible
level in the tailored business model.
7.1.5.15.4 Determine TLIS Purpose
The question of how the TLIS is to be used should be analysed.
organisational and workflow analyses.
113
Report
Data List (e.g., tabular data and values
Tables (e.g., relational table information )
Access
Dynamic Link
ISO 10303-11, 1994; Industrial automation systems and integration Product data
representation and exchange Part 11: Description methods: The EXPRESS language reference
manual.
16
In ISO 10303 (STEP), the concept of a conformance class serves a similar purpose in identifying a subset of an
AP. However it does not add any constraints, nor do they identify a specific implementation form.
17
ISO 10303-21, 1994; Industrial automation systems and integration Product Data
representation and exchange Part 21: implementation methods: Clear text encoding of the
exchange structure.
114
ISO 10303
Standard for the
Exchange of
Product Model
Data
N
C
D
M
I
n
t
e
r
c
h
a
n
g
e
S
p
e
c
i
f
i
c
a
t
i
o
n
s
18
In common with STEP this paper adopts the convention of specifying EXPRESS language
key words in UPPER CASE.
115
The general effect of both statements is to import some items from one schema into another. See
below for a small example. The two statements differ in that the legitimate instantiations of the
data sets vary according to which was used. If the USE statement is used, the imported entities
are considered to behave as if they had been declared in the schema and may exist independent
of other entities indirectly, which is either imported by USE or declared in the schema. (In the
case of the Interface Specifications, there will be no entities in the second category.)
For both USE and REFERENCE, any entities and types that are required for the attributes of the
entities named but are not explicitly named are considered to be implicitly REFERENCEd.
NOTE: The following is a simplified example loosely based on entities from the NCDM. It
should only be used as an illustration of how the USE and REFERENCE mechanisms work. 19 In
the case of REFERENCE the imported entity can only exist if it is referenced by another
ENTITY.
SCHEMA base_model;
ENTITY mission;
in_scenario : scenario;
description : STRING;
name : STRING;
mean_duration : OPTIONAL time_measure_with_unit;
END_ENTITY;
ENTITY scenario;
user : STRING;
id : STRING;
description : STRING;
operating_location_count : OPTIONAL INTEGER;
number_of_systems : INTEGER;
END_ENTITY;
ENTITY time_measure_with_unit;
measure : REAL;
unit : STRING;
END_ENTITY;
ENTITY person;
name : STRING;
END_ENTITY;
END_SCHEMA; -- base_model
-- New schema using things from the base schema
SCHEMA Interface_Specification;
USE FROM base_schema (mission);
REFERENCE FROM base_schema ( scenario );
END_SCHEMA;
19
Such an ENTITY may of course be dependent on some other ENTITY through its attributes.
116
In the previous example, the following is the result in the new schema:
Entity
Mission
Scenario
time_measure_with_unit
Person
Result
Included. May be independently
Included. May not be independent instantiated.
(Would have been implicitly REFERENCEd
because of its use in the in_scenario attribute of
mission.)
Included by implicit REFERENCE from
Not included.
Examples of the first two of these are given below, based on the schema used above:
RULE only_one_scenario_allowed FOR (scenario);
WHERE
one_scenario_only: SIZEOF(scenario) = 1;
-- returns false if there is not exactly one scenario (population constraint)
END_RULE;
RULE positive_systems_count FOR ( scenario);
WHERE
systems_count: SIZEOF( QUERY(each_scenario <* scenario |
each_scenario.number_of_systems < 1)) = 0;
-- returns false if there are any scenarios with less number_of_systems less than 1
END_RULE;
Rules such as these can be specified in the same schema that USEs or REFERENCEs the
NCDM entities.
117
The header section is required to contain the three entities shown in the example above. These
are:
1. The file_description specifies the version of this part of ISO 10303 used to create the exchange
structure as well as its contents.
2. The file_name provides human readable information about the exchange structure.
3. The file_schema entity identifies the EXPRESS schemas that specify the entity instances in the data
section. The schema_identifiers attribute is constrained to contain exactly one schema_name .
The three entities are defined according to the following EXPRESS schema:
SCHEMA header_section_schema;
ENTITY file_description;
description : LIST [1:?] OF STRING (256) ;
implementation_level : STRING (256) ;
118
END_ENTITY;
(*
description: an informal description of the contents of this exchange structure.
implementation_level: an identification of the required capability of the system to process
the data in this exchange structure.
*)
ENTITY file_name;
name : STRING (256) ;
time_stamp : STRING (256) ;
author : LIST [ 1 : ? ] OF STRING (256) ;
organization : LIST[ 1 : ? ] OF STRING (256) ;
preprocessor_version : STRING (256) ;
originating_system : STRING (256) ;
authorization : STRING (256) ;
END_ENTITY;
(*
name : the string of graphic characters used to name this particular instance of an exchange
structure.
time_stamp: the date and time specifying when the exchange structure was created.
author: the name and mailing address of the person responsible for creating the exchange structure
organization: the group or organization with whom the author is associated.
preprocessor_version: the system used to create the exchange structure, including the system
product name and version.
originating_system: the system from which the data in this exchange structure originated.
authorization: the name and mailing address of the person whom authorized the sending of the
exchange structure.
*)
ENTITY file_schema;
schema_identifiers : LIST [1:1] OF schema_name;
END_ENTITY;
TYPE schema_name = STRING(1024);
END_TYPE;
(*
schema_identifiers : the schema(s) that specify the entity instances in the data section.
*)
END_SCHEMA;
(*
Outside the scope of STEP, this header information can be extended by means of user-defined
entities to carry additional data about the exchange, rather than the product itself that is referred
119
to within the data section of the file. The concept here is that the exchange file is itself a
document and needs to be identified and controlled as such.
For the purposes of Interface Specifications, the following concepts/entities could also be
included:
1.
2.
3.
4.
5.
6.
) = 0;
-- returns false if there are any products with id longer than 32 characters
id_length: SIZEOF(
QUERY(each_version <* product_version |
LENGTH(each_version.id) > 32)
) = 0;
-- returns false if there are any product_versions with id longer than 32 characters
END_RULE;
-- more rules as appropriate here
END_SCHEMA;
These requirements and constraints shall be both quantitative and qualitative and are required for
contractual information and as input to various project documentation including the ALDB or
equivalent format approved by the project.
7.1.5.19.4 Activity Methodology
If required, further detail on the functionality and methodology behind this activity for the
acquisition logistic requirements in defense equipment procurement may be found in the US
MIL-STD-1388, UK DEF STAN 00-60, and GE ALS.
7.1.5.19.5 Mapping of Required Data into the NCDM
The following table shows the data elements required and the elements of the NCDM that
correspond to them:
DED
LSAR Name
001
REQUIRED ACHIEVED AVAILABILITY
009
013
019
021
ADDITIONAL REQUIREMENTS
REQUIRED ADMINISTRATIVE
AND LOGISTIC DELAY TIME
ALTERNATE LCN CODE
ANNUAL NUMBER OF MISSIONS
022
023
064
096
164
199
203
222
223
229
230
236
228
238
262
273
275
122
Model Reference
achieved_availability
assigned
with
"Required
narrative_characteristic.description
administrative_and_logistic_delay_time
assigned as "required,maximum"
alternate_element_relationship.related.id
scenario.usage.
annual_number_of_missions
scenario.usage.annual_number_of_operating
_days
property assigned as required to element
property
project_breakdown_assignment.project
inherent_availability
assigned
with
"Required"
element.id
element.definition.form
distribution_based_period
(assigned
as
required maximum)
mean_maintenance_downtime (assigned as
required mean)
time_between_failure (assigned as required
mean)
time_between_maintenance_tasks (assigned
as required mean)
time_to_repair assigned as (required mean)
mission.mean duration
measure_with_unit.unit_component
scenario.operating_location_count
operational_availability assigned to scenario
scenario.usage[].name
DED
286
376
450
454
LSAR Name
Model Reference
INDICATOR
REQUIRED PERCENTILE
distribution_based_period.percentile
(assigned as required maximum)
organization
no longer required
scenario.number_of_systems
123
time_between_maintenance_tasks,
time_to_repair
)
-- additional rules specific to this Interchange Specification
RULE only_one_product FOR ( product);
WHERE
only_one: SIZEOF( product) = 1;
END_RULE;
RULE all_assigned_to_product_version FOR ( characteristic_assignment);
WHERE
only_one: SIZEOF(
QUERY(this_one <* characteristic_assignment |
NOT (NATO_USE_STUDY_INTERCHANGE_SPECIFICATION+
PRODUCT_VERSION IN TYPEOF(this_one) ) )
) = 0;
END_RULE;
END_SCHEMA;
This schema can be expanded to give an explicit schema for the Interchange Specification. The
result will contain considerably more entities than are listed above. As an example the
information object part of the model will be imported, enabling Use Study requirements, mission
and role descriptions, etc., to be specified as SGML documents.
Note: Interchange Specifications should be published in electronic form, such that they can be
used in software development. There are well-established STEP/EXPRESS tool kits that can
process EXPRESS definitions and generate much of the required software architecture.
7.1.6 Product Data Management
Product Data Management (PDM) refers to the management of all of the data flowing through an
organization that is required for use in the development of new products or in the updating of
current products.
Several market pressures have encouraged the recent emergence of PDM systems:
124
The effective control of this data is a prerequisite of coping with all the above pressures.
Implementing PDM should have three beneficial effects:
1. Better data quality - All data (even different types) that belong together can be
electronically linked.
2. Better data consistency - As data is created or changed it immediately becomes current.
There is no time lag that could result in different engineers working on different data
versions.
3. Greater data transparency - Instead of design projects being viewed by one engineer at a
time, the whole process can be viewed by the whole development team, all the time.
Therefore, for instance, the production engineers can start studying product designs (and
contributing their expertise) well before the drawings would normally have been handed
over for tooling.
The last of these points hints at the real power of PDM - the way it controls and facilitates the
distribution and circulation of product data. For example, when you use one of the more
advanced PDM systems to send information to other team members, although that information
leaves your "ownership" (so you can no longer work on it), it does not leave your sight. At the
click of a mouse, you can refer to it, monitor its development, and keep track of changes to it.
With the latest generation of PDM systems, the principles of concurrent engineering, still largely
theoretical, receive practical computerized support.
What is more, these systems do not overturn existing working practices. On the contrary, they
actually emulate the familiar manual procedures. People, therefore, adapt to them naturally,
producing a rapid increase in productivity band efficiency. In addition, as familiarity grows and
new working methodologies evolve, the PDM system is flexible enough to provide continuing
support.
This text is from a "Product Data Management - Understanding the Fundamental technology and
Business Concepts, a report by CoCreate.
7.1.7 Enterprise Resource Management
Enterprise Resource Management is accepted as a broad term for the activities and software
infrastructure that manage all of a companys assets and resources, including such basic
applications as general ledger, accounts payable and receivable, as well as manufacturing,
inventory, and human resources. It is the process of managing an organizations functions,
processes and methodologies to achieve focus on customer driven delivery of product or service
for the least cost and highest value. The software and processes enabling this approach,
Enterprise Resource Planning or ERP, was created to enable businesses to new markets, new
demands in the global community and changing customer expectations. Industry, particularly
manufacturing, has been driven to:
125
At the same time, manufacturers must respond to the need to reduce on-hand stocks, implement
just in time delivery of materials and products and provide more reliable delivery dates and
higher levels of service to customers.
There has been a fundamental shift in focus, as the business community has become global in
nature. Inventory control was the focus through the 1960s, and in the 1970s planning for
material requirements (MRP) began to emerge. MRP and MRP II began to evolve through the
1980s and into the 1990s extending from the Shop floor through associated areas such as
Human Resources, Project Management, Finance, Engineering, etc. An awareness began to
emerge that all these activities, their infrastructure, and supporting software should no longer be
managed independently, but viewed and managed as they contributed to the core business. The
entire business process was being addressed, thus the term ENTERPRISE Resource Planning
evolved.
Throughout this time frame, the focus of this effort has been generally aimed at large business
and manufacturing concerns. ERP software suppliers developed solutions to address the large,
manufacturing sector. At the same time, industry began to turn to outsourcing and use of mid to
smaller size suppliers. As the market forces began driving dependencies in the manufacturing
process for inclusion of smaller and outsource suppliers, ERP software began to be developed for
mid and smaller sized businesses. Through use of virtual enterprise approaches, the entire
enterprise is being addressed.
ERP functionality is based on examining an activitys business processes and dependencies and
focusing business processes or changes thereto on:
The Goal is to simplify processes before automating them, then apply tools that automate and
integrate the processes to support meeting customers desires and needs in cost effective ways.
Within ERP, several software vendors, such as SAP , BAAN , PeopleSoft, and others
provide services and suites to address Sales and Distribution, Business Planning, Production
Planning, Shop Floor Control, and Logistics. Briefly, these software suites provide:
Sales and Distribution, which covers, order entry and delivery scheduling. This module
also checks on product availability to ensure timely delivery. In some implementations,
it may also check a customers credit line.
126
Business Planning consists of demand forecasting, production planning, capacity, and the
detailed routing information that describes the where and when (in what sequence) a
product is manufactured.
Capacity and production planning gets very complex.
Simulation tools may be provided which help managers to decide how to overcome
shortages in materials, labor, or time. Once a master production schedule is complete,
data is fed into a Materials Requirements Planning module.
An MRP module may produce output such as an exception report, an MRP list, and order
proposals. An exception report brings attention to situations such as late delivery of
materials, or rescheduling. An MRP list shows the details of shipments and receipts for
each product and component. Order proposals are used to order materials and issue
production orders.
These outputs lead to Shop Floor Control. The planned orders from an MRP are
converted to production orders, which leads to production scheduling, dispatching, and
job costing.
The Logistics system takes care of the rest, assuring timely delivery to the customer.
Logistics would consist of inventory and warehouse management, and delivery.
Typically, the purchasing function is also found in the logistics area.
Through the mid-1990s, the ERP process has been applied across the spectrum of the business
processes required to produce products and services within the global marketplace. ERP product
suites are expanding to address product data management, product configuration management
and logistics planning, especially for complex, long-lived products. ERP, its approach and
underlying software are encompassing Supply Chain Management (SCM) issues, treating the
supply chain as a continuous and seamless activity, looking at demand, supply and constraints
simultaneously. Thus Enterprise Requirements Management is the management of all the facets
needed to tie together processes, diversified activities and organizations and still provide the
final, customer driven, product in a globally competitive environment.
127
8.0 TECHNIQUES
8.1 Through Life Business Case Analysis
The Business Case is the principal document in a decision package that evaluates proposed
actions to achieve some functional objective. The Business Case has three primary uses:
1. Evaluate the existing system and proposed courses of action
2. Present the business case for approving and implementing a proposed improvement
action
3. Re-examine the project at Life-Cycle Management (LCM) milestones and defend
changes from the original course of action
The Business Case documents the functional process improvement effort and presents the
business case as part of the decision package. It serves as the primary instrument in deciding
which approach, if any, should be further evaluated in detail for approval. Gross measurements
and estimates of cost and benefits data are usually all that is available early in the project. More
data is available if there has been a complete activity based costing effort.
The Business Case presents the economic analysis various alternatives. Economic analysis is a
systematic approach to the problem of choosing the best method of allocating scarce resources to
achieve a given objective. A sound economic analysis recognizes that there are alternative ways
to meet a given objective and that each alternative requires certain resources and produces
certain results. To achieve a systematic evaluation, the economic analysis process employs the
following two principles:
1. Each feasible alternative for meeting an objective must be considered, and its life-cycle
costs and benefits evaluated.
2. All costs and benefits are adjusted to present value by using discount factors to account
for the time value of money. Both the size and the timing of costs and benefits are
important.
8.1.1 Background
The following section was adapted from a study, Business Case Model for The DoD Logistic
Community: A Guide to Business Case Development completed by ManTech, West Virginia for
the U.S. Department of Defense Logistics Reinvention Office (LRO).
In todays hectic, complex world, decisions are often forced, supported by little, if any analysis
or documentation. Yet, we are constantly asked to render decisions that can have both short and
long-term consequences. In the NATO Alliance, such decisions can have dire results and tear at
the very fabric of "freedom" because our decisions ultimately effect "Defense Readiness."
Despite the dire consequences of poor decisions, the practice of preparing, reviewing, and
making decisions that are based on sound analysis or business case is infrequently applied. A
128
properly prepared business case represents an effective tool to reverse this practice and foster
timely, and accurate decisions within the NATO logistics community.
This Section is intended to assist all within the NATO logistics community who have a need for
preparing, documenting, and evaluating alternative approaches as well as those ultimately
responsible for decision making and directing a course of action with the development of a
business case.
This Section provides the information needed to use business case modeling as an effective tool
to manage change. It is simple, straightforward, and will serve as a road map for formulating a
sound business case. Use the guidance provided here to create a sound business case that is also
consistent with NATO Logistics Strategic Goals and Objectives. There are three simple steps:
1.
2.
3.
4.
Tailor the business case model that is provided in this section to meet specific needs.
Gather the information needed to support population of the tailored model.
Populate the tailored model in accordance with the guidance provided.
The populated model is the business case.
8.1.2 Introduction
Business cases are an integral part of every competent managers decision process. They are
frequently informal and often undocumented.
Such analyzes and models consist of the
managers assessment of financial, procedural, organizational, and performance implications of a
proposed change. Informal as it may be, this process yields information needed to support a
business decision and is therefore a business case. In general, the more complex the change of
the organization, the more formal and rigorous the business case development process should be.
Within NATO, formal business cases are critical elements of on-going Business Process
Reengineering (BPR) and other improvement activities, and related decision-making processes.
Despite significant guidance published to date, business cases continue to be misunderstood and
inconsistently applied within the NATO community. Ineffective applications of a business case
are found throughout the organization, such as, being used after the fact to justify technology
decisions, in-process implementations or projects, and related sunken costs. They are also
improperly used to determine the value of completed technology or software development
projects. This section will help in avoiding these traps.
8.1.3 Purpose of this Section
This sections purpose is to bring consistency and understanding to business case development
efforts within the NATO logistics community. It highlights the process steps required to produce
a simple, straightforward and easy to understand Business Case Model. The target audience is
NATO logistics functional experts, program management, and others tasked with implementing
change and making decisions about change within the NATO logistics community. Its objective
is to promote the use and consistent application of business cases as the tool for the evaluation
and management of change within the NATO logistics community.
129
130
Within the
To this end, each business case and the included alternatives must:
Address a specific area within the Logistics Strategic Plan. Pinning down how the
business case links to definite goals and objectives within the Plan, is the beginning of
defining business case value for the decision-maker.
Show how it directly adds value to the accomplishment of the strategic plan, and helps
move toward the achievement of the NATO vision.
Should clearly indicate how alternate courses of action would take the current, or AS-IS,
state to a reengineered, or TO-BE state that is consistent with the NATO CALS ThroughLife Business Model and NATO Logistics goals and objectives.
131
When any planned project, program, initiative, effort, implementation, product purchase
or lease will result in a significant change in an organizations processes.
When an initiative affects business processes or policy outside the span of control of the
implementing organization. (If we build it, they will come.)
132
Functional
Process
Descriptions
Technical
Architecture
Descriptions
Cost
Projections
Action
Plans
Measures
of
Performance
Risk
Assessment
8.1.4.6 Who Should Prepare a Business Case and What Should They Know?
The most important requirement is to be thoroughly versed in the organizations processes and
activities, and corresponding goals and objectives as they relate to the business case. Know what
is important to the decision-maker. Activity modeling and financial analysis skills are also
required or alternatively, specialists may be used to assist in these areas. Use of specialists,
when available, is highly recommended. They can significantly reduce the time required to
prepare a business case.
8.1.4.7 What Should the Decision-Maker Know?
The decision-maker must have an understanding of how to use the business case and how it will
apply to the expected change. The decision-maker does not need to understand the detailed
analysis techniques; however, he or she should have a basic knowledge in financial areas such as
return on investment and discounted cash flow. Matter-of-course knowledge of business process
reengineering topics, such as activity modeling, aids in using the model to make good decisions.
133
134
135
Stakeholders express their interests as outcomes. Outcomes can drive process behavior and
drive investment and operating decisions about these processes or their outputs.
Persuading process customers and participants, who are the most visible stakeholders, to
accept change is the process owners high order objective. While across the board
acceptance is highly desirable, some stakeholders may not accomplish everything they
want. The depth and breadth of firm commitments from stakeholders reflect downstream
potential for process and organizational change, resistance, or acceptance.
8.1.5.3 Boundaries of the Business Case - Context and Perspective
The context and perspective should match with the context activity model developed during
Functional Analysis. Define what is and is not being considered in the scope of this business
case, and reinforce whom it is for and what decision is helped by it. Identify potential
stakeholders, including what organizations will be affected, and who plays the biggest part in the
failure or success of the alternatives.
Stakeholders should be identified before functional
analysis.
Once identified, stakeholders must participate in the analytical process, whether in an active or
passive mode. The business case must address how carrying out an alternative will affect
stakeholder interests, and vice versa. This preempts actions by those who initiate regional
changes that may drive other downstream changes, while having no authority to make that
change happen.
Answer the question "What does it take to fulfill our mission and achieve our vision? The
answers to this question describe catalysts of success or failure in the functions mission.
Stakeholder requirements about products and services drive factors that are critical to the
136
137
Discuss what organizational performance measures are being used and how they are influenced
by the initiatives, preferably through use of a selected metrics from the NATO Logistics
Strategic Plan or Agency Plans.
A performance indicator is a factor used to assess speed or responsiveness, quality, or cost of a
process, input, output, or outcome. In effect, it is the unit of measure for a performance measure.
Indicator definitions can be used to compare projected outcomes of each alternative, as well as
how the indicator will be maintained for continued feedback into the success or failure of the
selected alternative once implemented. A brief discussion on the costs and benefits of collecting
this monitoring information should be included, especially if a method of collection must be set
up to facilitate the new metric.
8.1.5.5 Boundaries of the Business Case - Initiatives Considered
Develop high-level plans that describe new or different approaches to doing business according
to performance targets and business objectives. It is likely that several improvement ideas and
plans will be identified. However, not all of them can, or should, be put into place. Find
possible ways to do each approach and then parse these into achievable packages of work and
results. Project-level groupings of work that produce distinct deliverables are named initiatives.
Initiatives can vary in scope and size. There must be a narration of each initiative included in the
business case. Describe how strategies will be put into place in terms of specific actions,
timeliness, and resources. Evaluate initiatives against demonstrated implementation experience
or others best practices. Identify and assess each candidate initiatives risks and define different
paths to abate such risk. Match each candidate initiative to common barriers or characteristics.
Barriers to successful implementation, previously mentioned, refer to those situations that tend to
be outside the span of control of those making change, or that have prevented desired outcomes
of previous attempts to adopt new ideas or technologies. Similar implementation efforts must
find ways to overcome or bypass these barriers to achieve closure. For most individuals, change
is difficult. Therefore, resistance may be encountered when gathering accurate information from
individuals within the organization. These barriers are overcome with proper communication.
138
Explain why certain questions that are being asked can promote a more open environment for
dialog. Sometimes there is nothing to do except document within the business case, any issues
relating to the people barrier.
Take Care Not to Introduce Bias
Take care not to introduce bias into the process when creating alternatives. Technology
initiatives must have a clear relationship to process improvement initiatives when they are
combined into a single alternative. Ask this question: "Does this technology initiative enable
each and every process change included in this alternative?" If the answer is no, the
technology initiative should be excluded from the alternative. This approach will prevent the
perpetuation of "pet" technology projects that are impractical or have no real benefit to the
organization.
Each initiative must reflect progression (including phased achievement) toward affected
performance targets.
Convert performance targets into provisional performance objectives.
These objectives can frame stepped-investment justification and selection decisions, and drive
downstream development of the TO-BE process.
Providing clearly defined initiatives give the decision-maker an understanding of what the
business case is about, because in the end, the business case is about initiatives.
8.1.5.6 Boundaries of the Business Case - Alternatives Considered
The objective of functional process improvement is to achieve the vision. Because each
initiative considers only one or a few areas for improvement, analyze combinations of initiatives
to address each goal. It is unreasonable to study all combinations, because there will be too
many. A more practical method is to combine logical packages of initiatives that work well
together or portfolios of a set of initiatives with common objectives or goals to form alternatives.
As a rule, initiatives sharing common critical performance measures or objectives make the best
business case for being put in one portfolio versus another. However, each set of related
initiatives must put into place changes that handle the same predicted level of process workload
within the planning horizon. Another point to consider is the decision-makers focus on the
business case and the corresponding emphasis to place on each element of analysis across all
alternatives. Look at tuning the business cases emphasis in the same way the settings are
adjusted on a sound systems graphic equalizer.
The reference for measurement is the status quo, or the baseline. Baseline cost and performance
provide threshold values for the cost and performance of alternatives.
AS-IS costs and
performance measurements revised to reflect any approved changes not yet implemented would
provide this baseline. The business case should include at least three alternatives, including the
status quo. Each alternative must give functional management a complete view of financial and
operational impacts of proposed changes.
139
B u s in e s s C a s e F o c u s
Technical
Architecture
Descriptions
Cost
Projections
Functional
Process
Descriptions
Action Plans
Measures of
Performance
Risk
Assessment
Develop total investment cost flow and total anticipated process cost savings flow for each
alternative. Quantify total risk assessments based on probability and consequence of failure for
each principal initiative activity. Develop an action plan for each alternative, and assemble as a
total package for review by the approval authority. Pre-test any controversial ideas with the
approval authority or his or her peers. Use economic simulation techniques (e.g., risk-adjusted
discounted cash flow) to develop supporting cost schedules.
8.1.5.7 Boundaries of the Business Case - Key Assumptions
Assumptions are necessary in a business case because they are explicit statements used to
describe present and expected future behavior upon which the business case is based. Since no
one knows what the future holds, assumptions must be used to set boundaries for painting the
business case.
Example assumptions include future workload, estimated useful life of an
investment or system, and the period over which alternatives will be compared.
Summarize key economic and political indicators used for each alternative assessment; also
briefly discuss what non-quantitative issues need consideration. Employ a sensitivity analysis or
another method and focus on assumptions that are thought or historically demonstrated to cause
the greatest amount of variation in costs and performance.
8.1.5.8 Boundaries of the Business Case - AS-IS Activity Model
Assumptions Should Be Documented
Assumptions should be documented for the decision-makers consideration.
Obvious
assumptions such as there will be a next year, are not required. The assumptions should be
clearly defined. Work closely with the decision-maker to determine critical assumptions. In
some cases, the decision-maker may want to provide additional information. An example
assumption would be the frequency of an event remains constant in the future.
The current process-flow of that piece of the organization that is being considered in the business
case must be detailed to a level where all stakeholders can support conclusions drawn from the
analysis. It also must be developed enough to understand areas affected by proposed initiatives.
Finally, it must be detailed enough to assign costs and link performance measures. This step is
also considered developing the baseline or baselining. It provides the picture of what is being
changed that will be used to compare with the alternatives. The entire span of activities depicted
in a business case should map to both the NATO CALS Data Model and other NATO process
models. Integration Definition Function Modeling (IDEF0) modeling as defined in Federal
Information Processing Standard (FIPS) Pub 183 is recommended.
140
Information Technology (IT) alone is not sufficient to justify the cost. It must be shown that the
IT will impact the organizations activities in a way that improves benefits as well as reduces
costs. This should be the predominant focus of the technological discussion within the business
case, not a detailed technical discussion of its function and components. Not how it works, but
how it impacts the operations that it supports.
141
The economic analysis should focus on productivity, and describe how it mitigates both
initiative-fulfillment risk and organizational uncertainty stemming from the intended changes. It
should offer the decision-maker multiple cash flow calculations.
Underscore that there is no one right answer, only one best answer. The best course of action
should blend the total cost of involved processes, output performance, and outcome impacts
prevailing over all sub-optimal choices; e.g., those that only justify better technology for the sake
of better technology. Qualitative considerations may tip the scale between alternatives, as when
data or system integration, purchase of COTS software, inadequate security mechanisms, et al.
cannot meet some mission requirement.
The organizing backbone of the business case is a time line extending across months or years.
This provides a framework for showing management how they can work to help put financial
tactics into place: reduce costs, increase gains, and accelerate gains.
142
The business case is not a budget, not a management accounting report, and not a financial
reporting statement. This distinction is meaningful for deciding which kind of cost and benefit
data go into the business case: incremental values or total cost and benefit figures. Incremental
values are probably the right choice in decision support situations, notably where both costs and
benefits will enter the business case.
8.1.5.13 Discussion of Alternatives - Cost Projections - Investments
These costs should be the complete and total costs necessary to have the alternative turned into a
reality. This includes training and needed purchases. Provide an aggregate, initiative-level
mapping that would help view required cash flows over time as they relate to each alternative.
143
This would also link to activities that an alternative affects. At the heart of this mapping is a
high-level course of action used to frame when and how a TO-BE state becomes operational.
This is called an action plan. This should enable the decision-maker to see how cash spending
increases until some point at which operations costs start decreasing.
Prepare an action plan that specifies what needs to be done and when. A solid and complete
action plan has each of the following characteristics:
these
every
avoid
most
Recognizing risk does not have to hit an exact number, but instead distinguish one alternative
from another by the degree of risk that separates them. This recognizes that not every decision
carries an equal degree of failure or success. It allows the decision-maker to recognize the fact
that estimates have varying degrees of becoming reality.
144
AUTHOR:
DATE:
07/02/97
PROJECT:
REV:
1.00
WORKING
R E A DER
DATE
CONTEXT:
DRAFT
RECOMMENDED
NOTES: 1 2 3 4 5 6 7 8 9 10
Performance Directives
Industry Standards
DT Update Prescriptions
PUBLICATION
Operating Budgets & Plans
Identify
Technology
Trends
Technology Policy
A11
Assess Business
Technology Needs
Business Technology
Requirements
Gold Disk Configuration
Production Release
Configuration Performance Results
A12
Assess
Integration
Opportunities
DT Integration Framework
A13
Forecast
Technology Needs
A14
Approve
Technology
Commitments
A15
Technology Planner
NODE:
A1
Asset Manager
Client and Business Managers
TITLE:
Asset Repository
Accounting/Financial Systems
NUMBER:
P.
145
Days
0
2002 2004
1998 2000
vs Baseline
$12,000
$10,000
Alternative 1
Alternative 2
Alternative 3
Baseline
$8,000
$6,000
$4,000
$2,000
1
Fiscal Year
effort through one phase. The granularity of a performance result is not as important as tying the
investment of dollars to the achievement of some result. This task is decidedly different from
measuring whether budgeted dollars were spent in a particular fiscal year. Schedule measures
gauge the amount of time necessary to obtain a particular performance result. As stated above, a
performance measure can be the amount of time needed to move an effort through a phase or the
amount of time to do part of a phase. What is important is that the schedule measure is tied to
the same performance result as the cost measure. Investment project baselines should contain
major events that impact the effort.
Achieving these events on time may demonstrate
satisfactory progress. For each effort, establish a target date that is based upon contractual
requirements or the need to complete an event before another can start. Thresholds for these
events can be set by policy (e.g., 90 days beyond target) or by absolute need when there is no
slack in the schedule.
8.1.5.20 Comparison of Alternatives - Operational Cost Savings
Exploit Activity Based Costing capabilities in the business case by assigning projected costs to
various activities affected by each initiative. The change in activities from the AS-IS activity
model to the TO-BE activity model should make up cost savings realized by that initiative. The
TO-BE activity model should always represent increased value-added to the organization.
8.1.5.21 Conclusions, Recommendations, and Issues
This section should be prepared at the end of the business case development and may include a
sensitivity analysis.
Make an initial conclusion and recommendation to the decision-maker
based on the findings. Conclusions, recommendations, and issues should be documented as an
amendment to the business case as provided by the decision-maker.
8.2 CALS Techniques
8.2.1 Approach to Implementation - Change Management
8.2.1.1 General
8.2.1.1.1 CALS
CALS and/or its organization must be seen as an enabler of the Change Process. CALS is the
strategy to implement an overarching management framework to combine technology insertion
and change management.
8.2.1.1.2 PMview
This document is written for the Manager in Charge of the overall organizations change
process.(in some organizations this might be called the CALS-office). The documents goal is to
set a general methodology to ENABLE the Change.
We must warn you that this document is only gathering some good advises found through
different sources. The document is not written out of personal experience.
147
8.2.1.1.3 Techniques
This is a warning. Indeed, a number of techniques exist to facilitate the Change Process. We
site, the different implementations of Business Reengineering, Benchmarking, Continuous
Process Improvement, Performance Based Change Management, of which some of these
overlap. The techniques must be carefully chosen in function of an overall strategic goal. The
prime concern of the Change Manager should be to carefully integrate, Process Change,
Technology Insertion, and Organizational Change.
8.2.1.2 Step 1 - Motivate to Change
This is the first step in creating an environment in which Improvement is encouraged and
nourished. Its aim is barrier reduction and general goal setting. Management must have a clear
vision of what it wants to accomplish and where it wants to go.
8.2.1.2.1 Top Level Management
Top managers recognition of the need for significant change and their willingness to learn more
is the first step toward effective change planning. It is probably not possible to overstate the
importance of the role of top management. Leadership is essential during every phase of the
change process. In fact, indifference and lack of continuous involvement by top management are
frequently cited as the principal reasons for the failure of Improvement Programs. To be
successful, you will not only need the vision, planning and active involved leadership of top
management, but also such practical support as providing resources for implementation - the
necessary time, money, and personnel. Delegation and rhetoric are insufficient. Without top
management assuming an active role as champions of the Improvement Program, you will not
obtain the full scope of benefits available.
One of the first tasks of the Management will be to draft a Vision Statement
8.2.1.2.1.1 Vision Statement
A key step in the Change Process is the creation of a common understanding among top
managers about what they want the organization to look like in the future and what principles
will guide the actions they take to achieve the Modernization. his strategy will become the basis
for formal statements of the new organizations vision and values.
The Change Vision should be a clear, positive, forceful statement of where the organization
wants to be. It should be expressed in simple, specific terms. The vision must be powerful
enough to excite people and show them the potential of what can be done. A well-crafted vision
statement supported by action can be a powerful tool for focusing the organization toward a
common goal.
Whatever forms the vision and guiding principles take, it is important that they be communicated
throughout the organization frequently and with conviction. It is important that the vision be
followed soon by a concrete plan of action to avoid its being dismissed as a hollow slogan.
148
Client orientation.
Through-Life Management.
Need for product processes.
8.2.1.2.1.2 Understanding
To obtain top-management commitment, you need to begin to educate senior managers regarding
the impact of possible business modernization. This can be done through Workshops, Briefings,
Management Guides, and White Papers.
8.2.1.2.2 Why Change
In considering a Business Modernization initiative, the first and possibly the most important
success criteria is to make sure that the rationale for initiating the project is sufficient for
justifying the effort and expense of the project.
8.2.1.2.2.1 Current Environment
Analyses of the current environment with a report on the lessons learned will most of the time
make clear why and where changes are necessary.
Under CAA, stakeholders in the enterprise identify the assumptions under which their business is
conducted. They then attempt to isolate those assumptions, which, if violated, would cause the
enterprise to cease to exist as it is today (e.g., the assumption that quality watches must be
149
precision machines or that the cold war will always be with us, etc). All assumptions, but
particularly the ones in the critical category, are candidates around which to build a case for
action.
8.2.1.2.2.2.3 Need for Structural Evolution
A second commonly used rationale is the need for structural changes in the organization. The
structure of our Defense Organizations has always been vertical. That is, a top-to-bottom
management structure - with decision-makers at the top and soldiers at the bottom - has
characterized the typical army. This generally has meant that strategic planning for our Defense
enterprise occurs at a high level and is delegated down to divisions, departments, and individual
job performers in the form of policies, procedures, and directives. In response, performance
appraisals - which can take the form of periodic formal performance reviews or weekly status
reports, sales figures, etc. - are reported back up the chain of command. This paradigm operates
in a strict up-and-down the chain of command communication manner.
The emerging paradigm, however, has enterprises relying more on concurrent, cross-functional
teams (i.e., teams that cross organization boundaries) composed of knowledge workers organized
in a horizontal fashion. The goal of these cross-functional teams is to produce the enterprises
products most effectively by focusing on the product processes, not the organization of the
enterprise itself. Customer success relies on these cross-functional business processes to build
and support the product. Under this paradigm, in fact, the quality of a product consists of both
that product and its associated processes in designing, building, and maintaining it over its useful
product life.
Structural organization evolution, however, does not come easy to an enterprise.
While
processes can be changed overnight, people and organizations typically cannot. Therefore, part
of this structural evolution is not only an increasing corporate awareness but also a change
management plan that plans for the orderly, evolving transition of the organization and the job
performers within that organization from a vertical, structure to one that is more horizontal. This
change management plan must include processes for facilitating information flow and
communication across organizational boundaries.
What occurs between managements setting strategic goals and workers on the line reporting
their progress and all the layers in between? What occurs is a business processa series of
time-ordered individual activities performed as discrete events in a larger scenario that is guided
by a strategic vision that must be implemented in stages, at the tactical level, to achieve the
overall strategic objective. To use a literary analogy, one can think of the business process as a
stage play: the play is written and directed (by management) to achieve an artistic (corporate)
effect; the actors (employees) play their roles to enable this achievement; each scene (discrete
event) contributes to an overall plot (process) that unfolds sequentially, uniformly, and
deliberately; and all is held together by the motifs and themes (policies and procedures) that
manifest themselves as each scene unfolds.
150
With this business process paradigm, however, there are often communication breakdowns (or
disconnects) between various groups and/or departments that inhibit process performance. Many
enterprises recognize that such breakdowns pose significant challenges to process improvement
initiatives. In fact, the success of a Change effort largely depends upon discovering and
analyzing these disconnects.
8.2.1.2.2.2.4 Agility
A third principle or rationale is the need to align an enterprises strategic goals with the
objectives of its departments and employees, as well as with the tactical processes that are
intended to achieve the overall strategic goals. It is generally recognized today that success in a
rapidly changing environment is closely tied to how the enterprise proactively manages and
evolves its business practices as part of an efficient implementation of its overall strategic plan;
and how quickly and effectively the enterprise leverages new opportunities. We have, in fact,
entered the age of agility.
Of concern to any enterprise today is the increasing rate of change in the socio-economic
environment. The rate at which we must adapt our enterprise to the current business
environment is changing exponentially as information and computer technologies seem to
change and improve on an almost daily basis.
Todays challenge is determining how to effectively respond to, and manage , change . Every
managerin fact, every job performer (or employee)is faced with the fact that the current
situation is, or will shortly become, unfavorable. More importantly, radical change will often be
required. Critical business issues intricately tied to change include affordability, responsiveness,
quality assurance, resource scarcity, and assurance of total customer success.
8.2.1.3 Step 2 - Develop Change Plan
Once a Vision Statement has been drafted by top management you can start to develop the
Strategy for the Change. This will include, (start) setting up an organizational structure, the
identification of the "customer" needs, the selection of organizations who will be involved by the
Change Process, and the determination of needed/available resources.
However, be aware that there is no one right way to implement the Change Process in your
organization, no guaranteed recipe for success. What followed is only offered as a guide in
developing strategies and associated plans to carry out these strategies. It is important to take a
flexible approach to capitalize on an organizations strong points so that energy is focused on
key improvement opportunities.
8.2.1.3.1 Develop an Organizational Structure
Developing an organization structure that will institute, sustain, and facilitate expansion of your
improvement effort is an essential element for success. This "phantom" structure can be called
CALS-organization or office; however, it might be a good idea to give a more forceful name,
151
which has a specific relationship to the Vision. The following is a proposed organizational
structure. This structure will grow as the Change Process evolves. Important is the integrated
nature of the structure: high involvement of top management and of the employees from the
departments.
In the early stages of the Change Process, a team of top managers should form an Executive
Steering Committee (ESC). This ESC will be chaired by the Organization Head or Deputy. By
establishing the ESC, top management provides identity, structure, and legitimacy to the
Modernization Process; it is the first concrete indication that top management has recognized the
need to improve the process, and has begun to change the way the organization conducts
business. The first task of the ESC is to publish its vision, guiding principles, and mission
statement.
The ESC is at the top of the Change Structure. The committee members provide leadership and
direction for the Change Process. Below the ESC, Change Managers (CM) work on the
organizations key change areas. There can be one or more CM-teams depending on the extent
of the goals set for the organization.
To ensure good communication between ESC and CM-teams members of the ESC act as
sponsors and linchpins on each CM-team.
Below the CM, teams are Change Development (CD) Teams that work on specific problems
assigned by the ESC.
In turn, the CD-teams can designate Tiger Teams (see Step 6) to carry out one task. When the
task is completed, the Tiger Team is disbanded. Members from CM and CD-teams will as
sponsors and linchpins in the same manner as the ESC-members
8.2.1.3.2 Identify Customer Needs
To make the change process work you must focus on meeting your customers expectations
(=needs and wants). Customers can be either coworkers (=internal customers) or end users
(external customers) of your services or products.
8.2.1.3.2.1.1 Customer - Things We Know
Customer Satisfaction is defined by our customers - and thats what we should be seeking
to achieve.
We may be very content with what we are doing, but if our customer does not like it, we
will never achieve Customer Satisfaction.
GOOD customer service results in Satisfied Customers, who are more likely to give
positive recommendations to their friends and colleagues. This will result in seeing an
increase in new customers and probably an increase in repeat business from those who
choose to return.
152
BAD customer service results in Dissatisfied Customers, who not only do not come back,
but also tell their friends of their experiences and dissuade new people from ever trying
us out.
At the outset of the Change Program, you must choose to implement it either widely or with one
or more product or process development pilots. A partial implementation will allow focusing the
resources on specific projects. Selecting the change targets involves identifying the potential
opportunities, setting priorities, and choosing the effort that offers the most significant
opportunity for business improvement.
It is also possible to tailor a combination of the two approaches to fit particular circumstances.
In any case, the decision is one that each organization must make after realistically assessing a
number of factors, including:
The Change Plan must disclose how much it will cost to implement the Change, the level of
effort to be funded, where the required time will come from and how it is to be accounted for,
who will provide what personnel, and what facilities will be used. Obviously, these resource
decisions must be coordinated with all those affected by the decisions. This part of the plan may
the hardest to develop because Change Management will now be competing with other
153
requirements for organization resources. In addition, it may be the first test of the managements
commitment to the Change Process. Milestones for providing the identified resources should be
included in the plan.
One must be aware the new way of doing things are to become a way of life in the organization,
and that in reality Change Management is not competing for resources because it will be integral
part of the future corporate mission.
8.2.1.4 Step 3 - Conduct Training
Training and/or retraining are essential to the success of the Change Project. Training programs
will create the kernel of an organizational culture, which will create a favorable climate for the
change program.
It is important to note that during the early stages of implementation of the effort, attention
should be given to developing a detailed plan for training executives, managers, engineers, and
all team members. This includes:
Besides learning the necessary technical skills to use the tools, each team-member must be
encouraged to learn the basic philosophy, principles, and practices involved in making the new
strategy one that focuses on "Why do we do what we do at all. You need to provide the
freedom for your team members to raise questions regarding problems that are thought of as
business-as-usual practices. All employees must better understand their jobs and their roles in
the organization, and how their jobs will change.
Such understanding goes beyond the
instruction given in manuals and job descriptions. Employees need to know where their work
fits into the larger context: how their work is influenced by workers who precede them and how
their work influences workers who follow.
To prevent surprises and delays in implementation, the training plan must include reasonably
accurate estimates of the schedule and required resources.
8.2.1.5 Step 4 - Ide ntify Goals and Performance Measures
Once the Change targets for improvement have been set, the team should define the change
efforts as clearly and completely as possible.
The principal benefit of this step is that Change Development teams begin their work with a clear
understanding of their mission and an idea of what successful performance will look like. Their
efforts are properly focused on how they will achieve the process vision and performance
154
objectives set in place by senior management, not wasted on trying to determine what their
objectives should be.
8.2.1.5.1 Business Case Analysis
It is critically important for the for a successful Change Process to have a clear understanding of
the business case justification.
You must include a strategic planning, business issue
identification, business opportunity identification, critical process identification, strategic goals,
and top-level cost performance analysis. This is not as difficult as people think. Most
enterprises have some picture of their performance, as well as some idea about how much they
want or need to change or improve over a given time frame. The difference between where they
currently are and where they want/need to go is the driving motivation for the Change Process.
The difference must be translated into a set of goals, initiatives, and top-level initiatives that
form the roadmap or strategic plan for improvement. This plan can then be used to further
expand definitions or critical business issues or opportunities, as well as to identify the core (or
critical) business processes that support those business issues.
By identifying critical business issues, processes, and goals, this process produces the primary
inputs to the Change efforts. A business case based on these goals, initiatives, measures, and
estimated costs needs to be developed to reassure management that the enterprise is headed in
the desired direction and that the fundamental question of affordability (or return on investment
for the effort) is identified early on. The specific benefits to be gained also need to be identified
at this point. This initial business justification or forecast will be used to benchmark progress
throughout the change effort when preliminary or intermediate results will be compared against
the business case to ensure that the options being chosen or evaluated are consistent with the
business case.
The business case should focus primarily on what it takes to help a customer to be very
successful. That is, the ultimate goals of a business from the customers perspective (and,
therefore, the business case itself) need to demonstrate how the business goals, such as revenue,
profitability, improvements in other socio-economic factors, growth of interest to the business,
etc., are also supported.
8.2.1.5.2 Performance Measures
An importantand often overlookedcomponent of an effective Change Initiative is the
yardsticks to use to measure and gauge progress and performance. If the Change Team knows
from the outset their goals and targets in a measurable form, the probability of success is greatly
increased. There needs to be meaningful metrics, and the means to measure for that metrics.
The Change Development teams should set in place a means of measuring performance to ensure
that the improvement benefits are realized.
The measurement process needs to be viewed as a process for obtained vital insight into the
progress, products, and/or processes of the change project. This insight will help the decision
maker to make more informed decisions, identifying deviations from plans earlier, thus allowing
mid-course corrective actions when it is least expensive to make them. Measurement should not
155
be viewed as a set of predefined measures that never change throughout the program. Instead,
the measures used need to address the current issues at hand, which may change with time. The
measurement process includes the activities for selecting and specifying the measures,
establishing a measurement plan, planning and executing the data collection and storage,
analyzing the data, reporting the results, and most importantly, taking action.
The measures chosen must provide insight into the identified objectives, constraints, risks, and
issues. As this change, the measures in use need to be re-evaluated for adequacy in providing the
necessary insight and changed, if necessary. The measure remains active only if it has a valid,
justifiable purpose.
Generally peaking, when selecting the Performance Measures five major factors should be
considered. Cycle Time, Cost, Quality, Asset Utilization, and Revenue generated.
8.2.1.5.2.1.1 Cycle Time
The first of which is cycle time. Cycle time can be measured as the how responsive an enterprise
is to the customers needs (i.e., the ability to get a product to the marketplace in a timely
fashion). The term can also refer to the ability to increase or modify capacity to produce a
product or service in response to market needs, as well as the ability to respond more quickly to
changes in the marketplace or business environment.
8.2.1.5.2.1.2 Cost
The second major factor to consider when making the business case is cost. The business needs
to have affordable systems or methods of productions for goods and services.
8.2.1.5.2.1.3 Quality
The third factor is quality. Quality does not simply refer to meeting product specifications (or
standards of excellence), but also includes non-quantifiable attributes of business, such as
whether customers are satisfied that the business is providing them with every means to achieve
their own success. Quality is also measured in terms of the robustness and reliability of the
systems provided. The bottom line of quality is that the customer feels that the system is always
available to provide what the customer needs.
8.2.1.5.2.1.4 Asset Utilization
The fourth factor for consideration is asset utilization. In the case of manufacturing, asset
utilization involves the availability of equipment and other assets to produce a product. In a
156
larger sense, asset utilization is also about the ability of the enterprise to be creative, flexible, and
adaptive. One of the issues the business community faces today is a critical shortage of skilled
personnel resources. Ineffective business processes will quickly waste the few resources that are
available.
8.2.1.5.2.1.5 Revenue Generated
The fifth factor for consideration is revenue generated (or the value of the output product).
Clearly, revenue is not the only measure of output in, for example, a government organization
where output may be the number of missions successfully flown, the form of currency, or the
measure of productivity, for the U.S. Air Force. Any parameter for measuring what an industry
produces can therefore, serve as its revenue. Revenue, then not only considers the costs
associated with producing something, but also the benefits gained by the customer receiving the
product. In the case of the Air Force example above, the customer might be the public.
8.2.1.5.3 Goal Prioritization
Critical business issues must be discovered and identified to drive the Change project for the
enterprise.
8.2.1.6 Step 5 - Document, Plan, and Sell
Document your Change Plan. Create a living plan that reflects the continuous improvement of
your operations and change efforts. Make this plan available to all of your managers and teams
to ensure that goals and approach are communicated throughout your organization.
You must sell your program by:
Have the approval and support at the highest level of an enterprises management.
Involve those individuals who participate in, and manage, the process.
157
Are conducted within the context of the enterprises culture and values.
Invest in the training, education, and tools to establish an in-house re-engineering and
process improvement capability.
The Change Development leader must remember that the key to success is communication.
Therefore, the number of organization levels must be reduced. Teams must be very democratic,
with participation from all members. The teams must have as much decision-making power as
possible.
More suggestions to improve on success of the teams are:
Clear goals: Explain the purpose of the project to all members as well as what is to be
accomplished and by what date. In addition, it is often advisable for teams to set their
own specific subgoals and statement of purpose.
Familiarity: The members of the group should spend time to get to know one another.
The team must be motivated, and much can be accomplished if all the members identify
with the team.
Group activity: Not all work has to be done by the entire Team, but avoid situations
where members work separately.
Full participation: Since the team members are coming from separate functional areas,
no one group should dominate. Recognize that all team members can make valuable
contributions.
Recognition: Individual recognition is a powerful motivator. Give team members proper
credit and visibility during and at the end of the effort.
Attention to conflict: Many teams fail because they never learn to deal with conflict as a
positive and creative force. Training in conflict resolution is highly advisable.
Leadership skills training: Leadership skills training should be provided in
communication, problem solving, decision-making, creativity, and planning for those
appropriate roles.
In addition, training should include interpersonal skills, influence
skills, meeting management skills, and negotiating skills.
While implementing the changes, one should have a constant eye on the five layers for change:
People, the Business, the Processes, the Information, and the Physical (Technology) layer.
While each change or change element will target one of the layers, it will have influences on the
others.
8.2.1.8.1 People
At the top people, characterized by:
8.2.1.8.2 Business
The business itself is characterized by:
8.2.1.8.3 Processes
The processes are at the center of the organization and are characterized by:
8.2.1.8.4 Information
At the heart of the processes is the need for information, characterized by:
Semantic Definitions/Understanding/Language
Project Context Rules for Creation and Use
Fixed Software Processes
Integrity Management
8.2.1.8.5 Technology
At the lowest level, we find the Physical Layer that will enable the changes:
159
160
Are the organizations values, goals, objectives, policies, and procedures clearly stated
and widely known?
Does the organization have an abundance of priorities, or have a vital few been identified
and articulated?
Be specific. If Sam is told, "Good job on that product design!" he is left not knowing
which part of the design succeeded so well. Managers stand a better chance of having
desirable actions repeated if those actions are clearly specified.
Be directed at the right person. If the product came from a team, and Sam has been out
of town or on vacation while it was being developed, he is not the person to recognize
even if he is the team leader. Who developed the product?
Be genuine!
Be timely. Reinforcement should be given as close to success as possible.
Recognize the used methods, not just results. The results will be unique to any given
situation. The used processes, on the other hand, are versatile enough to handle a wide
variety of situations. It is the internalization of the Change Development processes you
wish to encourage; therefore, that is what you should reinforce with praise.
Reward is given at the completion of a job. It is tangible, and usually comes in the form of
mementos, merchandise, travel, stock, or cash. Rewards range from a simple plaque to a profitsharing program. Rewards say, "You deserve to share in the tangible assets of your work," and
as such can be powerful motivators.
161
Change Development is bolstered by the effective use of recognition and reward. All managers,
at all levels, should continually identify those teams doing a good job - and then create ways to
tell them so.
Recognition and reward should be woven into the very fabric of Change Development. People
who assume responsibility for continuous growth in meeting customer requirements are in turn
motivated to further growth by honest recognition of the large role their efforts play.
8.2.1.9.3 Adjust
Your Change Development planning and implementation efforts must not be locked in concrete.
As you learn more about your companys strengths and weaknesses, change your Change efforts
to reflect the feedback, and if the results are not as expected, then reexamine the problem and
reengineer the effort, based on what was learned.
8.2.1.10 Change Tools
This Section is not meant to give ALL the tools needed to start the Modernization Program. It
only gives overview of the tools that you probably will need during the first phases of your
Modernization Project.
8.2.1.10.1 Success Stories
To motivate management and co-workers a file of success stories, in- and outside the
organization, might be very useful.
8.2.1.10.2 Compendium - Business Technologies
To ensure that every speaks the same language it is advised to edit a "Management Guide to
Business Technologies"
8.2.1.10.3 Total Cost of Ownership-Models
They will allow you to make the cost trade-offs.
8.2.1.10.4 Business Process Modeling Tools
During the Change Process there is a strong need for means that enable better documentation,
communication, understanding, and learning, especially with regard to development processes
and the inherent process know-how. Business Process Modeling (BPM) tools will help doing so.
Which BPM-tool(s) to choose will depend on your ultimate goals. We identify four distinct set
of user requirements for these tools: business diagramming, business analysis, IT requirements,
and IT process analysis.
162
Transparency
Understanding and Learning
Coordination
Better Planning and Management
Documentation and Reusability
Prerequisite for audits
What-If analysis
Basis for Process Assessment
Shorter Development Cycles
163
This strategy would employ a computer-based environment for generating and storing unique
data elements only once and yet provide multiple accesses to multiple applications. This
strategy, depicted in the form of an NCoO, identifies typical users needs for technical data
throughout all life-cycle activities of defense systems management, design, manufacture, and
support functions.
8.2.2.1.2 How to Use This Section
This section is intended to be used as a guide for creating an NCoO. A structural approach to
implementing CALS requirements is provided. Some examples of the statements to be used in
the Acquisition Plan (AP) are included in this section in the next paragraph CALS
Implementation strategy. Figure 8-1 shows the relationships of the NCoO to the contracting
process. Figure 8-2 diagrams the process required to determine how CALS should be applied to
the contract deliverables.
Further paragraphs provide the general requirements and
considerations for the process described in figure 8-2, including the specific process for defining
the data types and deliverables, data users, data utilization, user infrastructure, data format,
applicable specifications and standards, and data delivery media.
8.2.2.2 CALS Implementation Strategy
Before developing a NATO/Government CALS Concept of Operation (NCoO), the Acquisition
Plan (AP) should show a clear signal of commitment to the NATO CALS strategy. For this
purpose, the AP should include the following statements:
The [XYZ] program will take advantage of existing and emerging automation and
integration capabilities to establish a computer -based environment for creating,
managing, and storing data elements once for multiple applications across engineering,
design, manufacturing, and logistics functions and processes. The program will stress
continuous engineering, digital data delivery, and on -line electronic information services
in the solicitation process and resulting contract(s).
Continuous Acquisition and
Life-cycle Support (CALS) standards and specifications for digital technical information
exchange will be cost effectively implemented.
The [XYZ] project intends to implement CALS and Electronic Data Interchange (EDI)
initiatives to reduce life-cycle costs, improve product quality, reduce program risk, and
reduce the schedule of the design, development, and production.
The technical
information required in support of the project will be made accessible through on -line
contractor integrated technical information (electronic) services; physical delivery of data
required for sustaining support activities will be in accordance with approved CALS
format standards and specifications. For contract data requirements not evaluated as
cost-effectively delivered to the CALS standards/specifications, delivery will be in
mutually agreeable digital formats. The digital formats for all data users and user
systems will be determined cooperatively between the government and contractor using
the NATO/Government CALS Concept of Operations (NCoO), developed by the project
office, as the basis for selection. The draft and final RFPs will incorporate requirements
for the offeror to address implementation of concurrent engineering and digital
delivery/electronic access of program technical information. Significant weighting will
164
be applied to the CALS and EDI elements in source selection evaluation (not less than 10
percent of the total evaluation/rating).
165
Pre-RFP/RFQ Activities
- Acquisition Planning
- Data Gathered
- CDRL Developed
- NCoO Developed
RFP/RFQ Release
Contractor Proposal
Proposal Evaluation
Negotiation
Contract Award
- Modification to NCoO
- Modification to CAC
- CDRL Modifications
166
Development of a NCoO will help ensure that NATO/NATO nations, referred to, from now on,
as the CUSTOMER, receives the correct version and formats of digital data products needed to
acquire and support a defense system. The NCoO can assist the project manager in determining:
The hardware and software systems the customer has, or is developing, to manage and
use the data;
Data users, types of data, frequency of use, and timeliness of data access or delivery to
each user;
Data use and the review and/or approval processes to support life-cycle functions;
Users locations and their primary functions in support of the defense system;
Data interchange requirements including format, media, applicable standards, and
existing telecommunications capabilities;
Access authorizations and restrictions;
Data acceptance requirements including data format and content of data and the customer
processes for accepting product, processable, or Contractor Integrated Technical
Information Service (CITIS) data.
167
Any selected alternatives proposed by the contractor must also be incorporated into the contract
and appropriate Contract Data Requirements List (CDRL).
8.2.2.3.5 Contract Award
The solicitation and ensuing contract should state that an objective of the acquisition is to require
the contractor to generate information products for development and production functions in an
integrated information system and a shared data environment to the maximum extent practicable.
Ideally, this integration should be achieved as part of a comprehensive concurrent engineering
strategy. The integrated environment will provide for generation, storage, indexing, distribution,
access, and delivery of digital technical data products in support of defense system development
and production functions and processes. The objective is to create each data element once
and use it repeatedly in subsequent processes without manual reentry work and labor
costs.
The contract should require the contractor to generate information products
for development and production functions in an integrated information system
and a shared data environment to the maximum extent practicable.
Developing this integrated environment will most often require a phased approach for
implementation. To facilitate a phased implementation of the CALS strategy, the program
manager may wish to require a CALS Implementation Plan (CALSIP) as a contract deliverable
(typically 60 days after contract award) that is maintained throughout the life of the contract.
8.2.2.4 Background Information for NCOO Development
The NCoO must provide potential bidders an understanding of specific customer needs for
technical information throughout all relevant life-cycle activities of the defense system. The
NCoO must be thoroughly developed for potential bidders to respond with a proper CAC.
Therefore, the acquisition of technical data by the Program Manager requires a detailed
definition of data requirements. The effective definition of these technical data requirements
necessitates the complete identification of data needs and uses. Identification of these data
requirements can be effectively accomplished using a well-defined process described in this
section. A flow chart of the entire process is shown in Figure 8-2.
168
Management
Engineering/Design
Supply
Training
Manufacturing
Maintenance
6. Determine the
required data format.
4. Identify users
infrastructure.
View only
Comment/Annotate
Update/Maintain
Extract/Process/Transform
Archive
Hardware
Software
Networks
7. Determine what
interchange standards
are required.
Composed Products
Text File
Graphics Files
Alpha Numeric File
Audio/Visual File
Integrated Data File
Text Standards
Graphics Standards
Applications Unique/
Data Standards
169
Discipline, functional activity, type, or other such groupings to facilitate a standardized approach
to applying the CALS digital data standards and specifications should categorize the data
deliverables.
8.2.2.4.2 Data Users
The data users, as shown in Table 8-3 are the functional organizations that will require access to
the program data. These organizational areas typically include acquisition, engineering/design,
supply, training, manufacturing, and maintenance. In addition to their functional responsibilities,
these organizations are defined by their location and the specific disciplines involved and may be
different from nation to nation.
8.2.2.4.3 Identify Data Use/Processing
The data use requirements are the ways in which the chosen data types may be considered for
processing. The project manager will need to identify the use of the data types by the support
170
organizations chosen for the program. The five defined methods of data processing typical of
most defense systems are described below.
View only - the ability to examine a data file without the ability to change it. This
includes viewing selected portions of one or several documents as well as side-by- side
comparisons of documents.
Comment/Annotate - the ability to evaluate and highlight for future reference or to
make annotations, approvals, and comments without the ability to change the original
file. Annotations are associated with a specific item or location within a document such
that the annotations are displayed whenever that point or area of the document is
displayed.
Update/Maintain - the ability to change data either directly or through controlling
software in the active files on the host computer.
Extract/Process/Transform - the ability to extract and modify the format, composition,
and structure of the data into another usable form.
Archive - the placing of data into a repository to preserve it for future use.
Hardware: Determine the current and planned hardware available to support the program.
Software: This is the most critical element. Interoperability will normally be achieved
using software. Again, determine both present and future software applications and
availability.
Networks: Determine the local- and wide-area networking capabilities and whether
CITIS will be used.
In the case of NATO procurement, it should be noted that different nations might have
different systems.
171
Computer support personnel: Consider the skills and expertise required to establish,
operate, and maintain a functional and reliable computing environment.
Communications: Determine data communication capabilities.
Table 8-2 describes a sample of the data user infrastructure and capabilities.
Table 8-2 Data User Infrastructure and Capabilities
NACMA
Hardware
Word
Processor
Graphics
PCS on
TEMPEST
and nonTEMPEST
LANs
Word
Perfect
Version 6.1
Corel
Draw
Version 5.0
Spreadsheet
MS
Excel
Version
5.0
Databases
MS
Access v.2
Ingres
Version 3.0
SGML
Yes
Acceptable
Means of Data
Delivery
DOS Floppy
3.5 inch
D-ROM
Analogue
Modem
Group 3 FAX
Belgium
France
Germany
Italy
Audio/Visual File
Integrated Data File
173
On-line access, as distinguished from on-line delivery, refers to the situation in which an
organization accesses data items through CITIS services, or other similar information
management services, as negotiated in the contract.
Secure, on-line transmission of the full volume of data for defense systems is technically feasible
but severely taxes current telecommunication networks. In the near term, telecommunications
may be limited to electronic mail exchange of high-priority technical data, the use of mutually
agreed EDI transactions, or other clearly defined uses such as CITIS access. On-line interactive
access provides immediate and timely data access for custom report generation, document
generation, and on-line request of information transmitted as composed products and processable
data files. Project managers should give preference to use of CITIS for performing the functions
of updating, storing, controlling, reproducing, and distributing data items.
As an interim
standard, MIL-STD-974 provides information concerning core and tailorable CITIS functions
that should be specified in the SOW and listed as contract line items. In the long term, cost
effectiveness will be essential for successful implementation of a totally integrated defense
system database.
Upon completion of the NCoO, the logistics manager responsible for technical data will be
prepared to enter the solicitation and source selection process with a firm CALS implementation
strategy and knowledge of the needs and capabilities for acquiring and using digital data.
8.2.2.5 Data Acquisition Requirements Method
The identification of information for inclusion in the NCoO is described in the following sections
and shown in Figure 8-2 . The project manager can employ and adapt this methodology to a
specific acquisition to develop the program requirements for digital data delivery or access.
8.2.2.5.1 Identify Data Type Requirements
The project manager will need to gather the data requirements of all the data users and select the
data types that are necessary to accomplish the program objectives. Each of the specific types of
data required will be determined by the unique conditions and constraints associated with a
specific program. The data types selected will ultimately influence data format, interchange
standards, and media considerations. The best method for determining the types of data
deliverables required is to extract the data deliverables list from the CDRL and to categorize the
data types.
The project manager must also be aware of the various infrastructure modernization programs
that are in place, or soon to be in place, to accept, manage and use digital data. Any data
deliverables that will require updating and maintenance throughout the life-cycle of the defense
system (engineering drawings, TMs, LSAR, etc.) are excellent candidates for digital delivery and
making use of the infrastructure modernization programs. Use of these modernization programs
should be seriously considered during NCoO development.
The project manager should certainly take advantage of these programs in place for the
management and use of data deliverables in digital formats.
174
...
...
...
Location
...
...
...
Point of Contact
...
...
...
Disciplines
(Functional Areas)
...
...
...
175
MANAGEMENT AND
ADMINISTRATION DATA:
Program Plans
Engineering Support Plans
Progress and Status Reports
Contract Vehicles
DATA
DELIVERABLE
TYPE
1, 2
1, 2
1, 2
1, 2
FORMAT
A, B, C, E, F
A, B, C, E, F
A, B, C, E, F
A, B, C, E, F
176
MEDIA
a, b
a, b
a, b
a, b
DATA TYPE
DATA
DELIVERABLE
TYPE
PRODUCT DESCRIPTION
DATA:
Drawings/Associated Lists
ECP, RFW, RFD
Analysis Data
Simulation Data
1, 2
1, 2
1, 2
1, 2
FORMAT
B, D
A, B, C, E, F
A, B, C, E, F
A, B, C, E, F
MEDIA
a, b
a, b
a, b
a, b
1. Composed Products
3. Media
A. Hard Copy
B. Page Image
C. Text File
D. Graphics File
E. Alphanumeric File
F. Audio/Visual File
G. Integrated Data File
b. On-line (CITIS)
Telecommunications
(X.25, TCP/IP,
Contractor Specific)
177
Specific data formats and delivery modes should be stated on individual CDRL items. Proper
safeguards should be used for classified information. In general, the following formats and
delivery media are recommended for each data type.
Section 9 and Section 10 of this Handbook contain details of applicable standards.
Management and Administrative Data: This data should be available through CITIS. Online management status data should be analogous to that available to contractor program
managers.
Integrated Logistics Support (ILS)/Logistic Support Analysis (LSA) Plans and Reports:
Mutually Agreeable Commercial Software (MACS) formats. Text-based documents
should be generated in a commonly used, word processing format. Ancillary graphics,
spreadsheets, and other associated data files should be developed in common business
software. These files should be provided as separate files in their native formats as well
as incorporated into a master document. It is preferred that these files be delivered
electronically over the communications network.
Depending on file size and
communication speed, this may necessitate MACS file compression routines or floppy
disk delivery. Relational database formats should be capable of being accessed via
Structured Query Language (SQL) and delivered in accordance with MIL-STD-1840. In
the near term, LSAR data tables should be in accordance with MIL-STD-1388-2B;
NATOs long-term plan is to merge these data into a new international Acquisition
Logistics Standards.
178
of data delivery. A variety of factors can influence the decision for a CITIS requirement,
including program phase, data type and format, volume of data being delivered, lifetime of the
data, the interchange standards required, and the cost to implement the system. The data delivery
and access media should be specified in the SOW and CDRL.
Telecommunication networks provide an excellent opportunity to exchange and establish
common practices for business type data using commercial Electronic Data Interchange (EDI)
transactions. EDI is the computer application to computer application exchange of business data
in a standard format between trading partners. Currently there are numerous transaction sets that
transfer data in the functional areas to procurement and contract administration; finance and
payment; transportation; supply management; maintenance; fuels; and program management.
Transaction sets have been developed to support project-scheduling reporting, cost performance
reports, cost/schedule status reports, and contractor cost data reporting. The project manager
should consider taking advantage of using EDI for program administration process
improvements UN/Electronic Data Interchange for Administration, Commerce, and Transport
(UN/EDIFACT) will be used for electronic transmission of such data.
The standards for delivery and access media are shown in Section 9 of this Handbook.
8.2.3 Concurrent Engineering
Source: NCOPS 3.2
Concurrent engineering means simultaneously performing both the actual and simulated
processes of designing and developing a product. All phases of a product are considered
concurrently, with the design modified as necessary to make sure the product is useful at all
stages of its life-cycle. The materials and efforts needed to manufacture, maintain, and dispose
of a product are determined while the product is undergoing design. Problems in later life-cycle
stages are anticipated and dealt with before they can arise. Clearly concurrent engineering
reduces the costs involved in solving such problems while a product is being built or after it has
been released in the field. The least expensive changes in a products life-cycle occur in the
design phase, so concurrent engineering concentrates on making changes there. Quality is
improved, products come to market faster, and costs are reduced.
Concurrent Engineering saves time and money but greatly increases the requirement to share
information and to manage product change over the whole of the life-cycle. Concurrent
Engineering is difficult to achieved in practice without a Shared Data Environment.
Concurrent Engineering differs from the traditional approach to defense system development
(e.g., PAPS, see Annex B) in two important respects:
179
skills to solve the problem in hand. For example, a maintainer, a designer, and a parts
supplier may be brought together to solve an in-service problem, even though they
worked for three different organizations.
The Concurrent Engineering approach replaces the traditional sequential approach by a series of
overlapping activities, which progressively evolve, or refine, the design towards a fully
acceptable solution. This is illustrated by the following figure:
Zig-Zag
Problem
Requirements
Design
Implementation
180
constantly changing and evolving, they need to be sure they are getting access to the current
version.
Shared information is key, but often implementations of concurrent engineering attempt to
cobble together a number of discrete, specialized applications (CAD, MRP systems, paper-based
systems, release systems, and so on). Information is often difficult to access or share.
The solution is a shared data environment that can store all the information needed by all those
involved, without limiting access based on life-cycle stage.
8.2.3.2 Example Use of an Integrated Database
To demonstrate the benefits of using a shared database for concurrent engineering, consider the
process of designing and creating a computer mouse.
8.2.3.2.1 Design Process
A designer creates the mouse design layout using a split case that snaps together. As in a
traditional system, the design is created on a CAD system. However, each component part is
placed in the integrated database, including information about its materials and vendors.
8.2.3.2.2 Maintenance Analysis
A simulation performed using the mouse design finds some problems and recommends that the
lower half of the case be split into two (to allow access to the track ball) and that the top and
bottom of the case be attached using screws instead of snap locks.
In a conventional system, this finding requires someone to create a change request, on paper or
through electronic mail.
With the integrated database, the change request is entered directly into the database, associated
with the version of the design that posed the problem. The change request contains many details
such as the person asking for the change, the date it was requested, and the approval or
disapproval of the change. The change request remains in the database for future reference.
8.2.3.2.3 Design for Manufacturing Analysis
An analysis shows that the use of screws increases the cost of the mouse.
In a conventional system, the supporting information for this finding exists in paper documents
or text files, and probably cannot be linked easily to the change request that prompted the
comparison of the two methods.
With the integrated database, the change request for the screwed-together case is available to the
testers, who disapprove it, with reasons, and enter a change request for the changed material. A
trail of request/disapproval/reason is established and maintained.
181
The
With the integrated database, approvals for release are performed right in the database. All the
current information, including version, quantities, materials, manufacturers, and so on is located
in the central database and available at all times.
182
Substantial reduction in the amount of data delivered and stored in paper format;
Improved accuracy and timeliness of data;
Improved management and tracking of review status;
Reduction in review cycle time;
Improved comment collection and correlation;
Consistency of data used by all agencies/activities;
Readily accessible archive/repository of program date;
Facilitated sharing of data within the contractors own enterprise, between the contractor
and the users, and between the users activities and locations;
Reduced lead times and costs for weapons system design, manufacturing, and support
processes;
Technical information accuracy and timeliness.
Although there may be some initial identifiable costs associated with implementing a CITIS,
carefully-selected CITIS requirements should result in substantial savings over the program lifecycle by reducing costs for data generation, delivery, and access/usage. Cost savings should be
realized not only in terms of reductions in paper purchases, copying costs, and actual delivery
costs, but also through a substantial reduction in the labor required to locate, access, and process
information. A CITIS has the potential to greatly improve the efficiency of both the contractors
and the users processes.
183
Value
(#Points)
2
YES/NO
184
SCORE*
Value
(#Points)
YES/NO
SCORE*
185
DATA TYPE
DATA
CATEGORY
DATA
CHARACTERISTICS
DELIVERY/
ACCESS MODE
Agendas, status,
reports, schedules,
minutes, general
communications
Programme
Plans
Limited reference
Contractual
CITIS on-line
access
Large volume.
Tape/Disk
delivery
CITIS on-line
access
Programme
Management Data
Product
Description Data
Drawings,
specifications, parts
lists, data lists,index
lists, and TDP
management data
CITIS on-line
access
LSAR, LORA,
R&M, Provisioning,
Technical
Documentation
Frequent access,
Users approval
CITIS on-line
access
Provisioning file,
training data, LSA
plans, logistic plans
Large volume,
limited reference,
infrequent update
Operating, maintenance,
inspection & overhaul,
data, software source
code
Large volume
Logistic Support
Data
Technical
Publications
Tape/Disk
delivery
far out-of-date with current technology), these locations may require infrastructure upgrades to
be able to access the CITIS.
The ultimate decision on infrastructure upgrades will depend on the amount of funding available
and the program managers own judgment. If some locations have equipment inadequate to
accommodate a basic CITIS, they are probably inadequate for performing many other functions
that could be valuable to the program and should be upgraded regardless of whether a CITIS is
required. If it appears that the existing infrastructures are compatible and state-of-the-art, the
program manager can probably safely acquire a CITIS without having to worry about paying for
extensive NATO/NATO nations infrastructure upgrades.
In general, the contractor should be responsible for modifying its systems to be compatible with
the existing systems used by the NATO/NATO nations, rather than the NATO/NATO nations
modifying its systems. The only time the NATO/NATO nations should need to consider major
upgrades is in the case of outdated equipment. The contractor should propose a CITIS that will
work with the existing NATO/NATO nations infrastructure to the maximum extent possible and
discuss any upgrades that it feels are necessary either in the proposal or in the post-award
CALSIP and/or CITIS planning meetings. The contractor and the NATO/NATO nations should
work closely together to create a CITIS infrastructure that will be the most beneficial to everyone
who will use it.
8.2.4.2.5 Reviewer Locations
One of the main goals of CITIS is to facilitate the movement of data deliverables from one status
to the next, and the more widely dispersed the reviewer locations, the greater will be the benefits
from using a CITIS. When data reviewers are at widely separated locations, a substantial portion
of the review cycle time can be taken up by shipment of the data and review comments from one
location to another. When a CITIS is available, as soon as one reviewer has completed the
review and approved the data item for passage to the next reviewer, that next reviewer can
instantly access the data item and begin his review, regardless of his physical location. The
review cycle time is now simply the amount of time taken by the reviewers to actually review,
comment, and approve/disapprove the data item.
8.2.4.2.6 Data Currency
One of the many advantages of CITIS is improved accuracy and timeliness of data. After data
has been created or revised, it can be made almost instantly available to the NATO/NATO
nations reviewers and/or users who need it. Using current business processes, data items can
take days to travel from the contractor developing it to the NATO/NATO nations personnel who
need it. If rapid access to new data is important to the program, a CITIS may prove to be highly
beneficial.
8.2.4.2.7 Existing Electronic Communication Capabilities
If a program already has some form of electronic communication/data transfer capabilities in
place, either between the NATO/NATO nations and the contractor, or between NATO/NATO
nations activities, the cost and effort to implement a true CITIS may be substantially reduced.
187
Even if a program does not meet some of the other criteria listed above, if it already has basic
electronic data transfer capability with its contractor, a CITIS may be relatively easy and
inexpensive to implement, and could still save a substantial amount of money over the remaining
life of the program.
8.2.4.2.8 Data Revision Frequency
If the CDRL includes a substantial amount of living data that will often be updated, a CITIS
can prove highly beneficial in ensuring the accuracy and consistency of the data used by all of
the CITIS locations. Because all locations have access to the same master data file, the
likelihood of data users possessing outdated or incorrect information is substantially reduced.
The "archive" function of CITIS assumes added importance if a deferred delivery option will
apply to the contract.
8.2.4.2.9 Program Considerations
CITIS becomes more cost effective and beneficial when applied to programs that have
substantial data requirements, are in an early phase of development, and/or have long-term data
requirements. However, CITIS should not be ruled out just because a program does not meet
any of the above criteria; all of the questions shown in table 5-1 should be answered before a
decision regarding CITIS is made. The program manager should evaluate and implement
process improvements wherever economic benefits can be achieved.
8.2.4.2.10 CITIS Functional Requirements Determination
After the questions in Table 8-5 have been answered and a CITIS has been determined to be
beneficial to the program, the program manager should review the NCoO questionnaire
responses to determine which CITIS functions apply to his program.
Program managers should bear in mind that the greater the number of CITIS functions and
services required, the greater the potential cost of CITIS development and implementation. After
determining program-specific CITIS requirements, the program manager should weigh the
estimated cost of the service against available funds and potential benefits. If the estimated cost
of the CITIS services selected exceeds existing budgetary estimates, the program manager
should tailor the CITIS requirements and functions as necessary.
8.2.4.3 CITIS Functionality
The CITIS functionality can range from basic data interchange functions to extensive interactive
capabilities. The program/project manager must specify which, if any, of the CITIS tailorable
functions are desired in the SOW, CDRL and acquisition contract.
8.2.4.3.1 CITIS Services and Functions
Table 8-6 provides supplemental details on CITIS services and functions. Information provided
includes potential problems, lessons learned, and other issues to consider when determining the
CITIS requirements for the SOW, CDRL.
188
CITIS
Management
Information Services:
Availability and Accessibility
Users Furnished
Information (UFI)
Multi-user Access
Considerations
Services typically required with CITIS
Electronic Mail
Data Dictionary
Interface Compatibility
Communication Protocols
189
Service/Function
Training Support
Telephone Support
On-line Help
Data Configuration
Management
CITIS Security
Access Controls
Contamination Control
Core Functions:
Acknowledge
Approve or Disapprove
Comment
Considerations
SOW specifies form(s) of training: documentation,
contractor visits to CITIS user sites, number of
training sessions, etc.
SOW can specify frequency of CITIS training/
documentation updates (e.g., after major system
changes, every six months, etc.)
SOW specifies hours of telephone support (may be
different from CITIS hours of operation).
Telephone support most advantageous for large and
varied groups of CITIS users.
CITIS users will not be able to replace contractor or
UFI data.
SOW specifies user data access privileges (i.e.,
access to working data - neither contractor nor
NATO/NATO nations - is not granted unless
specified in the SOW).
Contractor should obtain written approval from
cognizant security officer before including classified
data in CITIS.
SOW can address protection of business sensitive or
proprietary data by both contractor and the
NATO/NATO nations.
Primary contamination control typically provided by
allowing only authorized users to access CITIS data
SOW can require the contractor to scan all CITIS
data for viruses prior to incorporation or can specify
intervals at which all CITIS databases are scanned
SOW specifies any indexing elements
Include any COTS software formats when specifying
data transfer methods.
Core functions automatically required with CITIS
Core function tailoring should only be done after
rigorous cost and effectiveness analyzes.
Can be provided via either E-Mail or CITIS
capabilities.
Can be manually input, automatic confirmation by
receiving computer, etc.
Can be provided via E-Mail or CITIS capabilities.
NATO/NATO nations may consider allowing use of
E-Mail for this function.
190
Service/Function
Notice of Delivery
Receive
Search
Store
View
Tailorable Functions:
Applications
Archive
Combine
Download
Edit
Considerations
Can be provided via E-Mail or CITIS capabilities.
SOW specifies any additional elements desired as
search criteria (will be included in the data item
index).
SOW should specify the length of time a data item
will be stored/available through CITIS.
Function allows users to request that short-term data
be retained on CITIS past its normal lifetime.
Service/Function
Forward
Package
Query
Sort
User Groups
Considerations
SOW should specify whether data will be forwarded
to other CITIS users, non-CITIS users, or both
Function is useful for facilitating the review and
approval/ disapproval of data items.
SOW must define this function - specifically:
How should the package be stored, tagged, and
indexed?
Is the package temporary or permanent?
Is it accessible by all authorized CITIS users, and
how can they be authorized?
Must the other CITIS functions be able to act on the
package?
192
193
requirements for electronic (on-line/CITIS) services, digital data delivery, and functional
integration.
8.2.4.4.3 CITIS Contract Line Item Number
Use of a CITIS Contract Line Item Number (CLIN) provides a standard methodology for
acquiring CITIS-type services and will simplify the evaluation of CITIS portion of the RFP
responses because all offerors responding to the RFP will have their cost for developing a CITIS
clearly priced. When pricing elements are subdivided, the evaluation team will be able to verify
that the contractor has included pricing to cover all aspects of the CITIS specified within the
SOW. The individual pricing elements will also provide a consistent method for later auditing of
the CITIS costs. If desired, the tailorable CITIS functions may be priced as alternative or
optional CLIN(s) to allow cost/benefit assessment.
When subdivision of CITIS pricing elements is required, typical costing areas can include system
development and installation, equipment lease, access/connect times, equipment purchase,
telecommunications, data storage, data delivery, infrastructure upgrades, data conversion,
software licenses, system maintenance, and security. The system development task includes
software development and hardware/software/ network integration, which typically requires the
greatest effort, and thus the greatest cost. The access/connect time cost includes the cost for the
contractor to connect with the NATO/NATO nations computer systems; it could also include
the connection charges for NATO/NATO nations to utilize a hotline to access CITIS, if one has
been required.
The telecommunications costs could include the cost to install and maintain dedicated modem
lines, high-speed optical lines, or a hotline number. The data storage costs could include any
service center-type costs associated with storage of large amounts of digital data (e.g., costs for
data administration, backups, and maintenance). The cost of data delivery is essentially an
application of the standard connection cost-per-minute to an estimate of the amount of data
projected to be delivered via CITIS. The infrastructure upgrade pricing element could include
the cost of any hardware and software upgrades, network (LAN and/or WAN) purchase and
installation, and costs for the purchase of data storage devices (e.g., very large hard drives,
optical drives, CD ROM jukeboxes, etc.) that will be needed to store all the CITIS data.
Software license costs can include purchase of individual and/or site licenses. Security costs
could include the costs of any special measures required for the CITIS to handle classified data.
Cost to develop the data to be included in CITIS (excluding data conversions) is not included in
the CITIS line item.
8.2.4.4.4 Sample CITIS Statement of Work
The following sections contain the language that could appear in a SOW for development of a
CITIS. Text appearing as [times new roman] is provided as the language that would be used in
the actual SOW. Text appearing as [small caps] within the actual SOW text indicates
information input by program managers relevant to their programs. Text appearing as [times
roman] at the end of each paragraph is provided as supplemental information that would not be
used in the actual SOW.
194
8.2.4.4.4.1 Scope
The contractor shall establish a digital technical information system to provide automation and
integration of the generation, delivery, and uses of [ XXX PROGRAM] technical information.
Unless otherwise specified within the contract, all, or any portion of, the technical information
specified herein shall be developed and delivered in a digital form compatible with requirements
stated herein. Unless specifically stated herein, the following requirements do not replace or
amend requirements for delivery of technical information in non-digital forms specified
elsewhere in the contract.
8.2.4.4.4.2 Applicable Documents
[List all documents that apply.]
8.2.4.4.4.3 Spe cific Requirements
The contractor shall provide a Contractor Integrated Technical Information Service (CITIS) in
accordance with the specific requirements as identified herein. The contractor will deliver in
place all data associated with this procurement and identified within this SOW and the attached
CDRL, unless otherwise noted. This data shall be maintained in an electronic form, and made
available to authorized NATO/NATO nations users and reviewers, and their assigned
representatives, in accordance with the requirements described below.
8.2.4.4.4.4 CALSIP
The contractor shall prepare a CALSIP that describes the ways in which CALS techniques are to
be applied throughout the life of the contract to satisfy requirements for service, infrastructure,
media, and format. The CALSIP shall be a living document to explore CITIS opportunities and
technology as contractor-NATO/NATO nations infrastructure evolve over time. The CALSIP
shall be updated every [365 DAYS ] throughout the life of the contract. The CALSIP updates shall
define implementation plans for the upcoming period in greater detail, resolve outstanding
strategy issues, respond to strategic and technology changes, and recommend specific
alternative approaches for continuation of CALS and CITIS in the next period. CALSIP
contents, as a minimum, shall include:
195
[The program manager is not required to contract for a CALSIP, but it is highly recommended.
The CALSIP is the only standard way we have of gaining the data required by the instructions
for ensuring the requirements have been met. In todays acquisition world, the attitude is: if it is
not considered a requirement, it will not be done.]
8.2.4.4.4.5 CITIS Site Implementation Priorities
CITIS shall be made available to [ALL] locations listed in the NCoO. [ ..... ], shall serve as the
primary installation and testing site. After acceptance of each version of the CITIS software at
the primary site, [ ALL] other sites shall be allowed access to the current CITIS version.
[If CITIS will not be provided to all locations listed in the NCoO, the exceptions or inclusions
should be specified here (whichever list is shorter). A copy of the table of locations from the
NCoO may be included here, if desired. Selection of a primary installation site is not required,
but is highly recommended. If an NCoO is not being provided with the RFP, a table of
NATO/NATO nations locations is needed here.]
8.2.4.4.4.6 CITIS Period of Performance
The [ XXX PROGRAM] CITIS period of performance shall begin on [1 JANUARY 1996] and continue
until [1 JANUARY 2001] at [ ...... ]. CITIS service shall be available to [ ALL] other locations on
[1 FEBRUARY 1996] or after CITIS acceptance at the primary site, whichever is later, and
continue until [1 JANUARY 2001].
[The CITIS period of performance specifies the date when the CITIS is to be made initially
available to the NATO/NATO nations; it is assumed that the CITIS development phase will
begin immediately after contract award and the basic CITIS will be installed and functional by
the beginning period of performance date. The period of performance may be specified to be the
same for all locations, or it may be different for each location.]
8.2.4.4.4.7 CITIS Installation
Any peculiar software that must be resident on NATO/NATO nations access terminals or
computers will be provided and maintained by the contractor. It will also be installed by the
contractor if complexity of the software warrants/requires special installation and testing
procedures.
8.2.4.4.4.8 CITIS Data Residency and Storage
Data shall be available through CITIS for a period of [ONE YEAR] after its creation or revision
unless otherwise requested by the NATO/NATO nations. Exceptions include short-lived data
such as meeting agenda, meeting minutes, trip reports, status reports, etc., which will be stored
on CITIS for a period of [ 60 DAYS ] after creation or revision. All data shall be archived after
its CITIS storage time has expired, unless it has been specified for either deletion or further
retention on the CITIS by the NATO/NATO nations.
196
[If desired, the NATO/NATO nations may break down the CITIS data availability further by
specifying the residency period for each type of data (e.g., engineering drawings shall be
available via CITIS throughout the life of the contract). If the archive function is not being
required, the program manager must specify the disposition of the data after its CITIS storage
time is expired. Note that specification of a storage period is not required; the program manager
may specify that all data is stored on CITIS throughout the life of the contract.]
8.2.4.4.4.9 Data Classification
The CITIS shall be required to handle [ UNCLASSIFIED] data only.
[Specify each level of classification that the CITIS will be required to handle]
8.2.4.4.4.10 Functions and Services
The contractor shall develop a CITIS that incorporates all CITIS services and core functions and
the additional requirements specified below. The CITIS shall also include the following
tailorable functions: [ ARCHIVE, DOWNLOAD, SORT, AND USER GROUPS].
8.2.4.4.4.11 Availability and Accessibility
The CITIS shall provide [24-HOUR] on-line service [EVERY] day of the week. Users shall be
notified [24] hours in advance of any scheduled maintenance or other events affecting CITIS
accessibility.
[For the standard, unclassified CITIS, 24-hour on-line service is a reasonable requirement.
When classified data is contained on the CITIS, the NATO/NATO nations will probably need to
specify the hours and days for which the classified data should be available. Sample language
could be: CITIS shall provide 24-hour on-line service every day of the week for unclassified
data. Classified data shall be available between the hours of 7:00 a.m. and 7:00 p.m., on normal
working days only (no weekends or holidays).]
8.2.4.4.4.12 User Furnished Information
The contractor shall provide data users with access to UFI via the CITIS. The NATO/NATO
nations shall provide approximately [25] data items that will include [TECHNICAL MANUALS ,
TECHNICAL REPORTS , AND ENGINEERING DRAWINGS ]. All UFI will be provided in [DIGITAL]
formats. The technical manuals and reports will be provided in [ RASTER FORMAT AND STANDARD
WORD-PROCESSING FORMATS ], and the engineering drawings will be provided in [STANDARD CAD
FORMATS ]. The maximum file size for any data item is [ 5 MB]. UFI shall be included in the data
item index, and CITIS users shall be able to, as a minimum, [ SEARCH FOR, VIEW, AND DOWNLOAD]
all UFI.
[Specify the approximate number, type, and formats of User Furnished Information (UFI) to the
extent possible. If the specific software applications used to create the data are known, they can
be listed here. Specify the CITIS functions required for the UFI (not all are appropriate). ]
197
198
systems used by the NATO/NATO nations, all file names will comply with the 8.3 (8 character
name plus 3 character file extension) naming convention.]
[All requirements listed above are optional.]
8.2.4.4.4.19 Security
The contractor shall establish a security system and enforce data protection and integrity
standards. System security engineering principles as outlined in [ ... ] shall be used. Controls
to prevent unauthorized access shall be established and detailed in the System Design Document.
The plan shall be based on the results of documented data protection and integrity, threat and
vulnerability analysis, risk assessments, and tradeoff analyzes. Vulnerabilities that remain after
security system design shall be identified. The plan shall include disaster recovery provisions.
Security requirements that must be complied with by NATO/NATO nations personnel will be
identified to the NATO/NATO nations in the security section of the System Design Document.
[If higher data classifications will be required, include information regarding any special security
provisions .]
8.2.4.4.4.20 Core Functions
The core functions shall be implemented in accordance with [ ... ]. [the acknowledge function
shall be satisfied through automatic confirmation of data transfer by the receiving computer.]
8.2.4.4.4.21 Tailorable Functions
The tailorable functions [ARCHIVE, DOWNLOAD, SORT, AND USER GROUPS] shall be implemented in
accordance with [ ... ] and the additional requirements described below.
8.2.4.4.4.22 Archive
[The contractor shall create and maintain an archive of data whose CITIS storage time has
expired. The contractor shall determine the method/media for this archive. The contractor shall
track and index all archived data, and shall provide access to this data upon request. The
contractor shall provide an on-line capability for users to request that archived data be made
available through the CITIS. All requests for archived data shall be acknowledged and an
approximate time frame for availability provided. Requested data should be made available
through CITIS within 24 hours during the normal work week. An electronic message shall be
sent to the data requester when the data becomes available on the CITIS. If the requested data
file is found to be larger than 30 MB in size, it will not be made available on the CITIS, and the
requester will be notified and queried regarding the preferred physical media for data delivery.]
[All requirements listed above are optional.]
199
8.2.4.4.4.23 Download
[The maximum file size that shall be downloaded is 30 MB in order to reduce potential
telecommunications problems. The contractor shall provide on-line capability for users to
request physical delivery of data files too large to download. Users shall be provided with a list
of possible media from which they may select the preferred delivery method.]
[All requirements listed above are optional.]
8.2.4.4.4.24 User Groups
[CITIS user groups shall be conducted on a quarterly basis, and meetings shall alternate
between the contractors and the NATO/NATO nations primary site. Advance notice of
meetings shall be distributed through the CITIS E-Mail system. The contractor shall be
responsible for preparing meeting agendas and minutes. Meeting minutes shall include a list of
action items and their dispositions, and shall be made available through the CITIS to all CITIS
users.]
[All requirements listed above are optional.]
8.2.4.4.4.25 Printing Capabilities
The CITIS shall include the capability for users to print information locally and shall allow users
to specify a [SINGLE PAGE, A RANGE OF PAGES, OR THE FULL DOCUMENT] for printing. This
capability shall be independent of the printer being used.
[Specify the document printing options desired.]
8.2.4.4.4.26 Licensing
The contractor shall be responsible for obtaining any licenses required for CITIS users to access
the commercial-off-the-shelf (COTS) software applications used to perform the CITIS functions.
The NATO/NATO nations will assist the contractor in obtaining permission to include any
applications developed by other contractors and/or owned by the NATO/NATO nations in the
CITIS.
8.2.4.4.4.27 Subcontractor Data
The contractor shall provide access to appropriate subcontractor data via the CITIS. The
contractor shall determine the method by which the subcontractor shall provide this data and the
manner in which it is incorporated into the CITIS.
[The contractor will determine whether the subcontractors shall be linked to the CITIS network
or whether they will simply provide their data in digital formats, and the prime contractor will
then load it into CITIS.]
200
201
CALSIP
System Design Document
Program Management Plan
Configuration Management Plan
Users Manual
Operators Manual
System Test Description and/or System Test Plan.
The System Design Document should include complete details of the specific hardware,
software, and network configurations used/planned for CITIS, along with a detailed description
of the CITIS security features. If desired, this document can also contain a data element
dictionary that lists field names and descriptions of all data elements in the CITIS database(s).
The key element of the Program Management Plan is a detailed schedule that includes the
implementation of the various CITIS services and functions and estimated preliminary
installation and test dates for the primary site. The System Test Description should include the
types of tests to be conducted, the test procedures, the test schedule, and the locations of the
tests.
8.2.4.5 CITIS Development
The primary requirement for creating a successful CITIS is preliminary planning. The contractor
and the NATO/NATO nations must discuss and agree upon a large number of issues before the
CITIS development is begun. Both sides must understand exactly which functions are required
and how the NATO/NATO nations intend to utilize them.
They must discuss the hardware, software, and networks that will be used, how the CITIS should
handle data in different formats, and how the contractor should handle major changes in the
NATO/NATO nations computer infrastructure. The contractor also needs to decide, with the
help of the NATO/NATO nations, how and to what extent to include supplier/subcontractor data
and what type of data repository method makes the most sense for the program.
202
Option 3: database repository resides with the prime; existing information systems are
interfaced to extract CITIS data in a central repository.
It involves a program-specific data repository that resides with the prime contractor and is made up of
multiple databases. This option differs from option 2 in that even though the databases are distributed,
they contain duplicate information that allows data to be easily linked together (i.e., a relational database
203
management system). The central data repository typically contains basic information about each
functional area, program, or type of data that is used to interface with more extensive databases
containing related information. This method can also be easily used to identify, for example,
parts/equipment used on more than one system. Another benefit to data linking is that when information
is changed in one location, the CITIS system can be designed to reflect that change in any other
databases containing that same data. Supplier/subcontractor data, if desired, is provided by the supplier
and loaded into the CITIS (no direct access to supplier databases).
Option 4: database repository resides with the prime and suppliers (many), with a navigator
(gateway processor) to pass requests/access to supplier databases.
Option 4 is the most extensive of all four options, because it allows direct access not only to contractor
databases, but to supplier and subcontractor databases as well. This option is typically the most difficult
to implement, since CITIS could be required to interface with a potentially large number of different
systems. This option would require suppliers to be responsible for their own data, thus improving the
accuracy of the data available to the CITIS users. One of the drawbacks to the all-encompassing CITIS is
the problem of proprietary data rights and privileges. Another potentially major drawback to this type of
CITIS network is the possibility of suppliers/subcontractors utilizing their own data management/storage
systems that are not compatible with anyone elses. Using current technology, the cost and effort to set
up a CITIS system that can interface with all the different data management systems could be prohibitive.
Before making a decision on whether to provide CITIS access to supplier/subcontractor databases
directly, the contractor should identify the hardware and software used by each candidate system to
determine the complexity, and thus feasibility, of incorporating it into the CITIS network.
Method 1: subcontractor delivers data on paper - prime scans it in and adds it to CITIS in
raster format.
Method 2: subcontractor delivers data via physical media in digital format - prime loads it
into CITIS.
Method 3: subcontractor downloads its data directly into CITIS databases.
Method 4: subcontractor becomes member of CITIS network and users have access to all
of its data.
Method 1 is almost never recommended because of the cost and effort required to scan in the
data. In addition, the resultant raster data is in a non-processable format, which will significantly
reduce the usefulness of the subcontractor-supplied data.
Methods 2 and 3 are both reasonable options when a relatively basic (lower cost) CITIS is
desired, because they allow for reasonably simple incorporation of data into the CITIS databases.
Digital delivery of subcontractor data to the prime contractor for download into CITIS would
eliminate the need to interface with a potentially large number of different subcontractors
information management systems.
If, however, a robust CITIS is planned,
204
suppliers/subcontractors should be a part of the CITIS network, and their data should reside
in-house.
Method 4 should provide the greatest subcontractor data accuracy and timeliness, but these
benefits may be outweighed by the typically higher cost and effort to implement the robust
CITIS. In general, methods 2 and 3 should be the simplest, least costly methods to implement
for incorporation of subcontractor data into the CITIS.
8.2.4.5.1.3 Data Availability Factors
For most defense programs, a large volume of technical data will be created by the contractor in
support of the program. Before this data can be released for access through the CITIS, it must
meet the programmatic requirements and pass the contractual restrictions. Only that data that
meets all the requirements and restrictions should be made available through the CITIS.
8.2.4.5.1.4 Acceptance of Data Delivered via CITIS
The contract must address the questions of what constitutes data delivery, and who in the
NATO/NATO nations will receive, inspect, and accept the data. The NATO/NATO nations will
specify in the contract the delivery methods for each CDRL item, and if delivery includes CITIS,
this delivery may be in the form of either in-place delivery, in which the data item is considered
delivered once it becomes available on the CITIS, or it may be in the form of a physical data
download by the NATO/NATO nations from the CITIS.
The NATO/NATO nations contracting officer should decide, and the decision should be
specified in the contract, whether the data inspection and acceptance can be performed
electronically (e.g., some form of electronic signature or other means of indicating approval or
disapproval), or whether it should be done in a traditional method. If an organization will serve
as the approving official responsible for taking receipt of the data and then coordinating the
inspection and acceptance, that organization should be identified in the SOW.
8.2.4.5.2 Hardware, Software, and Networks
The selection of hardware and software used to create the CITIS is critical and must be
thoroughly analyzed before any attempt to develop CITIS is begun. The CITIS configuration
should be determined only after analysis and comparison of the NATO/NATO nations,
contractors, and subcontractors (if included in CITIS) infrastructures.
Some important
considerations include compatibility of operating systems, file formats, and hardware and
telecommunications options. The CITIS designer should also consider future impacts to the
CITIS system should NATO/NATO nations users upgrade their hardware or software.
8.2.4.5.2.1 Operating System Considerations
One of the basic problems between different operating systems (e.g., DOS vs. UNIX) is the
allowable length of file names. DOS is restricted to the 8.3 (8 character name plus 3 characters
for the file extension) file naming convention, while UNIX allows much larger file names.
205
Because of this problem, close attention should be paid to indexing and file management
schemes.
8.2.4.5.2.2 File Format Considerations
Before any CITIS development is performed, the contractor must determine how CITIS will
handle data in different formats. A matrix should be developed during the CITIS planning stage
showing which software tools will be used and how the NATO/NATO nations and contractor
data will be stored and displayed. An ideal CITIS would be able to display and process data in
any format, regardless of the software tool used to develop it. However, this ideal CITIS may be
economically prohibitive and technologically challenging. In practice, the two primary options
for data handling are:
All CITIS data is translated from native formats into a single agreed-upon format;
CITIS is used to launch multiple applications to display the data in various native
formats.
The primary drawback to the first option is that the system operators may be required to
reprocess data that has already been created. This translation process introduces the potential to
lose data and/or format information. If the data has been created with a wide variety of
applications, conversion to a single format is a serious weakness that may have a significant
economic impact. Composite documents (which may include text, graphics, databases, and/or
spreadsheets) are especially difficult to convert into a single format because some software
packages may not reproduce the information accurately, and in some cases, not at all.
The drawbacks to the second option include greater complexity of the CITIS system and the
necessity for CITIS users to be trained on and become familiar with a variety of viewing/editing
tools. The greater the number of formats the CITIS data viewer/editor must handle, the more
complex and difficult to develop the system will be. Depending on the number of applications
launched, software licensing costs could also become a major consideration.
The solution to the data format problem may be the use of a neutral file format that allows data
created with a variety of different software applications to be saved in a format that can be read
by anyone possessing the associated file reader software.
8.2.4.5.2.3 Neutral Data File Options
Depending on the expected CITIS data usage (view, process, comment, etc.), the contractor may
choose to translate appropriate data into a neutral format rather than attempting to retain
information in its original file formats. These neutral formats, in general, can be created for files
developed with a variety of different applications and can then be read by anyone possessing the
associated reader software.
Textual data (e.g., technical manuals and reports, graphics, spreadsheets, etc.) is particularly well
suited for conversion to neutral file formats; databases and some engineering drawing formats
should be retained in their original format or converted to a standardized format (e.g., convert
206
207
If any new lines or networks will be required, the program manager must decide whether the
NATO/NATO nations or the contractor will be responsible for line installation and maintenance.
The NATO/NATO nations will typically pay for its own connection time charges (e.g., phone
line usage) for use of its own telecommunications lines. The NATO/NATO nations however,
may require the contractor to establish an 800-number hotline that can be used by the specified
number of concurrent CITIS users.
8.2.4.5.2.5 Infrastructure Changes
Because of the rapidly changing computer hardware and software technology, it is reasonable to
assume that at some point during the life of the CITIS, the NATO/NATO nations users will
upgrade either their hardware or software or both. This upgrade can cause major problems for
the CITIS developers if the existing CITIS has been created to be compatible only with
NATO/NATO nations systems as they were at the beginning of the development effort. The
NATO/NATO nations and the contractor should agree up-front as to what technology
refreshments the NATO/NATO nations can expect the contractor to incorporate after the CITIS
has been implemented. The NATO/NATO nations may also want to state explicitly that CITIS
shall be upgraded to be compatible with any major changes in hardware and/or network
configuration.
Problems can occur when a CITIS user facility reconfigures its networks and then finds that it
can no longer communicate properly with the CITIS. Obviously, there needs to be some control
over and planning for the number of anticipated changes the contractor is required to
incorporate/handle. Ideally, the CITIS will be developed to operate independently of users
operating systems and specific hardware and software. In reality, however, the hardware and
software compatibility problems described above can and will occur. CITIS user group meetings
can serve as an excellent forum for discussion of compatibility problems, technology
advancements, and the advantages and disadvantages to upgrades to the CITIS.
It is highly recommended that the NATO/NATO nations designate at least one person who is
knowledgeable in computer hardware, software, and networks to be its CITIS administrator.
This person will be trained in the specifics of how the CITIS system works and how it is set up at
their facility. Ideally, a CITIS administrator would be selected for each of the NATO/NATO
nations CITIS locations.
The CITIS administrator(s) should filter NATO/NATO nations
complaints and issues before bringing them to the contractor, and should be responsible for
making upgrades to local hardware and software work with CITIS. When a hardware or network
incompatibility problem arises, it is often due to a change in the users PC or network
configuration. The local CITIS administrator should attempt to solve compatibility problems
before contacting the CITIS developers, who may simply direct the problem back to the
NATO/NATO nations as an internal facility problem.
8.2.4.6 CITIS Issues
When CITIS is being considered and/or developed, the program manager must be aware of some
of the legal issues accompanying the use of a CITIS.
208
209
ad-hoc queries has not yet been answered. The contractor can (and should) be held liable for
providing defective data to the NATO/NATO nations, but unfortunately, lack of statutory laws
results in the contractor also being held liable for misuse of any data they provide. Until existing
laws are changed, the contractor is liable for damages when data provided through CITIS is used
incorrectly.
8.2.4.6.3 International Data Exchange
International data exchange is complicated by differences in treatment of intellectual data from
nation to nation. Some nations do not recognize or protect intellectual property. Export
licensing of technical data also creates a barrier to international CITIS implementation. Any data
to be released internationally needs prior NATO/NATO nations approval.
8.2.5 Applying CALS to the Acquisition Logistics and Operational Logistics Processes
8.2.5.1 Acquisition Logistics and Operational Logistics
Mission
Need
Manage
Continuous
Acquisition
Process and
Data
Engineering Data
Contract
Define,
Design & Test
Defence
System
Qualified
Engineering
Data
Produce
Defense
System
Defence
System
210
the support elements that will be required during the useful life of the equipment.
elements of the Acquisition Logistics are:
The basic
Operational Logistics covers those functions that support the equipment through its useful life
(from the utilization process onward to its withdrawal from service). The operational logistics
basic functions include:
Configuration Management
Order Administration
Invoicing
Delivery
Stock Management
Equipment Maintenance
Make sure that the support is taken into consideration in the requirements concerning the
defense system and its design;
Specify and define the support system;
Implement the support system as defined above;
Maintain it throughout the equipment life-cycle
It is an organized, planned effort that provides for support and maintenance considerations that
influence the design of systems acquired by the Defense. The planning of the ILS effort is the
key in fitting all of the logistic support elements together in a timely manner.
211
Examine all elements of a proposed system to determine the logistic support resources
required to keep that system usable for its intended purpose;
Influence the design so that both the system and support can be provided at an affordable
cost.
For LSA processes, any commercial or government implementation of a MIL-STD-13882B relational database can be used directly or can be used as a model when determining
data requirements.
For initial provisioning, order administration and other operational logistics support
processes, AECMAs Spec 2000M should be followed.
212
Planning
Manpower&Personnel
Supply Support
Support Equipment
Technical Data
Training/Training Support
Computer Resources Support
Facilities
Packaging, Handling,
Storage & Transportation
Design Interface
Maintenance Planning
Manpower and Personnel
Supply Support
Support Equipment
Technical Data
Training and Training Support
Computer Resources Support
Facilities
Packaging, Handling, Storage, and
Transportation Design Interface
213
LSA Documentation
Mil Std
1388-1A
Mil Std
1388-2B
214
promotes the use of relational database management systems for LSAR automated data
processing (ADP) systems.
Just like MIL-STD-1388-2A, MIL-STD-1388-2B provides
information pertaining to technical characteristics of a system or equipment and provides data
directly related to the supportability of that system or equipment. MIL-STD-1388-2B Appendix
A provides guidance for fulfilling the requirements of a relational database system.
The interrelationships and data hierarchy among tables is established only through common data
element keys and data values. MIL-STD-1388-2B provides the media options of the LSAR
relational tables being delivered. This provides the capability to subsequently produce any of the
LSA reports, other data files, and ad hoc reports via the query capability of a validated LSA
relational ADP system.
8.2.5.2.8 AECMA SPEC 2000M Summary
AECMA SPEC 2000M is designed to cover all material management activities in support of
military aircraft. It is a multi-national military aerospace standard developed specifically to
support the military end customers manage their spares acquisition. It is not designed to transmit
design data. It is currently being implemented in five European countries (France, Germany,
Italy, Spain and UK).
Before completion and agreement by the nations of the neutral data format, AECMAs Spec
2000M should be followed for initial provisioning, order administration and other operational
logistics support processes.
8.2.5.2.9 AECMA SPEC 1000D Summary
AECMA SPEC 1000M is used within the European Aerospace industry to provide a controlled
environment for the management of data elements from which technical documents, in whatever
form, can be produced. Its background is in multi-national air projects and this has led to the
specification having generic principles embedded in air specific application of the principles.
8.2.5.3 LSA DATA Activities
8.2.5.3.1 LSA Data Creation Activities
The first level of activity during the acquisition phase of a program is the creation of the data.
The acquisition project manager is the primary focal point during the creation phase. Of utmost
215
concern to the project manager from a CALS perspective, should be the assurance that the data is
developed once and then used many times. The ability to review and/or access LSA data by all
areas involved in the design process ensures early identification and quantification of support
systems requirements as well as the best design for supportability. The project manager must
ensure that the internal contractor product development team members, as well as NATO/NATO
nations reviewing agencies, have access to current and relevant LSA data.
The ability to access and review digital data is driven by the availability of appropriate
infrastructure. The project manager should ensure all functional areas are addressed in the
NCoO and that the appropriate infrastructure is in place or will be phased-in as the acquisition
progresses prior to contract placement.
Of equal importance, the project manager should ensure that support activities are aware of LSA
data access, review and approval methodologies, and the roles and responsibilities each activity
will play.
8.2.5.3.2 Follow-on LSA Data Modification
In addition to concerns associated with the creation of LSA data, the project manager should
consider future requirements to modify the data. It is of particular importance to ensure that all
Front-End Analyzes studies, as well as the LSAR database, are made available on digital media
to the depot or support agency in a usable format. By doing this, the depot and/or support
agency will be provided not only with the LSAR database that supports the design, but also with
analyzes and studies used to arrive at the design.
8.2.5.3.3 LSA Data Management
The second level of activity is associated with the management of LSA data during both the
acquisition and operational phases. It should be noted that "LSA data management" will be
afforded the same management controls as any other technical data acquisition, but with the
emphasis being on digital delivery or electronic access.
The project manager must consider the specific NATO/NATO nations infrastructure program
that will manage and store the digital data during both phases. The data delivered must be
compatible with the existing digital NATO/NATO nations systems in place or being developed.
If changes to the digital NATO/NATO nations infrastructure systems are required, they must be
fully justified and coordinated with the personnel responsible for the management and
configuration control of LSA data.
During the operational phase, the LSA data is typically assigned to a support organization such
as a Depot or organic NATO/NATO nations Data Repository. Of primary importance here
would be making data available to potential users and maintaining configuration control.
8.2.5.3.4 LSA Data Uses During the Acquisition Process
The final level of activity is associated with the use of LSA data.
Process, LSA data is typically used in three ways:
216
First, the logistic support analysis (MIL-STD-1388-1A) Front End Analysis 200 and 300
series tasks are used to influence and provide a basis for the design of the system (both
the hardware and the support elements required for deployment and use).
Secondly, the LSAR database is used to capture the systems configuration and
maintenance/ support requirements and procedures.
Finally, the LSAR database is used as a cornerstone for the developing ILS element
products that include technical data, training data, supply support data, etc.
Paramount to ILS product development is the timely access to current and accurate LSA data.
The following are just a few of the considerations the project manager should make when
contracting for LSA data:
Technical Data: Since the technical data functional area has access not only to LSAR data, but
also to technical drawings and associated supply support data, the project manager must ensure
this data is closely managed for the development of data products such as Technical Manuals
(TM). The LSAR task analysis (LSA-Task-401) is a basis for, and/or a direct input to the
systems TM(s). The project manager should ensure that the development of the TM(s) and the
detailed LSA task analysis are orchestrated in such a manner as to eliminate duplicate efforts.
Training and Training Support (T&TS) Data: This functional area takes information from the
LSAR and uses it as source data to develop the training plans and various other training
products. An important CALS-related consideration would be to ensure the training-related LSA
source data for the training development are in a usable digital format.
Supply Support: Supply support and initial provisioning efforts take direct advantage of the data
contained within the LSAR database.
Support Equipment: Support Equipment Recommendation Data (SERD) information is typically
generated during the LSA process and captured within the LSAR database.
8.2.5.3.5 LSA Data Uses During the Operational Phase
A major concern to the project manager is the accuracy of the LSA data during the operational
phase of a program. The project manager should ensure that both LSA Front End Analysis data
and the LSAR database are made available and/or maintained by the support organization for
both configuration control and evaluation of potential Engineering Change Proposals (ECP)
during the operational phase.
One additional area of major importance concerns the end users. The end users perform a vital
feedback function with LSA Task 501. Knowledge of actual usage of the data when fed back
into the LSA process is invaluable in correcting design and support system deficiencies. The
project manager must not overlook this vital source of data and should consider the end users
when acquiring digital data and feedback methodologies. In conclusion, the project manager
217
must include in the decision making process the infrastructure that exists at all user sites being
considered.
It is counterproductive to generate and make available to the end users digital data that they do
not have the capability of using. The project manager cannot assume the infrastructure exists
and will be used. The end users specific environment must be determined.
8.2.5.3.6 CALS-Related Questions
Questions that must be asked and answered include:
218
219
220
221
The contractor shall perform Task 204, Technological Opportunities, to identify and evaluate
design opportunities for improvement of supportability characteristics and requirements of the
(name of new system or equipment). These opportunities shall consider implementation of CALS
into the design objectives and techniques. The identity of CALS implementation in design
improvements to logistic elements during development should also be considered.
8.2.5.5.3 MIL-STD-1388-1A 300 Series Tasks
The 300 Series LSA tasks of MIL-STD-1388-1A are to optimize the support system for the new
item and to develop a system that achieves the best balance among cost, schedule, performance,
and supportability. CALS should be considered as part of the functional requirements and/or a
support system alternative. The following statements may be included in the SOW when
requiring a contractor to perform one of the 300 Series LSA tasks of MIL-STD-1388-1A.
The contractor shall perform Task 301, Functional Requirements Identification, to identify the
operations, maintenance, and support functions that must be performed in the intended
environment for each (name of new system or equipment) alternative under consideration. The
identification shall include the contractors intended use of CALS as one of these functional
requirements.
The contractor shall perform Task 302, Support System Alternatives, to establish viable support
system alternatives for the (name of new system or equipment). The contractor shall include
support concepts that foster CALS utilization when developing alternatives to the system level
support concept.
The contractor shall perform Task 303, Evaluation of Alternatives and Tradeoff Analysis, to
determine the preferred support system alternative(s) for each (name of new system or
equipment) alternative. For each evaluation and tradeoff to be conducted under this task, the
contractor shall include the utilization of the intent of CALS as one of the criteria of evaluation.
8.2.5.5.4 MIL-STD-1388-1A 400 Series Tasks
The 400 Series tasks of MIL-STD-1388-1A are to identify the logistic support resource
requirements of the new system in its operational environment(s) and to develop plans for postproduction support. CALS considerations should have been identified as part of Task 303.
Task 401, Task Analysis, provides the detailed identification of requirements for all elements of
ILS to operate and support the new system/equipment. The results of task 401 are documented
in the Logistic Support Analysis (LSA) Record (LSAR) as described by MIL-STD-1388-2.
Although automation of the LSAR data is not mandatory, it is strongly encouraged and should be
a consideration in implementing a CALS environment since this data has a structured format
dictated by a standard. Commercial Off the Shelf (COTS) approved LSAR data software
packages are readily available. LSAR data is also suited for CITIS. The following statement
may be included in the SOW when requiring a contractor to perform Task 403 of
MIL-STD-1388-1A.
222
The contractor shall perform Task 403, Post Production Support Analysis, to assess the expected
useful life of the ( name of new system or equipment ). The assessment shall include a plan with
discussions that support the difficulties due to the use of CALS and digital data and the
modifications to the data during the remaining life of the system/equipment.
8.2.5.5.5 MIL-STD-1388-1A 500 Series Tasks
The 500 Series tasks of MIL-STD-1388-1A are to assure that specified requirements are
achieved and deficiencies corrected. The following statement may be included in the SOW
when requiring a contractor to perform the 500 Series Task of MIL-STD-1388- 1A.
The contractor shall perform Task 501, Supportability Test, Evaluation, and Verification, to
assess the achievement of specified supportability requirements, identify the reasons for
deviations from projections, and identify methods of correcting deficiencies and enhancing
system readiness. The assessment shall include CALS supportability cost and readiness drivers.
These CALS related drivers should have been identified in Tasks 203 and 303.
8.2.5.6 Future Considerations for the LSA Process in a CALS Environment
This paragraph will present some thoughts on where CALS is headed and how that might affect
data use in the future. The influence of infrastructure developments in NATO/NATO nations,
and even in the international community will all affect the potential environment in which the
LSA data acquired now may have to be used in the future.
8.2.5.6.1 Integrated Weapon Systems Database
8.2.5.6.1.1 Future Trends
Future trends must lead to and support the fundamental objective of CALS, which is to lower
costs to the Government, improve quality, and shorten lead times. The electronic sharing of data
allows it to be created once and then used by multiple users, multiple times. The integration of
functional processes will start with the integration of data. The acquisition strategy must
specifically address the automation and integration of technical information systems and
functional processes.
8.2.5.6.1.2 Effects on LSA Data and LSAR Databases
The process for determining LSA data and LSAR database requirements is an extension of the
process currently used for determining data requirements, selecting appropriate data items, and
developing the Contract Data Requirements List (CDRL) that identifies the requirements.
The LSA/LSAR databases are the building blocks that are necessary to support an IWSDB. The
process for determining LSA data and LSAR database requirements may evolve as the
requirement for access to the data intensifies. There is significant potential for reduction of data
requirements in that, with query capability, the Government can generate data, reports, and
products on demand rather than having the contractor prepare and deliver them. As digital data
utilization evolves, the media on which the data is delivered will also evolve.
223
Type of DBMS or languages: The number and disparity among database management
systems, programming languages, data models, data descriptions or data organizations,
and interface and access languages;
Data element format: The number of discrete techniques for re formatting data to be
presented to the user in a predefined, standard format including conversion of units of
measure, translation into standard format, and other agreed upon translations or
conversions;
Source or location of data and applications: The user must know the differences
concerning location, hardware, operation system, programming language, and access
methods for specific systems;
Relationship and dependencies: The degree to which the user must keep track of data
relationships and dependencies within and across integrated data sets;
Version knowledge and control: The degree to which the user must ensure that data
retrieved from more than one system and database are consistent in terms of data values,
version or status, and context.
224
8.2.5.6.3.1.1 Objectives
8.2.5.6.3.1 Acquisition Workshop
The Acquisition Workshop Stage 1 (AWS1), held in April 1994, provided the outline of an
improved acquisition process and the recommendation for further work. A Study Management
Group (SMG) was chartered by the NCMB to conduct the second stage of the Acquisition
Workshop (AWS2). AWS2 was accomplished by bringing together 52 experts from industry,
governments, and NATO Agencies (senior officers and civilians). The workshop was sponsored
by the NCMB and the NATO Industry CALS Group (NICG) and was held at the French CALS
Office in Paris from 06 - 24 November 1995.
The objective of AWS2 was to refine the definition of an improved acquisition process in order
to identify data requirements to conduct business in a multinational environment. This included
the consideration of legal and contractual issues in a CALS environment and the development of
a management oriented advocacy plan for promotion of the workshop results.
8.2.5.6.3.1.2 Workshop Results
AWS1 stated that multidisciplinary groups (MDGs) will perform acquisition in the future
through continuous processes, in a shared data environment (SDE) and controlled through
project, quality, configuration, and data management. AWS2 refined and further decomposed
the "acquisition To-Be model" from AWS1 to arrive at an improved NATO reference acquisition
activity model. This being the basis, the data necessary, the way it should be used and shared,
and the information flows were considered; the corresponding generic data model was developed
as far as possible within the available time.
Within the acquisition processes, project life-cycle plans will enable the elimination of
unnecessary milestones by use of checkpoints and continuous control, to identify and mitigate
risks and to reduce delays and other impacts of external controls such as necessary financial
milestones. Ownership of data and responsibilities for activities must be defined in contracts.
Shared resourcing of the continuous controlling processes (Program-, Quality-, Configurationand Data Management) allows control aspects to be resolved within a program without delays
arising from separate customer audits, reviews and other external approvals. Benefits are the
early identification of risks and the reduction of lead-time.
The improved acquisition processes will exploit the following disciplines:
System Engineering and Multidisciplinary Groups
System engineering is an interdisciplinary collaborative approach to derive, evolve, and verify a
system solution to satisfy customer expectations. This concept encompasses a life-cycle oriented
225
approach, multidisciplinary teaming, concurrent engineering, and the recursive application of the
systems engineering processes on each level of development. MDGs are established by the
Program Manager and formed with resources shared between industry and government, their
composition is dynamic and adapted to the current activities. The main benefits are better
information (in quantity and quality) with the involvement of the right skills at the right time,
thus reducing the risk, and the quicker reaction in the decision-making processes throughout the
life-cycle.
Shared Data Environment (SDE)
A SDE is the information infrastructure that allows data to be shared electronically between all
industrial and governmental participants in a project. The building of the SDE starts at the
beginning of the program and evolves through the life-cycle of the defense system.
Consequently, the architecture must be very flexible and dynamic. An empowered MDG can
operate effectively in a SDE. Within the framework contractually agreed between governmental
and industrial participants the SDE provides different levels of data access as needed with
respect to tasks and responsibilities. It also permits many concurrent levels of executive
oversight. The integration of program and product data provides easier consistency of quality
and configuration management activities and enables through life traceability and experience
feedback. Reduced error rates and data acquisition costs in conjunction with faster data
exchange are the advantage of such an environment.
8.2.5.6.3.2.1 Objectives
8.2.5.6.3.2 Operational Logistics Workshop
Stage 1 of the Operational Logistics Workshops (OLWS 1) was led by Germany and was
accomplished by bringing together experts teams made from 67 logisticians (senior officers and
civilians from government and industry). It was held at the Universitat der Bundeswehr
Mnchen from 5-20 December 1995.
The OLWS Terms of Reference defined Operational Logistics as the process of managing the
logistics support for defense equipment during its in-service life, using the data and the
infrastructure acquired during the acquisition, acquisition logistics, and operational phases of its
life-cycle.
The objective of Stage 1 was to develop a TO-BE Activity Model which describes more
efficient processes and provides a basis for a common data model
8.2.5.6.3.2.2 Workshop Results
The result of the workshop was the definition of a TO-BE Activity Model and a glossary, which
describe a more efficient process to be carried out during the operational phase of a defense
systems life-cycle. The improvements were aimed at reducing costs, improve quality, improve
226
service to the customer, and, finally, improve interoperability among NATOs Armed Forces.
The developed TO-BE Model will serve as a reference point, or baseline, for future work by
NATO nations and industry. The final report of the OLWS 1 was published in January 1996.
Having completed OLWS 1, the following objectives remain from the Operational Logistics
Workshop Terms of Reference:
Develop a data model for the TO-BE activity model in accordance with the Acquisition
Data Model;
Make recommendations for transition into a future NATO Operational Logistics
environment allowing tailored national implementation.
Applying CALS to the creation, management, and use of TDPs will aid in accomplishing the
transition from paper-intensive defense system acquisition and support processes to an
automated and integrated digital process. It should be noted that the application of CALS-related
technologies to Defense processes should be seen as a means of improving and streamlining
these processes by providing better methods of creating, managing, and using data, not as a
method of replacing business practices.
8.2.6.1.1 Scope
It is recognized that each defense system program is unique with individual constraints and
access to a distinct set of infrastructure systems. This section is intended to provide the Defense
project manager with an overview of NATO business practices for the creation, management,
and use of TDPs in a CALS environment. Specific implementation of this process follows the
completion of the NATO/Government CALS Concept of Operation (NCoO) and may be
tailored.
8.2.6.1.2 Purpose
The planning process for the creation, management, and use of TDPs in a CALS environment
needs to take advantage of the capabilities provided by the automation and integration of
information systems. Various data content, media, and format options are available for the
delivery of digital TDPs needed to define and support a defense system. The intent of this
section is to:
Describe the various deliverable content, format, and media options for TDPs;
Explain the benefits for the available options;
Examine the life-cycle considerations for all options;
Describe the infrastructure of documentation and systems available to support the various
options;
Provide guidance for specific contract language required to support the selection of the
options;
Describe contractor validation and NATO/NATO nations verification procedures.
This section contains ordering information for the deliverable media and digital data format for
TDPs. The Contract Data Requirements List (CDRL) guidance contained in this section applies
to all TDP elements.
228
TDP Data;
TDPs in the CALS Environment;
Life-cycle Considerations;
Infrastructure Development;
Data Uses.
Types of engineering drawings (without or with integral parts lists) are as follows:
229
230
provide only the human interpretable information for a system. Standards are currently being
developed to define more completely this form of data for the following.
Types of product description data are as follows:
Improving the handling and reducing the storage of TDP data, primarily engineering
drawings, with electronic filing and archiving, ideally creating a data repository.
Reducing the costs associated with printing and distributing TDP data, especially during
the development stages, by providing on-line access (CITIS) (see Section 5 - CITIS) to
contractor databases, so that the NATO/NATO nations procuring agency could access
specific TDP data required.
Please note that this section does not consider delivery of a TDP in other than digital format
justifiable. References to non-digital data deliverables are only made in conjunction with the
delivery of a digital product and for the sole purpose of verifying the quality and accuracy of the
digital transfer of data between the various digital systems.
A brief discussion of both non-digital and digital data deliverables is provided. The non-digital
deliverables will not be addressed again in this section since their importance in a CALS
environment is minimal. The digital deliverables will be mentioned here providing a brief
overview of options available to the project manager.
8.2.6.2.2.1 Paper, Mylar Hardcopy
Paper or Mylar Hardcopy has long been the traditional medium for delivery of Defense product
data and related information. TDPs delivered on this medium may have originated from many
sources including other existing hardcopy documentation, microfiche, microfilm, or any of the
digital data formats described in the following sections. Converting the data content of paper to
a digital data format requires infrastructure systems that include scanning hardware and software
to support the conversion of both text and graphics from hardcopy to electronic. Todays project
231
manager should accept hardcopy TDP deliverables only for the purpose of verifying the digital
deliverables.
8.2.6.2.3 Digital Data Deliverables
Digital data deliverables available in the CALS environment are extensive. Digital data provides
the project manager with a variety of digital data content, formats, and media option (Table 8-7).
Table 8-7 Digital Data Deliverables
Magnetic tape
Magnetic disk
Optical disk
CITIS - interactive on-line access
CD-ROM
232
The project manager must also consider the information volume and typical use of the particular
TDP element selected. To take advantage of the CALS strategy, data must be created and/or
obtained in a digital form during the earliest possible program phase. By starting early, product
information may be used repeatedly throughout the life-cycle. Failure to develop data in a digital
form early in a program can lead to requirements for costly data conversion and will deny
potential benefits from digital data exchange.
8.2.6.2.5 Infrastructure Development
Effective acquisition of digital data can only be done with full consideration of the ability of
Defense activities to receive, store, distribute, and use the digital data that complies with the
CALS standards. The project manager must establish the uses for which the data is required and
the infrastructure modernization programs available to support this data.
The evolution of infrastructure is a key consideration in implementing the CALS strategy on any
given acquisition. Deficiencies in program related infrastructure may require cost investments to
effectively implement the CALS strategy.
The availability of digital data processing and
telecommunications technology and approved standards for creation management, storage
management, transmission, data protection, and integrity of data at the time of delivery or access
are important criteria for acquisition decisions.
The current and projected capabilities of both the contractor and NATO Armed Forces
components must be assessed with respect to program needs and schedules. The NATO/NATO
nations Concept of Operation (NCoO), its Contractors approach to CALS Implementation
counterpart, and CALSIP (when required), are excellent vehicles for making these
determinations. Project managers must plan to acquire and/or access digital data products. The
data user infrastructure, the computing environment available to a particular user, must be
considered when acquiring digital data.
This environment establishes the data processing
capabilities of that user.
The following areas identify a users infrastructure:
Hardware: Determine the current and planned hardware available to support the defense
system program.
Software: This is the most critical element. Interoperability will normally be achieved
using software. Again, determine both present and future software applications and
availability.
Networks: Determine the local- and wide-area networking (LAN and WAN) capabilities
and whether CITIS will be used.
View only: The ability to examine a data file without the ability to change it. This
includes viewing selected portions of one or several documents as well as side-by-side
comparisons of documents.
Comment/Annotate: The ability to evaluate and highlight for future reference or to make
annotations, approvals, and comments without the ability to change the original file.
Annotations are associated with a specific item or location within a document and are
displayed whenever that point or area of the document is displayed.
Update/Maintain: The ability to change data either directly or through controlling
software in the active files on the host computer.
Extract/Process/Transform: The ability to extract and modify the format, composition,
and structure of the data into another usable form. Archive: The placing of data into a
repository to preserve it for future use. The interchange of text type data that traditionally
has been conveyed on paper can be transmitted or communicated electronically using the
established rules and formats of Electronic Data Interchange (EDI).
234
CITIS interactive access: See section 5 (CITIS) for interactive access/delivery options.
8.2.6.3.3 Raster
Raster data is a binary representation of an image. Raster may be thought of as the electronic
version of a paper document. It contains no "intelligence" and must be reviewed through human
interpretation. There are two types of raster data, tiled and untiled. Tiled raster is the preferred
format because of smaller file size. A tiled raster image resembles a two-dimensional grid with
each "tile" or set of pixels representing a portion of the image. Text and graphics in raster data
formats are stored digitally, which allows more rapid and consistent access to the stored images
than paper. In addition, raster data can be sent via electronic means to remote sites.
Raster files can be edited in several ways:
Raster documents may be converted to processable text via Optical Character Recognition
(OCR) technology. With the advent of raster scanning technologies, the ability to convert
existing TDPs to digital data files has become available. However, the quality assurance process
(by human interpretation) required to verify the data contents may increase costs substantially.
In addition, raster image files require a large amount of memory storage due to their file structure
and contain no additional information other than each tiles position on a grid. Because of these
drawbacks, the project manager should consider processable data forms before considering raster
unless the TDP will not be used for competitive reprocurement.
8.2.6.3.4 Processable Data Files
Processable data files provide the majority of options available for digital TDP delivery.
Processable data files can be broken down into two additional categories, drawing and product
description data files and text data files. These categories are considered processable, because
the data can be manipulated by the user, interpreted by the computer, and reprocessed into an
updated or new form as specified by the user.
8.2.6.3.4.1 Drawing and Product Description Data Files
Drawing data files, the output of CAD systems, comprise vector data, and as the name "vector"
implies, the image produced is composed of vectors, a sequence of line segments. Vector data
provides geometrical and physical representation of objects in both two and three dimensions.
Vector data files are stored digitally allowing rapid retrieval and integration into other
compatible systems.
Because the data consists of a sequence of line segments and
patterns/symbols that represent entities with specific orientation and location, vector data can be
translated to code interpreted by some automated machine tools.
235
Drawings delivered in this format must conform to IGES Class II (MIL-D-28000) unless the
native vector CAD files are available in an agreed-to, compatible format. (The user of native
vector data must have the same type of CAD system or must have a direct translator from the
source system to the destination system.) The native CAD format is the preferred format during
early development phases in the defense system programs life-cycle, because the translation to
IGES will invariably exclude some of the data inherent in the native CAD files. If vector data is
not compatible between the user and the source, then the IGES standard should be delivered, as it
does allow dissimilar CAD systems to manipulate vector data. Final delivery, however, must be
in IGES. CAD2 supports vector data in IGES formats.
NOTE: There are no commercial or NATO/NATO nations standards for preparing 3-D CAD
models. As a result, repository systems may not have the capability to store usable 3-D CAD
products.
Project managers should consider acquiring any portion of the drawing package developed from
3-D modeling. Product description data is the most comprehensive form of digital data. Product
description data contains all information needed to describe a product completely, and a large
portion of this information can be directly interpreted by a computer. Product description data
allows the simulation of systems modifications prior to implementation and evaluation of form,
fit and function performance of components. In addition, product description data with its
inherent intelligence can be used to drive manufacturing processes.
8.2.6.3.4.2 Illustrated Text Data Files
Illustrated text data files provide a dynamic form of source data with two possibilities:
Text data files include word processing and desktop publishing applications. Such data files can
provide the source data for multiple data applications that allow creation of standard and custom
documents as well as manipulation of the data for annotate/excerpt or update/maintain purposes.
Text data files can also import generic text [ASCII, SGML, etc.] and graphics [raster, CGM,
IGES, etc.] from other sources that may be otherwise incompatible. In addition, there are Page
Description Languages (PDL), sometimes called text presentation metafiles, which are used to
drive output devices such as printers. There may be instances when obtaining text data files
involves obtaining more than one format of graphical data. This may be due to multiple graphic
sources. This is an acceptable and highly likely situation. The project manager must be aware of
this possibility and be prepared to develop/modify the defense system contract requirements
accordingly.
8.2.6.3.4.3 Text Formats
There are three possible text formats available for consideration when invoking the option
specifying text data files. They are American Standards Code for Information Interchange
(ASCII) and tagged ASCII, Standard Generalized Markup Language (SGML), or raster. They
are described below.
236
SGML is a standard that defines a language for document representation that formalizes
markup and frees it of system and processing dependencies. It provides a coherent and
unambiguous syntax for describing whatever a user chooses to identify within a
document. In the SGML scheme, the document contains only generic tags identifying
such structural elements as paragraphs, sections, etc., but no typesetting markup.
However, SGMLs tagging of ASCII text is a rather cumbersome proposition and may be
best suited for final data deliverables rather than interim deliverables. When considering
SGML as a deliverable format, the project manager must determine whether the
necessary computer environment is available and in place to accept the SGML
documentation.
Additional features associated with SGML are: Document Type
Definition (DTD), Output Specification (OS), and Formatting Output Specification
Instance (FOSI).
There are many possible graphic image formats available for consideration when invoking the
option of specifying text data files. Two suggested formats described below are Computer
Graphics Metafile (CGM) and raster. CGM data is a two dimensional vector presentation used
primarily for charts, figures, and simple drawings. See 8.2.7.2.1.1 for a discussion of raster
data.
8.2.6.3.4.3.2 Standard Page Description Language
A PDL file is executed by an interpreter that controls a raster printer or other output device. A
PDL can be used to ensure that the composed document produced by an electronic publishing
system (which may impose additional processing limitations, such as font variations, kerning, or
hyphenation) would produce nearly identical hardcopy output on the widest possible spectrum of
printer devices. Standard Page Description Language (SPDL) document image files can be
acquired as interim deliverables or as final deliverables in addition to (but not in place of) other
digital data deliverables.
237
238
digital portion of the TDP would serve the defense system program better in a digital format. If
future manipulation of the data is not anticipated, raster delivery is the most suitable option. If
the NATO/NATO nations do plan to revise and/or modify the TDP, additional digital data
considerations must be addressed.
8.2.6.4.4 Digital System/Environment
The project manager should now determine whether the contractors native digital
environment/system is known at this time. This is focused at determining the most economical
and efficient format for the various TDP components. (It is assumed that the NATO/NATO
nations has previously completed an NCoO and identified the applicable NATO/NATO nations
in place infrastructure.) Obviously, for competitive procurements prior to source selection, the
contractors digital environment will not be known. This is, of course, unless all prospective
contractors have identical digital environment/systems. If the contractors digital environment is
not known, consider the delivery of 2-D and 3-D CAD/CAE data files versus the delivery of a
more comprehensive set of product description data files.
8.2.6.4.5 System/Environment Compatibility
Next the project manager must determine whether the contractors and the NATO/NATO
nations digital environments/systems are compatible.
This focuses on the potential of
transferring processable data files directly between two similar systems versus the transfer of
data through a neutral data format. Since the transfer of data between similar systems is
typically less time consuming and is more accurate, this type of transfer is recommended.
However, where the two systems are not similar, the transfer of data via a neutral format is
recommended and/or quite necessary.
If the digital environments are compatible, it is
recommended that the transfer of data between the contractor and the NATO/NATO nations be
in the contractors native format.
If the digital environments are not compatible, it is
recommended that a neutral format, be used to transfer data between the contractor and the
NATO/NATO nations.
8.2.6.5 Sample CDRLs
8.2.6.5.1 Raster Delivery Option
The raster delivery option, which is described in section 3.3.3, allows the project manager to
obtain TDP data in a digital format. The data uses of the raster deliverable are somewhat limited
but do provide for view, archive, and comment/annotate capabilities. Suggested delivery media
options include: (1) Optical disk or CD-ROM, (2) magnetic disk, or (3) 9-track magnetic tape, all
in accordance with MIL-STD-1840. Paper documentation may be requested in addition to the
raster deliverables but only for verification of the raster data content.
The information contained in the contract vehicle should be tailored to meet the requirements
of the specific defense system program
Drawing master raster graphic tape shall be IAW MIL-R-28002, MIL-STD-1840, and the
following requirements. Data shall be on a 9-track magnetic tape. Raster graphics shall be type
239
1 untiled raster data, 512 X 512 in size. Each delivered 9-track tape shall include an ANSI label.
Raster image density shall be 200 PELS/Inch. The minimum number of PELS per line and
minimum number of scan lines shall be IAW MIL-R-28002. Raster image orientation shall be
PEL path of 90-line progression of 270. Acceptance of this data item shall be based upon: selfmerit/content, prior acceptance and validation of drawing trial raster data, and visual
comparative agreement with drawing originals or reproductions, if ordered.
The information contained in the contract vehicles should be tailored to meet the requirements of
the specific defense system program. The CDRL(s) must include language that specifies exactly
how data will be delivered (including media, format, and content) under the contract. CALS
standards and specifications should be invoked whenever possible.
8.2.6.5.2 Product Data File Delivery Option
Product data files consist of a variety of data delivery options including product data files, text
data files, and Product Data Exchange using standard for the Exchange of Product [STEP]
(PDES) data.
These data deliverables provide all the data uses including view, archive,
comment/annotate, update/maintain, and extract/process/transform.
Suggested delivery media
options include: (1) Optical disk, (2) magnetic disk, or (3) 9- track magnetic tape, all in
accordance with MIL-STD-1840. Paper documentation may be requested in addition to the
digital data deliverables but only for verification of the digital data. The CDRL must include
language that specifies exactly how data will be delivered (including media, format, and content)
under the contract. CALS standards should be invoked whenever possible.
Drawing master product data shall be IAW VHDL ANSI/IEEE 1076, EDIF EIA 548, and
IPC-D-350 and the following requirements. Data shall be on MIL-STD-1840 magnetic tape
format optical disk, CD-ROM, or magnetic disk with a mutually agreed upon format. Data shall
be organized as one drawing per file with multiple sheets permitted. Entities unsupported or
unspecified by the appropriate standards or specifications (VDHL, IPC, etc.) shall not affect the
data transfer integrity of the product information delivered under the contract. Format version
"(X)" shall be used. Acceptance of this data item shall be based upon: self-merit/content and
visual comparative agreement with drawing originals or reproductions, if ordered. Validation
here means determination of acceptable transfer and translation of data from the contractors
CAD/CAE system to the _____(add applicable interfacing system).
8.2.6.5.3 Native CAD/CAE Data File Delivery Option
CAD/CAE data files in native format consist of a variety of data delivery options including
native CAD data files, text data files, and PDES. These data deliverables provide all the data
uses including view, archive, comment/annotate, update/maintain, and extract/process/transform.
Suggested delivery media options include: (1) Optical disk, (2) magnetic disk, or (3) 9- track
magnetic tape, all in accordance with MIL-STD-1840.
Drawing master native CAD/CAE data shall be as follows. The data file format shall be
compatible with and delivered on a 9-track QIC tape, CD-ROM, or magnetic disk, compatible
with _____ (insert vendor product name). CAD/CAE system media shall be clearly labeled to
240
describe the media format method, content, and media density. Data shall be organized as one
drawing per file with multiple sheets permitted.
Data format shall be compatible with _____(insert vendor application package name, version
number) format, using the native binary format supported by the _____ (insert vendor product
name) CAD system.
All information necessary to open and manipulate the data files, including: libraries, logical
name definitions, and other supporting files shall be delivered with drawing files.
Non-vendor-supported "Utilities" (i.e., software product) shall not affect the data transfer
integrity of the product information delivered under the contract.
Acceptance of this data item shall be based upon: self-merit/content and visual comparative
agreement with drawing originals or reproductions, if ordered. Validation here means
determination of acceptable transfer and translation of data from the contractors CAD/CAE
system to the _____(add applicable interfacing system)
CDRL must include language that specifies exactly how data will be delivered (including media,
format, and content) under the contract. CALS standards should be invoked whenever possible.
8.2.6.5.4 Product Data File Delivery Option (IGES Format)
Product data files in IGES format consist of a variety of data delivery options including IGES
files, text data files, and PDES. Suggested delivery media options include: (1) Optical disk, (2)
magnetic disk, or (3) 9-track magnetic tape, all in accordance with MIL-STD-1840. Paper
documentation may be requested in addition to the digital data deliverables but only for
verification of the digital data.
Drawing master STEP CAD/CAE data shall be as follows. Data shall be delivered on a 9-track
tape, QIC tape, or magnetic disk. Data shall be organized as one drawing per file with multiple
sheets permitted. Unsupported or unspecified "volunteer" entities shall not affect the data
transfer integrity of the product information delivered under the contract. Data product files
shall be written in ASCII compatible forms.
8.2.6.6 Advantages and Disadvantages of Delivery Options
Table 8-8 lists some of the comparative advantages and disadvantages of TDP delivery as paper,
raster, vector, or processable data files.
241
Paper
Raster
Vector
A
D
V
A
N
T
A
G
E
S
1. Already a
deliverable
form.
2. Can be copied
and distributed
easily.
1. Importable into
documents
2. Already a
deliverable form.
3. Electronic indexing,
filing, and
archiving.
4. Nearly exact
fidelity for
illustrations
providing format is
standard.
5. Files can be
compressed to
reduce size.
1. Easily edited,
maintained,
updated.
2. Electronic
indexing, filing,
and archiving.
3. Small file sizes
compared to raster
equivalents.
4. File information
compatibility
between editing,
sending, and
receiving systems.
5. Files contain
intelligent data.
D
I
S
A
D
V
A
N
T
A
G
E
S
1. Cannot be
edited or
changed.
2. Not importable
(must be
scanned to
digitize).
3. Bulky filing
system.
4. Originals can
be easily lost
or destroyed.
5. Originals
deteriorate
over time.
1. Editing is extremely
tedious.
2. Relatively large file
sizes.
3. Induced errors from
incompatibilities of
hardware even
when using an
agreed to standard.
4. Raster quality
dependent on
original and chosen
pels/inch standard.
5. Raster quality also
dependent on
accuracy of
equipment and
method used to
scan original
image.
1. Not directly
importable into
documents, must be
converted to a
raster format.
Processable
Data Files
1. Easily
edited,
maintained,
and updated.
2. Electronic
indexing,
filing, and
archiving.
3. Already a
deliverable
form.
4. Files accept
generic text
and raster
data from
other
sources.
1. International
standards not
fully
developed.
2. Drawing
data limited
to imported
raster images
242
satisfactory materiel is considered acceptable evidence that the validation requirement has been
met. When specified in the contract or purchase order, the contractors validation shall be
documented in a TDP validation report.
8.2.6.7.1.1 Validation by Contractor Physical Configuration Audit or Verification Reviews
The NATO/NATO nations may require the contractor to validate the TDP through Physical
Configuration Audits (PCA), Configuration Item Verification Reviews (CIVR), or by other
methods through specific work tasks in the statement of work of the contract or purchase order.
Unless such tasks are included in the contract or purchase order, the method of validation shall
remain the contractors option.
8.2.6.7.1.2 TDP Validation Report
A TDP validation report is used by the NATO/NATO nations to review the procedures and
evaluate the results of the contractors validation of the TDP as conforming to the data
requirements in the contract or purchase order.
8.2.6.7.2 Government Verification
8.2.6.7.2.1 Digital Data Product Acceptance
The unique aspect of CALS digital data deliverables is that they will be subject to inspection and
acceptance on several levels. The lowest level of acceptance is the data content and format. The
acceptance process at this level is identical to acceptance of the data product provided on paper.
This level of acceptance will be accomplished by viewing the data either through use of a
computer video screen or by viewing a paper printout of the data product. The next level of
acceptance is adherence to the specified CALS data exchange format. This will usually be
compliant with the CALS standardization documents or other national or international data
exchange standards. Automated tools may aid this level of acceptance. The next level of
acceptance is applied to the MIL-STD-1840 digital data format if it has been specified. Again,
automated tools may be used to verify compliance. Finally, the physical media may have
acceptance criteria to be applied. This level of acceptance will not be used if data has been
formally delivered by the CITIS. The means of inspection to be used should be provided to the
contractor as soon as these means have been determined. Any or all levels of acceptance may be
performed at the contractors facility or at a NATO/NATO nations facility, as required. In
addition to digital data acceptance, CITIS requires that additional acceptance requirements be
applied.
8.2.6.7.2.2 CITIS Acceptance
Acceptance of the service and the CITIS Contract Line Item Number (CLIN), if utilized, is
verification that the contractor has provided the service as specified. MIL-STD-974 and the
particular statement of work define the CITIS functional requirements. A checklist of CITIS
functional requirements may be prepared to assist in tracking contractor compliance. These
functional requirements may include service availability, maintenance response, provision for
core information functions, provision for value-added information functions, and the like.
243
Assurances of adequate acceptance testing for CITIS should be obtained via contractor
demonstration of the service. The test should include demonstration of functional capabilities
and verification that the CITIS will handle the data required without alteration of the data
product. Such a test is not required for each delivery but may be rerun if major maintenance has
been accomplished or if the sending or receiving systems have been changed enough to warrant
an additional test. If specific test data are deemed necessary for adequate testing of a CITIS, that
test data should be provided and results reviewed on-site at a customer facility. On-line access
service should be accepted when it is demonstrated that a person with proper authorization can
perform the contractually required core and value-added functions from a terminal or
workstation at the customers facility or as otherwise agreed. Electronic data transfer service
acceptance should occur when a single instance of transfer of the specific deliverable type can be
achieved including successful download of data into the customers system when contractually
required. This data may be real product data or test data, as appropriate.
8.2.6.7.2.3 CALSIP Acceptance
The original contract baseline requirements for CALS-compliant product(s) are subject to change
and redefinition, by mutual agreement, throughout the duration of the contract.
The
NATO/NATO nations verifies and controls, in part, the adequacy of the CALS product change
and redefinition process via the approval of the original and revision(s) of the CALS
Implementation Plan (CALSIP) along with the final acceptance of the CALSIP at contract
completion.
8.2.7 Applying CALS to the Creation, Management, and Use of Technical Manuals (TM)
8.2.7.1 General Consideration
Technical manuals are any technical publication or other form of media used to install, operate,
maintain, test, repair, overhaul, or provide logistic support of ships, aircraft, defense systems, or
defense material. They are the operating and maintenance instructions for military technicians.
They contain a combination of textual narrative and illustrative graphic images presented in a
formal, structured, page-oriented format governed by specific functional standards.
These manuals have traditionally been prepared and delivered in hard copy form as
camera-ready copy, which in turn are printed in large lots. However, TM data may be presented
or delivered in any media including, but not limited to, hard copy, audio and visual displays, online access, magnetic tape, discs, and other electronic devices.
The implementation of automated data processing technology offers numerous improvement
opportunities in both preparation of technical manuals and in the delivery, storage, distribution,
and maintenance of these manuals. Technical manual data in digital form can be stored on
magnetic or optical media, transmitted and shown on computer terminals, and printed on
demand. Acquiring technical manual deliverables in digital form allows the military user to
view required information without printing it on paper.
Acquiring processable data files provides the opportunity to tailor outputs for particular uses and
users.
Data can be reformatted into systematic trouble-shooting formats for maintenance
244
personnel, it can be adapted to expert system diagnostic programs, or it can be used to generate
training aids.
The development of a CALS strategy for TMs needs to be carefully examined to maximize the
value for a specific defense system program. Program attributes such as technology, costs,
quantities, and schedules have a profound effect on the delivery requirements for TMs. The
technical manual manager must consider the life-cycle of the procurement and the infrastructure
in place or being developed to support the TMs for their program.
The CALS environment will reduce or eliminate the need for conventional forms of media
such as paper, microfiche, and microfilm.
The benefits associated with using digital data for TMs include:
Improved handling and reduced storage of TM data with electronic filing and archiving;
Reduced costs associated with printing and distributing TMs by providing on-line access
to the TM data, so that naval personnel could access the data repository from their field
activity and view and/or print the specific TMs they require;
Improved accuracy and timeliness of the TM data, due in part to the simplified
incorporation of changes.
The acquisition guidance provided in this section applies to the three major TM categories:
Description, Operation, and Maintenance with Illustrated Parts Breakdown; Installation
and Checkout Procedures; and Technical Repair Standards.
For TMs the benefits of digital data include: improved handling, reduced storage, reduced
costs, improved accuracy and timeliness
The following paragraphs discuss various considerations that must be addressed:
245
The expected infrastructure will be documented in the NATO CALS Concept of Operations
(NCoO), and will include:
The hardware and software systems the NATO/NATO nations have, or is developing, to
manage and use the data;
Data users, types of data, frequency of use, and timeliness of data access or delivery to
each user;
Data use and the review and/or approval processes to support life-cycle functions;
Users locations and their primary functions in support of the defense system;
Data interchange requirements including format, media, applicable standards, and
existing telecommunications capabilities;
Access authorizations and restrictions;
Data acceptance requirements including data format and content of data and the
NATO/NATO nations process for accepting product, processable, or Contractor
Integrated Technical Information Service (CITIS) data;
Digital data resources or source data (libraries of historical data, standards, and
specifications) available to support program acquisition and logistics processes.
Acquisition requirements for user hardware and software to support a fielded defense system
must be considered during the CALS implementation strategy and planning process.
8.2.7.1.2.1 Infrastructure Development
Effective acquisition of digital data can be done only with full consideration of the ability of the
NATO/NATO nations to receive, store, distribute, and use digital data that complies with the
CALS standards. The project manager must establish the uses for which the data is required, and
the infrastructure modernization programs that must be available to support this data.
User data infrastructure is the computing environment available to a particular user.
246
The evolution of this infrastructure is a key consideration in implementing the CALS strategy on
any given acquisition. Deficiencies in the infrastructure modernization will jeopardize the effort
to implement the CALS TMs strategy effectively.
The availability of digital data processing and telecommunications technology and approved
standards for creation, storage, transmission, data protection, and integrity of data at the time of
delivery or access are important criteria for acquisition decisions. The current and projected
capabilities of both the contractor and NATO/NATO nations must be assessed with respect to
program needs and schedules. The NCoO, Contractors Approach to CALS (CAC), and CALS
Implementation Plan (CALSIP) are excellent vehicles for making these determinations.
The data user infrastructure, which is the computing environment available to a particular user,
must be considered when acquiring digital data.
This environment establishes the data
processing capabilities of that user. The following areas identify a users infrastructure:
Hardware: Determine the current and planned hardware available to support the defense system
program;
Software: This is the most critical element. Interoperability will normally be achieved
using software. Again, determine both present and future software applications and
availability.
Networks: Determine the local and wide-area networking capabilities and whether CITIS
will be used.
View only: The ability to examine a data file without the ability to change it. This
includes viewing selected portions of one or several documents as well as side-by-side
comparisons of documents;
Comment/Annotate: The ability to evaluate and highlight for future reference or to make
annotations, approvals, and comments without the ability to change the original file.
Annotations are associated with a specific item or location within a document such that
the annotations are displayed whenever that point or area of the document is displayed;
Update/Maintain: The ability to change data, either directly or through controlling
software, in the active files on the host computer;
Extract/Process/Transform: The ability to extract and modify the format, composition,
and structure of the data into another usable form;
Archive: The placing of data into a repository to preserve it for future use.
247
248
Raster
Illustrated Text Data Files:
a) Text:
1) American Standards Code for Information Interchange (ASCII);
2) Standard Generalized Markup Language (SGML)
b) Illustrations:
1) Computer Graphics Metafile (CGM)
2) Initial Graphics Exchange Specification (IGES)
3) Raster
c) PDL
d) Neutral data files
Interactive Electronic Technical Manual (IETM)
8.2.7.1.4.3.2 Media
249
250
representing a portion of the image. Text and graphics in raster data formats allow more rapid
and consistent access to the stored images than paper. In addition, raster data formats can be sent
via electronic means to remote sites. Through a difficult process, raster files can also be
converted to digital (word processor or desktop publishing) documents and edited through
manipulation of individual pixels.
A tiled raster image resembles a two-dimensional grid with each "tile" or set of pixels
representing a portion of the image.
With the advent of raster scanning technologies, the ability to convert existing paper TMs to
digital data files has become available. Raster conversion is the easiest and most cost-effective
method for digitizing the existing paper TMs. However, the quality assurance (QA) process by
human interpretation required to verify the data contents may increase costs substantially. In
addition, raster image files require a large amount of memory storage due to their file structure
and contain no additional information other than each tiles position on a grid. Technologies are
evolving that will be able to convert the raster images to other digital forms (such as vector) for
processing, but the project manager should consider other processable data forms first unless the
TMs required are legacy data.
8.2.7.2.1.2 Illustrated Text Data Files
Illustrated text data files provide a dynamic form of source data with two possibilities:
Text data files include word processing and desktop publishing applications. Such data files can
provide the source data for multiple data applications that allow creation of standard and custom
documents as well as manipulation of the data for annotate/excerpt or update/maintain purposes.
Illustrated text data files can also import generic text and graphics from other sources that may
be otherwise incompatible. In addition, there are PDLs, sometimes called text presentation
metafiles, which are used to drive output devices such as printers. Finally, project managers may
want to consider the new software products for creating platform-independent neutral data files
that allow users to save information created in a variety of software applications and formats into
a platform-independent file format, which can then be viewed and printed by anyone possessing
the appropriate reader software.
There may be instances when illustrated text data files include more than one format of graphical
data. The project manager must be aware of this possibility and be prepared to develop/modify
the defense system contract requirements accordingly.
8.2.7.2.1.3 Text Format
There are two possible text formats for consideration. They are the ASCII and tagged ASCII or
Standard Generalized Markup Language (SGML). They are described below.
251
ASCII
ASCII was developed as a method of translation for computer processors to interpret
alphanumeric characters and symbols through binary representation. ASCII is the basic
text information used by most word processing applications and contains no formatting
information other than line feed and/or carriage returns. Word processing applications
can import ASCII text from other word processing applications, and some word
processing applications can translate formatted ASCII from other word processing
applications into their own format. This makes ASCII text ideal for most interim
deliverables since it can also be imported into an SGML application where it can be
SGML-tagged to become a CALS-compliant deliverable.
SGML
SGML is defined as "A standard that defines a language for document representation that
formalizes markup and frees it of system and processing dependencies. It provides a
coherent and unambiguous syntax for describing whatever a user chooses to identify
within a document."
In the SGML scheme, the document contains only generic tags identifying such structural
elements as paragraphs, sections, etc., but no typesetting markup. However, SGMLs
tagging of ASCII text is a rather cumbersome proposition and may be best suited for final
data deliverables rather than interim deliverables.
When considering SGML as a deliverable format, the project manager must determine
whether the applicable Document Type Definitions (DTD) and Formatting Output
Specification Instances (FOSI) exist and whether the necessary computer environment is
available and in place to accept the SGML documentation. Any TMs that will be
maintained throughout the life-cycle of a defense system should be delivered in SGML
format.
8.2.7.2.1.4 Graphics and Illustration Formats
The three possible graphics formats for consideration are Computer Graphics Metafile (CGM),
Initial Graphics Exchange Specification (IGES), and raster. These formats are described below.
CGM
CGM data is a two-dimensional vector presentation used primarily for charts, figures, and
simple drawings. Many types of TMs contain illustration data in this category. CGM is
the preferred format for incorporating graphical digital data into TMs.
Graphical
enhancement has been added to the format, including complete integration of tiled
compressed raster.
Application structuring is currently in the process of being added to the CGM format.
Extensions will allow CGM generators to tag "objects" of application significance. It
will therefore serve to meet the needs of leading edge and future applications of hypertext
and hypermedia documents, multimedia documents, IETMs, network-distributed
graphical applications, and graphic object databases. (See Section 9 for a more complete
discussion on CGM).
252
IGES
IGES data is a three-dimensional vector presentation used primarily for engineering
drawings. IGES may be the preferred choice for graphical data if a CAD database was
used as the source. (See Section 9 for a more complete discussion on IGES)
Raster
See 8.2.7.2.1.1 for discussion of raster.
8.2.7.2.1.5 Page Description Language
A Page Description Language (PDL) file is executed by an interpreter that controls a raster
printer or other output device. A PDL can be used to ensure that the composed document
produced by an electronic publishing system (which may impose additional processing
limitations, such as font variations or hyphenation) would produce nearly identical hardcopy
output on the widest possible spectrum of printer devices.
PDLs are currently not standardized, and a Standard Page Description Language (SPDL) is still
being developed.
MIL-STD-1840 requires that a system must provide portability of files
(PostScript or Impress PDL specifications). PDL document image files can be acquired as
interim deliverables or as final deliverables in addition to, but not in place of, other digital data
deliverables developed in accordance with the CALS standards.
8.2.7.2.1.6 Neutral Data Files
Several industry-developed software products for creating platform-independent neutral data
files have recently become available that allow users to save information created in a variety of
software applications and formats, including text, graphics, and spreadsheets, into a platformindependent file format. These files can then be viewed and printed by anyone possessing the
appropriate reader software. Many applications also allow reader-software users to annotate data
and copy information to paste into other word processing programs. The NATO/NATO nations
should consider these applications cautiously since they are not part of the CALS standards.
8.2.7.2.2 Interactive Electronic Technical Manual
An Interactive Electronic Technical Manual (IETM) is a computer-based collection of
information needed for the diagnosis and maintenance of a defense system. It is optically
arranged and formatted for interactive presentation to the end user on an electronic display
system. Unlike other optical systems that display a page of text from a single document, IETMs
present interrelated information from multiple sources tailored to user queries.
An IETM is essentially a hypertext document, which consists of a collection of "interconnected
writings. These interconnections allow a user to browse through a document by selecting points
of interest or hotspots that may be connected to other related text, hotspots, or menus. The user
could then continue to follow along these "paths" to other cross-referenced points in that
collection of writings. This creates a "pageless" document that, depending on the source
database, can contain a collection of information from a variety of sources. Also, rather than
253
limit these documents to pure text, we may incorporate graphics, audio, video, and/or computer
programs into the content of the document, creating what is known as a hypermedia document.
The information in an IETM is visually arranged and formatted for interactive presentation to
the end user on an electronic display system. Unlike other visual systems that display a page of
text from a single document, IETMs present interrelated information from multiple sources,
tailored to user queries in a hypertext format. This hypertext document consists of a collection
of interconnected writings that allow a user to browse through a document by selecting points
of interest or hotspots that may be connected to other related hotspots or menus.
By streamlining access to the desired information and by providing multiple paths to other
related information, the IETM offers a more efficient and more comprehensive method of using
technical information.
Unrestricted by the page-oriented display and the use of sole-source information, the IETM
duplicates on the Personal Computer (PC), the research environment available in a wellequipped multimedia library; displays only the actions appropriate for resolving a specific
problem; provides fault-isolation tables and diagrams; and guides the technician through the
troubleshooting process via a user-friendly query method. IETMs permit the user to locate
information more easily and to present it faster and more comprehensively in a form that requires
much less storage than paper.
Derived from the LSAR and CAD data, the IETM will inherently become an integral part of the
defense system from the outset. Data created throughout the defense systems life-cycle will
contain all of the information needed to create and revise the necessary IETMs for the program.
IETMs require a computer environment with the appropriate presentation systems and software
to invoke them.
8.2.7.2.3 IETM Viability
The project manager should consider whether the TM will ultimately be used in an interactive
computer environment, the IETM. The IETM format offers the user distinct advantages over the
traditional TM.
Some IETM benefits include:
Reduction in the false removal rate of Line Replaceable Units (LRU) or Weapon
Replaceable Assemblies (WRA);
Reduction in troubleshooting time;
Reduction in the TM support costs associated with distribution, management, and
storage;
Allowing training activities to concentrate more on generalized training versus system
specific training.
254
The project manager should first determine whether the end item or defense system program is
currently in the early phases of design, whether the life-cycle requirements for the TM exceed
five years, and whether the Technical Data Package (TDP) or LSAR database is available.
If any of these considerations can be answered "NO," then an IETM is not recommended. If all
considerations can be answered "YES," then a business case analysis should be performed to
determine the economic feasibility of the IETM. If results from this analysis recommend
pursuing an IETM or quality readiness and/or support factors lend adequate credence to the need
for an IETM, development of an IETM should be pursued.
8.2.7.2.4 IETM Development
If IETM development has been selected, the project manager must first determine whether this
effort will be associated with an existing IETM in terms of either the modification of an existing
IETM or the creation of a supplement to an existing IETM. If this is indeed the case, then the
project manager must determine whether an existing infrastructure and display device will be
used in conjunction with the IETM and whether this infrastructure uses a proprietary format. If
all of the above conditions are true, then the final IETM developed should remain in the existing
proprietary format. However, if any of these conditions is not met, then it is advised that the
IETM be developed using the new IETM standards.
8.2.7.3 TM Development
Utilization of existing TMs and legacy data is likely in the development of completely new
systems with similar features. The project manager should be aware that even on completely
new defense system programs, some portion of the TMs might exist in both digital and nondigital formats. This is most relevant when a program is entering the earlier life-cycle phases.
An important point to remember here is that acquisition of the proper level and type of digital
data is most cost effective when defined early in the programs life-cycle.
An important point to remember here is that acquisition of the proper level and type of digital
data is most cost effective when defined early in the programs life-cycle.
8.2.7.3.1 TM Availability
Another consideration the project manager must address is whether existing off-the-shelf TMs
will satisfy the programs TM requirements. If more than 90 percent of the TM conforms to the
technical requirements and supports the maintenance concept of the equipment, the TM may be
used. However, if more than 10 percent of the proposed TM fails to meet the necessary
requirements to support the equipment, a new TM should be developed.
8.2.7.3.1.1 TM Development
Once it has been determined that a TM will satisfy the technical requirements and maintenance
concept of the equipment, the project manager must determine the present format of the TM and
whether change pages and/or a TM supplement will be required. If the "basic" TM si available
in a word processor format, the TM may be delivered in its present format providing that this is
255
mutually compatible with the existing infrastructures. If it is not, the TM should be delivered in
raster format. Also, if change pages and/or a TM supplement will be required in addition to, or
instead of, the "basic" TM, then the development of these items is the same as that required for a
new TM except that the format and style of the newly developed items may remain the same as
the "basic" TM.
If more than 25% of the existing TM is affected by changes, complete revision of the TM is
recommended
The project manager must now determine how well the existing military TMs cover the
maintenance concepts of the equipment. Changes to the hardware configuration or equipment
components of the defense system may impact the accuracy of the TMs information. If more
than 25 percent of the existing TM is affected by these configuration changes, complete revision
of the TM is recommended.
8.2.7.3.1.2 TM Permanent Change Page Development
If less than 25 percent of the TM needs revision, only change pages will be developed.
Once it has been determined that less than 25 percent of the TM needs revision, only change
pages will be developed. The basic TM will be converted to raster if it is not already digitized.
Change page development will follow the same decision path as the development of a new TM,
but the newly created change pages will retain the format and style of the original TM.
8.2.7.3.1.3 TM Update Revision Development
Once it has been determined that more than 25 percent of the TM must be changed, the project
manager must decide how the final product will be delivered. The decision process follows the
same basic path as that stated for a newly developed TM; the difference is the revised TM may
retain the format and style of the original TM.
8.2.7.3.2 New Technical Manual or Complete Revision
8.2.7.3.2.1 Source and Legacy Data Considerations
The project manager must now consider whether any of the TM source data presently exists as
legacy data. Legacy data developed from existing defense systems or from the creation of LSA
data may contain enough information to warrant inclusion into the new defense system program.
For newer defense system programs, this legacy data may exist in both digital and Non digital
formats. If legacy data does exist in a digital format, the project manager should address
life-cycle considerations. If no legacy data is to be procured for the defense systems TMs or no
digital legacy data exists, the project manager should consider whether configuration changes
and/or multiple configurations are anticipated for the end item or defense system.
256
257
If it is determined that conversion of all existing nonvector illustrations to a vector format is cost
effective or if no source or legacy illustrations exist, then the recommended solution is to convert
and/or create all applicable illustrations to a vector format such as IGES and/or CGM. If
economic analysis determines that conversion of all existing illustrations is not practical, it is
recommended that only selected source or legacy illustrations (those with a high likelihood of
being revised at a later date) be converted to a vector format. Remaining illustrations should be
delivered in raster format.
To provide maximum proliferation of the preliminary TMs for review, it may be beneficial to
request that these deliverables be provided in a proprietary word processor format with
illustrations in either raster and/or CGM formats only. SGML, IGES, or commercial CAD
should not be used at this point unless it can be demonstrated that the reviewing activities
infrastructure can support display and annotation.
8.2.7.4 Decision Guidelines
Digital delivery options for technical manuals are not mutually exclusive. There will often be
cases when several options will be combined for specific deliverables during a defense system
acquisition. The decision criteria presented in this handbook are intended to aid in selecting the
best options. The following is guidance for applying the criteria to technical manuals.
8.2.7.4.1 Decision #1: Deliverable Options
Technical manual data can be delivered as composed documents, processable files, or interactive
access to the CITIS database. The composed document deliverable option offers the least
flexibility, even in digital form. It is a static, formatted presentation of the manual, which can
only be archived, viewed, and printed after receipt.
Processable files, on the other hand, offer capabilities that are more robust. These files can be
updated or transformed into many different data types.
With appropriate data processing
systems, processable files can support creation of job guides, training documents, and eventual
on-line distribution of selected portions of the data to maintenance personnel. In addition, a
separate indexing mechanism may be needed for either machine or human search or access.
8.2.7.4.1.1 Destination System Constraints on Form
Processable data files are preferable to composed documents, but the presence of both text and
graphics may cause some difficulty because not all presently installed computing equipment and
software can simultaneously process text and embedded graphics.
This issue is rapidly
disappearing. Nonetheless, during the period of intended use, installed hardware and software at
both the contractors site (i.e., the source system) and the users site (i.e., the destination system)
will be the deciding factor as to which form the deliverable may take.
8.2.7.4.1.2 Interim Dual Deliverables
Requirements for technical manual deliverables may include both composed documents in
digital form and processable data files. However, until more advanced user systems are
258
available, it may be necessary to accept a hard copy (paper) technical manual for approval,
reproduction, and distribution, and a digital form of the manual for archiving or update and
maintenance.
When NATO/NATO nations implement more advanced computer systems, processable technical
manual files (with or without composed document image files of the technical manual) should
suffice.
8.2.7.4.2 Decision #2: Forms Options
A technical manual is made up of both text (including narrative and tables) and graphics.
Integrating these elements into a complete technical manual and dealing with user requirements
that are different for interim review and approval than for final delivery may require more than
merely choosing a single optimum form. The project manager may have to choose the
appropriate forms for multiple deliverables (e.g., a document data file consisting of PDL to
support in-process reviews, and processable data files for the final deliverable).
8.2.7.4.2.1 Composed Documents
If composed documents have been selected at decision #1, the forms for technical manual
delivery can be either hard copy (paper or microfilm) or a digital composed document image file.
The digital form of this deliverable consists of composed page images of the full manual. Two
examples of digital composed document files are PDL and raster.
These options offer greater advantages than hard copy in storage, distribution, viewing, and
printing. They also provide slightly more flexibility than hard copy with respect to future data
uses, although their formats will be fixed and unyielding.
PDL and raster provide a
two-dimensional image of each manual page, offering no further updating or processing features
beyond replication. Both hard copy and the digital forms of composed documents complicate
update and maintenance.
8.2.7.4.2.2 Processable Files
If processable files are selected at decision #1, the forms for technical manual delivery can be
either one or more sets of text and graphics files, or an integrated data file that contains text and
graphics in compound data architecture. A particular type of integrated data file is the IETM.
8.2.7.4.2.3 CITIS Interactive Access
Computer screen display is the primary, preferred form for CITIS information delivery.
8.2.7.4.3 Decision #3: Specification and Standard Options
8.2.7.4.3.1 Composed Documents
Technical manuals acquired as composed documents may be acquired in the form of either
camera-ready masters or digital document image files. The intended application may also
259
For technical manuals, CGM is the preferred option but IGES can be used. Extensions to the
standard to allow translations of native CAD data into CGM are still being developed. If
technical manual illustrations are being derived directly from design data, then system
260
limitations may constrain the choice of delivery standard. In selecting the appropriate option, the
project manager should recognize the potential problems created by multiple translation steps
(e.g., unique CAD system to IGES to CGM). MIL-D-28003 specifies an Application Profile
(AP) with two options: Level I for publication quality data, and Level II for draft quality data.
Uncompressed raster data can be included in a CGM file, but MIL-D-28003 should only be used
where the predominant form of the graphics information is vector. When IGES is used for
technical manual illustrations, the Class I Technical Illustration subset is appropriate. Data
would be delivered in ASCII, as specified by MIL-D-28000.
8.2.7.4.3.4 Processable Text
Processable text data files should be acquired in accordance with MIL-M-28001, which
implements the SGML. An SGML Document Type Definition (DTD) and Formatting Output
Specification Instance (FOSI) created in accordance with the provisions of MIL-M-28001 or
AECMA 1000 D should be used to meet the document structure and format requirements of the
technical manual. The project manager may be required to fund development of a unique DTD
or FOSI. A more sensible approach would be to make use of previously developed DTDs
8.2.7.4.4 Decision #4: Digital delivery mode options
Physical media is currently the only economical option for the delivery of large document image
files or processable data files. While telecommunications bulk transfer of these files may be
possible, it is usually not an economical option because of the large volume of data contained in
these files, particularly the raster document image and raster graphics files.
When CITIS interactive access to a contractors technical manual database is chosen, then
telecommunications are warranted as a delivery mode for deliverables. Security aspects will also
affect the selection of delivery method.
8.2.7.4.4.1 Magnetic Tape
The standard physical media option is magnetic tape. The mature, stable, non-proprietary
standard that MIL-STD-1840 requires for magnetic tape supports most originating and
destination systems.
8.2.7.4.4.2 Floppy Disk
The preferred physical media option for small files is 3.5 inch, 1.44-megabyte floppy disk. Like
magnetic tape, floppy disk is a mature, stable technology that is usually available at all sending
and destination systems.
8.2.7.4.4.3 Optical Disk
Optical disk or CD-ROM will be alternative physical media options in the future, and are
generally well suited for data archiving because they can accommodate very large volumes of
data quite efficiently.
261
262
The next level of acceptance is adherence to the specified CALS data exchange format. This
will usually be compliant with the CALS standards or other national or international data
exchange standards. Automated tools may aid this level of acceptance. The next level of
acceptance is applied to the digital data format, such as MIL-STD-1840, if it has been specified.
Again, automated tools may be used to verify compliance. Other formatting requirements may
be subject to inspection and acceptance including EDIFACT format, when specified.
Finally, the physical media may have acceptance criteria to be applied. This level of acceptance
will not be used if data has been formally delivered by the CITIS. The means of inspection to be
used should be provided to the contractor as soon as these means have been determined. Any or
all levels of acceptance may be performed at the contractors facility or at the NATO/NATO
nations facility, as required. In addition to digital data acceptance, CITIS requires additional
acceptance requirements to be applied.
263
9.0 SECURITY
9.1 What is Information Security
9.1.1 The Environment
Organizations today, connected to extensive networks and global communications, are realizing
that achieving enterprise-wide information security is a complex but necessary task. Users have
become critically dependent on information, and on the systems and networks used to provide
access to this information. As this dependency grows, the need for increased connectivity and
inter-connectivity amongst the many diverse government and private sector systems becomes
ever more important. Furthermore, the incredible sophistication and speed of evolution of the
emerging information technologies being offered by industry create an insatiable desire by users
to employ these emerging technologies. At the same time, user organizations are concerned
about protecting classified and sensitive information, about ensuring the integrity and
authenticity of the information, and about controlling access to the information and to the
systems and networks that process and transport this information. They are also concerned about
detecting and reacting to malicious acts that could result in a temporary or sustained loss of
service. As time goes on criminals, hackers, competitors, and other threats will gain access to
more sophisticated capabilities to break into, exploit, or disrupt, information infrastructures.
Information systems security and assurance, then, cannot be viewed as a point in time. It is in
fact achieved through a process of awareness, readiness, and vigilance.
9.1.2 Types of Security
Within this environment, security consists of two broad areas; those security measures defined
within the requirements of a particular contract and defined by the acquiring organization and its
sponsoring governmental entity and those actions taken by organizations to achieve routine
information assurance.
9.1.2.1 Regulatory Requirements
Security requirements that are typically called out in contracting actions are well defined within
existing and emerging policies, regulations, and requirements. These are cited by the sponsoring
governmental entity. Emerging regulations can often be found posted to a particular sponsoring
agencys Web site or on the Web site for that governmental body responsible for security of the
affected area.
9.1.2.2 Information Assurance
Information Assurance for enterprise-wide information systems, is a vital requirement of every
commercial CIO and senior government IT professional for day to day operation. Information
Assurance enables connectivity in a safe manner, which makes companies and agencies more
productive in this information age and meets the need for secure interoperability with our Allied
and Coalition partners. This section concentrates on Information Assurance activities applicable
to all organizations.
264
described for measuring and assessing the need for various levels of robustness for technical (and
selected non-technical) security countermeasures.
9.2.2.4 Interoperability Framework
Interoperability Framework strongly advocates the use of compatible and interoperable security
solutions. This is needed to ensure that as security solutions are added to the communitys
Information Technology environment, that the existing interoperability lines are not broken. The
best path for achieving this is to recommend solutions based on industry standards or de facto
standards. The Framework recognizes that emerging information and security technologies are
often fielded prior to the adoption of interoperability standards. The users desire to use these
emerging technologies sometimes requires acceptance of vendor-unique or proprietary solutions.
In these cases, the Framework advocates a migration path towards standards-based solutions, as
they become available.
9.2.2.5 Security Management Infrastructure Considerations
Security Management Infrastructure Considerations address the need for SMI capabilities to
accompany the use of technical security countermeasures, placing demands on network users and
administrators. It is important that consideration be given to the needs and demands placed on
network users and operators by an SMI within the context of any potential network security
solution.
9.2.3 Security Solutions Framework
9.2.3.1 Requirement Category Guidance
Requirement Category Guidance addresses each of the requirement categories, one by one. For
each category, the Framework defines user requirements; both current and those anticipated
based on emerging technology trends. It considers applicable potential threats and identifies
potential countermeasures articulated as security requirements for that category.
Currently
available security technologies for addressing each requirement are described and compared.
Where appropriate, preferred solution(s) is (are) identified and characterized in terms of features
and assurances.
9.2.3.2 Security Management Infrastructure Considerations
Security Management Infrastructure Considerations emphasize the importance of the Security
Management Infrastructure, and provide a description of the major SMI services, followed by an
in-depth characterization of processes, requirements, potential attacks, and countermeasures that
are available for each SMI service. The SMI discussion concludes with recommendations for the
features needed to achieve three assurance levels.
9.2.3.3 Aggregated Solution
An Aggregated Solution recognizes that the needs of most users are reflected not by any one of
the four requirement categories, but by some combinations of them. The Framework recognizes
266
that a means is needed to develop a solution for logical aggregations of the recommendations for
the individual categories.
9.2.4 Technology Characterization
The recommendations for the best technologies to address each requirement category and case
are summarized in the framework. This identifies the type of features and assurance levels that
are recommended overall for a particular technology area. If existing technology needed to
mitigate the threat at a sufficient level is not available, the need is considered a gap in technology
for this customer requirement category. These gaps are identified in the appropriate technology
assessment within the relevant Framework guidance sections.
267
10.0 CONTRACTING
10.1 Introduction
This section provides sample generic CALS Statement of Work (SOW) language and CALS
source selection criteria to assist the acquisition manager in the implementation of CALS for a
Project.
10.2 How to contract for CALS - Sample Statement of Work Language and Source
Selection Criteria
10.3 Statement of Work Language
This Generic Statement of Work (SOW) provides sample language to assist in the
implementation of Continuous Acquisition and Life-cycle Support (CALS). The content within
each sample paragraph should be tailored for each application. This CALS-related language
should be used in developing the functional requirements within each applicable section of the
Request For Proposal (RFP) or Request for Quotation (RFQ) SOW. A more detailed sample
SOW for development of a CITIS is contained in section 5.
Text appearing as [ times roman italics] in the following paragraphs is provided as the language
that would be used in the actual SOW. Text appearing as [SMALL CAPS] within the actual SOW
text indicates information input by program managers relevant to their programs.
10.3.1 Scope
The contractor shall establish a digital technical information (TI) system to provide automation
and integration of the generation, delivery, and uses of [P ROGRAM NAME] technical information
over the ["DEFENSE SYSTEM" OR "EQUIPMENT"] life-cycle. Unless otherwise specified within
the contract, all, or any portion of, the technical information (TI) specified herein shall be
developed in a digital form compatible with requirements stated herein. Unless specifically
stated herein, the following requirements do not replace or amend requirements for delivery of
TI in non-digital forms specified elsewhere in the contract.
10.3.2 Specific Requirements
The contractor shall implement a CALS Program that will achieve the following objectives:
requirements defined in [Section X.X] of this Statement Of Work (SOW). The CALSIP shall
address capabilities for automating the access and retrieval of technical data, and provide for
digital exchange and integration between the engineering, manufacturing, logistics, and other
functional areas as appropriate to this acquisition phase of the Program.
The CALSIP shall address, as a minimum, the following:
CALS support hardware and software architecture, reference documents, and points of contact.
269
270
components. The contractor shall conduct a test and evaluation of the system and periodic
inspections to ensure compliance. The NATO/NATO nations shall retain the right to conduct
announced and unannounced inspections by security specialists at any time to review, audit, and
account for classified materials.
10.3.8 Program Assessment and Control
The CALSIP shall describe the procedures and controls by which the contractor and the
NATO/NATO nations will evaluate the status and effectiveness of CALS. The implementation
of CALS will be a subject of review at program, design, and ILS reviews.
10.3.9 Post Award CALS Program Orientation Conference
The prime contractor shall host a post award CALS program orientation conference to be
scheduled no later than [NUMBER] of days after contract award. A representative from the
[PROGRAM NAME] program office shall chair this conference. Major prime contractor teaming
partners/subcontractors shall attend. The agenda for this conference shall be approved by the
[PROGRAM NAME] program office. The purpose of this CALS meeting is to clarify the NCoO and
have the contractor present to the NATO/NATO nations their plans for on-line access, if
required, exchange, and delivery of digital data.
10.3.10 Government Furnished Information
The contractor CALSIP shall describe the Government Furnished Information (GFI) the
contractor expects to receive from the NATO/NATO nations. The list of GFI the NATO/NATO
nations plans to provide is included in attachment/exhibit [NUMBER]. GFI shall be provided in
both digital and hard copy formats. The GCO will define infrastructure capabilities to receive
and use various types of digital data and technical information. The contractor shall use this GFI
with contractor generated data.
10.3.11 Contractor Integrated Technical Information Services)
The contractor shall propose ["DEVELOP" IF CITIS IS REQUIRED] a program composed of
procedures, processes, specifications, and software applications for the integration, storage,
exchange, and/or on-line sharing of data with the NATO/NATO nations. These technical data
and database(s) and functional application capabilities provided within the contractors system
shall be referred to as Contractor Integrated Technical Information Services (CITIS). This CITIS
shall be developed in accordance with [ XXX ], and the following. The contractor shall propose
["DEVELOP" IF CITIS IS REQUIRED] a Technical Information (TI) and program management
architecture, with a functional and hierarchical indexing system to:
The contractor shall propose how he will ["IS REQUIRED TO" IF CITIS IS REQUIRED ] establish a
link among logistics, design, engineering, and manufacturing data and functional processes to:
271
In the selection of analytical tools, the contractor shall maximize the use of previously developed
or off-the-shelf software. These software tools shall be compatible with NATO/NATO nations
hardware/software systems stated in the NCoO, unless contractor developed, unique software
solutions are demonstrated to be more cost effective. The contractors telecommunications
solution for CITIS shall comply with NATO/NATO nations Interconnect Profile.
10.3.12 Data Element Dictionary [If CITIS is required.]
A general data element dictionary shall be developed so that identical data elements are
addressable by the computer as the same data element. Changes to any duplicate data element
shall be effected throughout all databases. A similar methodology shall be developed for
graphics and large textual entities to ensure that changes to the source graphic correctly flags the
necessity for change to all dependent graphic/textual entities derived from the source graphic.
The contractor shall use existing data dictionaries as guidance in constructing the [P ROGRAM]
data dictionary.
10.3.13 Engineering Data (Graphic and Text Files)
Any data, either NATO/NATO nations, contractor, or vendor, that contains engineering
definition or guidance on material items (components), equipment system practices, methods,
and/or processes relating to the design, manufacture, acquisition, test, inspection shall be
submitted in digital form in accordance with [ XXX ] and compatible with the NATO/NATO
nations data repository and receiving systems stated in the NCoO.
10.3.14 Automation and Functional Integration
The contractor should use computer-aided design, engineering, and manufacturing methods
(CAD/CAE/CAM) to support design integration with manufacturing planning and logistic
support system development. These software tools shall be compatible with the NATO/NATO
nations hardware/software systems stated in the NCoO, unless contractor developed, unique
software solutions are demonstrated to be more cost effective. An integrated set of ADP systems
and applications will be used by the contractor team to enter, update, manage, and retrieve data
from specific [P ROGRAM] technical database(s).
10.3.15 Reliability and Maintainability Automation
The contractor shall employ automated tools for performing Reliability and Maintainability
(R&M) tasks. The contractor shall integrate these R&M tools with other CAE tools. These tools
272
may stand-alone with no direct access to the CAE database; reside in the CAE system and
interface with the evolving design; or, reside on the CAE system and be automatically invoked to
support design decisions. The R&M methods and tools used by the contractor shall include, as a
minimum:
contractor shall utilize the RCM automated worksheet process or a contractor developed RCM
automated process with the capability of automatically transferring compatible data to the
NATO/NATO nations RCM software. The automated RCM analysis data/work-sheets must be
delivered to the NATO/NATO nations in accordance with the CDRL.
The contractor will develop an Age Exploration (AE) database for the storage and analysis of
in-service/operational age-reliability data that shall be used to support the RCM analysis
process. The AE database shall be integrated digitally and have an interactive electronic
interface with the RCM automated process.
10.3.19 Level of Repair Analysis
The contractor shall employ an automated system to perform Level of Repair Analysis (LORA) in
accordance with the requirements specified in [ XXX]. The contractor shall establish a database
as a repository for LORA input data and LORA output report files generated by execution of the
LORA model software. The LORA database will be integrated with the automated LSAR
database to maintain traceability of LSA data used as input to the LORA. The output results of
the LORA shall be documented in the LSAR for development of the LSA-024 maintenance plan
report. Approved LORA input data files and output reports shall be delivered in accordance
with CDRL specified delivery mode (i.e., deliverable digital media or on-line access/retrieval).
10.3.20 Diagnostics
The source of diagnostic information will reside in logistics engineering databases offering data
exchange in neutral formats. Software shall be developed to provide for automated interface
with in-service performance and maintenance data collection processes and to provide feedback
concerning successes and failures in the fault isolation process to the [P ROGRAM] system
designer. Diagnostic systems that learn from experience and which have the capability to
update a knowledge-based diagnostic database to optimize the fault isolation process or to
improve system design are to be used to the fullest extent possible.
10.3.21 Management Information Tools
The contractor shall establish an on-line direct access capability for recording, planning,
scheduling, and reporting status of program requirements. This shall provide visibility of the
contractors performance, highlight potential problems, and provide schedule compatibility
checks to ensure integration of functional activities. This on-line capability shall identify change
impacts on related areas of logistic support, design and manufacturing, and provide the status of
program deliverables.
10.3.22 Technical Manuals
The contractor shall provide for computer assisted generation of technical manuals. This data is
to be derived, to the maximum extent possible, from integrated digital data files, e.g.,
CAD/Engineering Database/LSAR.
This data shall be provided in accordance with
(Service-unique specifications and TM development guidance or other TM SOW requirements).
274
275
276
The sample clauses are intended to cover all the subjects to be addressed under an electronic data
interchange relationship, including electronic mail. The guidelines and sample clauses cover a
wide range of electronic exchange of data, from electronic mail to the ultimate Electronic Data
Interchange, which is the transfer of data from computer to computer without human
involvement.
The transfers involved can vary from commercial trade transactions under an Integrated Logistic
Support program (e.g., ordering spare parts from contractor stock) to exchange of proprietary
data when developing a weapon system data base.
Some of the clauses include general references to technical matters. These technical matters
require further specifications. They are often found in so-called user manual. The samples
need to be completed by a User Manual that will include the necessary technical specifications as
determined by the parties. The User Manual is left to the Electronic Data Interchange users to
develop, draft and/or agree according to their needs.
10.5.2 Agreement First Page
The first page should incorporate sufficient information to provide a capsule of the most salient
points of the Agreement at a glance. Such items of information may include:
Reference number
Identification of the parties to the agreement, their representatives and their addresses
Security classification
the
of
of
on
278
Business day: any day except a Saturday, Sunday or any declared public holiday in the
intended place of receipt of an EDI Message as defined in the User Manual.
Data-log : a collection of data transferred that provides a complete historical record of
data interchanged.
Electronic Communications : the communications of digital data by electronic means
such as but not limited to telephone, telefax, computer-to-computer-link.
Electronic Data Interchange (EDI): is the electronic transfer of data, from computer to
computer, using an agreed standard to structure an EDI Message.
EDI Message : a set of segments, structured using an agreed standard, prepared in a
computer readable format and capable of being automatically and unambiguously
processed, as defined in the User Manual.
Electronic Data Interchange Protocol: the protocol specified by the parties hereto as
that governing the requirement of format, structure and transmission of documents and
other communication between the Parties via the Electronic Data Interchange network.
Electronic Mail: the electronic communication between the Parties of textual binary and
graphical data in a non structured format, of a maximum size as specified in the User
Manual.
Electronic Signature : an agreed string of characters identifying the originator of an EDI
or Electronic Mail message.
Functional Acknowledgement: an acknowledgement message of the receiving Partys
computer software application that automatically confirms the receipt of the Electronic
Data Interchange document or Electronic Mail message at the moment of receipt.
Garbled Transmission: an attempted transmission that cannot be decoded by the
receiving Partys host software application and is therefore completely or partially
unreadable.
User Manual : the technical procedures and rules applicable to the transmission of data.
10.5.5 Authenticity of Messages
The parties should provide for the identification of the sender and the receiver together with
means to verify the authenticity of the message.
Sample Clauses
All Electronic Data Interchange or Electronic Mail Messages must identify the sender
and receiver and must include an agreed means of verifying the authenticity of the
message either through a technique used in the message itself or by some other means
279
provided for in the Electronic Data Interchange Protocol, or as specified in the User
Manual.
Simultaneously with the execution of this Agreement, each Party shall furnish to the
other, a list of the individuals authorized by it to send Electronic Data Interchange or
Electronic Mail Messages and the appropriate Electronic Signature and shall update this
list as necessary.
10.5.6 Validity and Formation of Contract
10.5.6.1 Validity of the Contract
This sample clause attempts to emphasize the intention of the parties to form valid and binding
contracts by EDI and to provide proof of this intention to third parties. As such, the provision
provides that parties will not challenge the validity of transactions effected by use of EDI, on the
sole ground of that means.
The law applicable to the data transferred might be different from one country to the other and
the parties may not necessarily be aware of national law restriction on the content of an EDI
Message. It is reasonable to ensure that parties will take care to respect the national legislation
applicable to the content of the EDI Message.
Whenever the data included in an EDI Message received is inconsistent with national law of the
receiver, the obligation on him will be to inform the other party of this inconsistency and he may
then be able to take measure to avoid breach of its own law.
Sample Clauses
The parties bound by the Agreement, expressly waive any rights to contest the validity or
enforceability of a contract, affected by the use of EDI in accordance with the terms and
conditions of the Agreement, or the authenticity of an Electronic Signature on the sole
ground that it was affected by EDI.
The Parties agree not to contest the authenticity admissibility or enforceability of
messages under the provisions of any applicable law relating to whether certain
agreements are in writing and signed by the Party to be bound thereby.
Any Electronic Communications properly transmitted pursuant to this Agreement shall be
considered to be written or in writing. Any such message when containing, or to
which there is affixed, and Electronic Signature shall be deemed to have been signed
and to constitute a true copy when printed from electronic files or records established
and maintained as specified in the clause on DATA-LOG: RECORDING, STORAGE
AND RECONCILIATION OF ELECTRONIC DATA INTERCHANGE MESSAGES.
Each party shall ensure that the content of an EDI Message, sent or received, is consistent
with the law of its own respective country, the application of which could restrict the
content of an EDI Message or limit its use, and shall take all necessary measures to
inform without delay the other Party if such an inconsistency arises.
280
281
282
283
useful in a situation where a problem has occurred with the transmission of the
acknowledgement. Time limits again will be critical.
Alternatively, the parties may determine a recovery procedure for the cases where technical
problems have occurred and the sender of an EDI Message for which an acknowledgement is
required may initiate such kind of recovery procedure if he does not receive the
acknowledgement within the prescribed time limit. The details of such procedure should be
determined in the User Manual.
10.5.7.6 Inability to Send Messages
Due to external circumstances, there may be an inability to transmit electronic communications
from time to time. The parties may agree to exchange messages at such time by other methods
of communication, including tele-copy, tele-facsimile, telephone, or paper.
The legal
implications of such alternative forms of communication should not be affected by the
agreement.
Sample Clauses
EDI Messages shall be processed as soon as possible after receipt, but in any event,
within the time limits specified in the User Manual.
If a message received appears not to be in good order, correct and complete in form, the
recipient Party shall inform the other Party within the time limit as specified in the User
Manual. If the message is rejected, a rejection message shall be sent within the time limit
as specified in the User Manual
Immediately upon receipt of any EDI Message or Electronic Mail message at its receipt
computer, the receiving Partys receipt computer shall automatically transmit a
Functional Acknowledgement in return and additionally the sender may request the
recipient to confirm the receipt of that message.
An acknowledgement of receipt is not required unless requested.
However,
acknowledgement is required for all trade data messages and messages containing
classified data. An acknowledgement of receipt can also be requested by specific
provision included in the User Manual or by express request of the sender in an EDI
Message.
Where an acknowledgement of receipt is required, the receiver of the EDI Message to be
acknowledged shall ensure that the acknowledgement is sent within one business day of
the time of receipt of the EDI Message to be acknowledged, unless an alternative time
limit has been specified in the User Manual. The receiver of an EDI Message requiring
an acknowledgement shall not act upon the content of the EDI Message or further
disclose or use its contents until such acknowledgment is sent.
If the sender does not receive the acknowledgement of receipt within the time limit
applicable, he may, upon giving notification to the receiver to that effect, treat the EDI
Message as null and void as from the expiration of that time limit or initiate an alternative
284
285
10.5.8.5 Encryption
The parties may agree to use a specific form of protection for certain message such as a method
of encryption to the extent permitted by law in either of their respective countries. For
consequential transmission or retransmissions, parties shall maintain the same level of
protection.
Sample Clauses
The parties undertake to implement and maintain security procedures and measures in
order to ensure the protection of EDI Messages against the risks of unauthorized access,
alteration, delay, destruction, loss, or security breach.
The security classifications detailed in the User Manual shall apply. For NATO
classified information the NATO document CM(55) 15(Final) Security within North
Atlantic Organization is applicable. This document is made part of this Agreement by
reference, automatically if the User Manual indicates that classified information will be
transmitted.
Security procedures and measures include the verification of origin, the verification of
integrity (including date and time of transmission), the non-repudiation of origin and
receipt and the confidentiality of EDI Messages. Security procedures and measures for
the verification of origin and the verification of integrity, in order to identify the sender of
any EDI Message and to ascertain that any EDI Message received is complete and has
not been corrupted, are mandatory for any EDI Message. Where required, additional
security procedures and measures may be expressly specified in the User Manual.
If the use of security procedures and measures results in the rejection of, or in the
detection of an error in an EDI Message, the receiver shall inform the sender thereof,
within the specified time limit. The receiver of any EDI Message which has been
rejected, or which contains an error shall not act upon the EDI Message before receiving
instructions from the sender.
Where a rejected or erroneous EDI Message is
retransmitted by the sender, the EDI Message should clearly state that it is a corrected
EDI Message.
10.5.9 Confidentiality
In-confidence information is distinguished from classified information by different laws and
regulations relating to its disclosure and use and it should therefore be addressed separately in
the agreement.
The level of protection to be maintained for Electronic Data Interchange messages of an in
confidence nature is intended to reflect the level adhered to in the paper environment. At least
the same level of protection of such messages should be maintained wherever such message is
subject to consequential transmission or re-transmission. The contract covering the underlying
transaction may provide for marking requirements (e.g., in respect of technical data). Any
protective measures applied to such messages must be compatible with these requirements. The
286
user manual may elaborate on the further technical procedures required to implement the
necessary protection.
The information to be protected by this clause is sensitive information of a commercial nature.
Accurate protection of this kind of information is mandatory. However, the restrictions required
under this clause on the receiving party should not be applicable if the information is rightfully
available for unrestricted use.
Sample Clauses
In addition to the provisions governing security the Parties shall ensure that Electronic
Data Interchange Messages containing information specified by the sender or agreed
mutually between the Parties to be of an in confidence nature are maintained in
confidence and are not disclosed or transmitted to any unauthorized person nor used for
any purposes other than those intended by the Parties.
When authorized, further
transmission of in confidence information shall be protected to at least the same degree as
the originally transmitted Electronic Data Interchange Message.
Data requiring
protection shall be marked by the sender in accordance with the contract covering the
underlying transaction and as defined in the User Manual.
Electronic Data Interchange Messages shall not be regarded as containing in-confidence
information to the extent that it can be demonstrated such information:
Is in the public domain other than by breach of this Agreement by the receiver
and is available for unrestricted use; or
Is in or comes rightfully into the possession of the receiver without restrictions; or
Is received by the receiver from a third Party who himself has the right to disclose
the information without restrictions; or
Is or was independently developed by the receiver; or
Is approved by the owner of the information for unrestricted release by the
receiver.
287
an accurate and secure way. This time period of three years is suggested as the time limit to
consider by parties, should there be no other legal or customary requirement.
If the requirements of national law vary compliance with the laws in question should be ensured.
It must be stressed that laws of many countries require a period of storage, of 7 years or more. It
must also be emphasized that such storage may need to be ensured for various purposes,
including but not limited to, audit, accountancy, tax, evidence, and other administrative or legal
requirements. It is recommended that careful storage of the information be ensured. The
Electronic Data Interchange messages sent or received should, for the security of the transaction,
be stored completely and in a chronological order, in a secure way and without alteration.
Certification of the data-log may be necessary or desirable for the purposes of introducing the
data-log as evidence. More legal requirements in connection with the storage of the data may
exist at national level and should be carefully followed.
10.5.10.2 Format of Storage
The data transferred using Electronic Data Interchange should be stored in the agreed format (see
user manual) in which it has been sent or in the format in which it has been received.
This is the format of the data that can be considered as originally received and will constitute, if
necessary, evidence of the Electronic Data Interchange message as it has been sent or received,
before any translation of the message has happened.
If an Electronic Data Interchange message has been electronically signed, it will only be possible
to verify it against the format in which the message has been sent.
The data should also be stored in the format in which it is translated in the information system of
the receiver or from the information system of the sender. This will be however, a matter for
decision of the parties. The readability of, and the possibility to print out the messages are
criteria most required by national legislation and should be complied with. To ensure that
readability is maintained, any material, software or any other operational equipment which may
be required to access the data and read it, should be retained by the parties, even in the case
where updating of systems have occurred. The parties may wish or need, in such cases, to keep
the availability of such equipment without retaining it themselves. Such possibility should only
be relied on after verification of national legislation requirements.
Each party should prepare a permanent copy of its data-log at a frequency that would depend on
the quantity of transactions. Some regularity is desirable if the permanent record is to be
admissible as evidence in legal proceedings as routinely prepared business record.
To ensure that all documents sent have been received the permanent copy of the data-log should
be delivered to the other party for reconciliation purposes and a procedure for objection should
be specified.
Sample Clauses
288
A Data-log, including any Electronic Data Interchange Message as sent and received,
shall be maintained by each of the Parties without any modification for a minimum
period of [insert number of] years/as specified in the User Manual, following the
completion of the transmission.
Parties shall ensure that electronic or computer records of the Electronic Data Interchange
Messages shall be readily accessible, are capable of being reproduced in a human
readable form and of being printed, if required. Any operational equipment required in
this connection shall be retained.
Each Party shall designate one or more individuals with appropriate authority as the
persons responsible for the systems and procedures relating to the recording and storage
of the Data-log. Any such authorized person shall be competent to certify the accuracy
and completeness of the Data-log.
At the end of each period as specified in the User Manual or more frequently as a Party
may wish, each Party shall prepare a permanent copy of its Data-log for the immediately
preceding period. The permanent copy for that period shall be certified by one of the
persons authorized pursuant to paragraph above and prepared in duplicate in an
unalterable form of electronic or optical media as specified in the User Manual. If not
more than [insert number] Electronic Data Interchange Messages have passed between
the Parties during that period, a Party may, at its option, prepare the permanent record of
the Data-log for that period in written form.
Each Party shall deliver one duplicate of its permanent Data-log to the other who shall
have a period of [insert number] days following receipt to compare it with its own, and
shall give notice to the other stating the details of any objections with respect to the
accuracy or completeness of the record received. In the absence of any such notice of
objection upon the expiry of that period the permanent record of the Data-log shall be
conclusively deemed to have been accepted as accurate and complete by both Parties.
Each Party may retain the other Partys Data-log for such period as it considers
appropriate.
10.5.11 Operational Requirements for EDI
10.5.11.1 Operational Environment
The objective of this clause is to include in an agreement the basic requirements for operating
Electronic Data Interchange. The list of operational and technical elements that are mentioned in
the clause on OPERATIONAL REQUIREMENTS FOR ELECTRONIC DATA
INTERCHANGE is not exhaustive. The details regarding these operational requirements will be
developed in the user manual, in accordance with the clause on TECHNICAL
SPECIFICATIONS AND REQUIREMENTS.
289
290
Message Definitions. The Parties shall use ISO definitions for Electronic Data
Interchange Messages as defined in the User Manual.
Standards. All Electronic Data Interchange Messages defined in the User
Manual shall be transmitted in accordance with standards, recommendations, and
procedures as defined in the User Manual.
Codes. Data element code lists referred to in Electronic Data Interchange
Messages shall include the agreed standard maintained code lists as defined in the
User Manual. Where such code lists are not available, preference shall be given
to the use of published and maintained code lists.
10.5.12 Technical Specifications and Requirements
10.5.12.1 User Manual
The user manual should determine all the technical requirements and specifications that are
required in order to properly exchange Electronic Data Interchange messages.
Although it is not easy to provide a list of all the elements which need to be taken into account,
as these will vary according to the needs of the parties, it can be emphasized that relevant
specifications with regard to the following points need to be provided:
The specifications relating to the operational requirements in the clause on OPERATIONAL
REQUIREMENTS FOR ELECTRONIC DATA INTERCHANGE, including:
Specifications required in relation to software and translation software for the purpose of
Electronic Data Interchange exchanges;
Communication protocols and third party services (Value Added Network Services);
Message standards and recommendations, including the list of messages and their
references;
The conditional elements where needed;
The messages design guidelines;
The implementation guidelines;
The directories;
The code lists;
The reference to the documentation;
The versions and updates;
The methods used for storage of transmissions.
The method that they will use to implement updated versions of messages, rules,
guidelines and directories;
291
The specifications required for the processing and acknowledgment of Electronic Data
Interchange messages;
The specifications relating to security means for Electronic Data Interchange messages;
and
The specifications relating to recording and storage, the time limits.
Time limits may be of critical importance in Electronic Data Interchange, in particular when
Electronic Data Interchange is combined with other techniques such as "Just-in-Time.
10.5.12.2 Test and Trial Procedures
Technical experts have made it clear that it may prove not only useful, but also sometimes
necessary, to run tests to ensure the proper working of the systems and telecommunications.
Practice shows that such tests are, in fact, usually conducted by parties commencing use of
Electronic Data Interchange and this generally happens in two steps. Firstly, Electronic Data
Interchange messages are exchanged in parallel with the paper documents and secondly, when
this test is satisfactory, Electronic Data Interchange messages are exchanged without paper
support. It may also be necessary to conduct further tests from time to time, for example after
changes to the system have been implemented.
The parties should ensure that any data sent is free of viruses etc.
Sample Clauses
The User Manual shall include the technical, organizational, and procedural specifications and
requirements to operate Electronic Data Interchange according to the terms of this Agreement,
which includes but is not limited to the following:
Sample Annex
User Manual annexed to
Agreement
no.
dated
1. Time limits:
For processing messages after receipt:
For Acknowledgement of Receipt of the message
292
294
negligence, liability for any direct damages incurred is limited to the maximum amount
of [insert amount and currency].
No Party to this Agreement shall be liable for any loss or damage suffered by the other
Party caused by any delay or failure to perform in accordance with the provisions of this
Agreement, where such delay or failure is caused by an impediment beyond that Partys
control and which could not reasonably be expected to be taken into account at the time
of conclusion of the Agreement or the consequences of which could not be avoided or
overcome. This provision shall not relieve liability for any matter that constitutes a
breach of the Clauses on SECURITY OR PROTECTION OF IN CONFIDENCE
INFORMATION.
If a Party requires another Party to use the services of an intermediary to perform the
transmission, logging or processing of an Electronic Data Interchange Message, the Party
who required such use shall be liable to the other Party for damage arising directly from
that intermediarys acts, failures, or omissions in the provision of said services.
10.5.14 Dispute Resolution
10.5.14.1 Options
In case of disputes resulting from the performance of underlying contracts, the dispute provisions
of such contracts should prevail.
Three dispute resolution options are offered:
1. The first option provides a clause on arbitration.
2. The second option provides a jurisdiction clause, where the choice of a jurisdiction is to
be agreed in the case where the parties decide that dispute will be referred to court.
3. A third option leaves open the choice between arbitration and court of law.
It should perhaps be emphasized that because of the relationships that Electronic Data
Interchange creates between users there is a great potential for dispute to be resolved by
negotiation. It is only when such negotiations fail that the clauses on dispute resolution will
become effective and useful.
10.5.14.2 Arbitration Clause
Parties may wish to decide to resolve their dispute by way of arbitration. Arbitration may prove
a practical procedure to resolve a dispute involving parties of different countries. It offers the
advantage of the choice of arbitrator(s) or of the appointing authority and of a more speedy
procedure although this is not always the rule. It can be attractive for the confidentiality of the
procedure, which is sometimes favored by parties. The arbitration award is in principle final
although appeal is possible.
Many countries still require a written and clear statement on arbitration when this is the choice of
dispute resolution and the parties are therefore advised to include such clause.
295
The clause offered for inclusion in the agreement under option A refers to the rules of
conciliation and arbitration of the International Chamber of Commerce. The parties need to
define how the arbitrator will be nominated. A choice can be made between one or three
person(s) nominated by agreement or in case of failure of an agreement on the arbitrator(s), an
appointing authority can proceed to the nomination. The parties should therefore indicate which
will be the appointing authority. In addition, it can be determined by parties in which language
the arbitration procedure should be conducted.
10.5.14.3 Court of Law
In the case the parties intend to have their litigation solved by a court, the second alternative
provision provides for the parties to choose the competent court and stipulate it in their
agreement. In the case where the parties do no make such a choice, the competent court shall be
determined by reference to e.g., the Convention on jurisdiction and the enforcement of
judgments in civil and commercial matters.
10.5.14.4 0ption C
If parties do not want to exclude up front one of the methods of dispute resolution this option can
be selected.
Sample Clauses
In case of disputes resulting from performance of underlying contracts, the dispute
provision of such contract shall apply.
Option A: Arbitration.
Any disputes between the Parties arising from or relating to this agreement shall be
finally settled in accordance with the conciliation and arbitration of regulations of the
International Chamber of Commerce, by one or more arbitrators appointed in pursuance
of these regulations and there shall be no right of appeal nor recourse of any kind.
Option B: Court of Law.
Any dispute arising out of or in connection with this Agreement shall be referred to the
competent Court of [insert name of country], which shall have sole jurisdiction.
Option C: Arbitration or Court of law.
Unless the Parties agree in writing to submit the matter to arbitration or other procedure
for the resolution of dispute, or to select a different jurisdiction any matter or dispute
arising from, out of or in connection with this Agreement as to its validity, interpretation,
construction or performance shall be subject to sole and exclusive jurisdiction of the
[insert name of country] Court.
10.5.15 Applicable Law
The parties to the agreement should indicate their choice of applicable law
296
Sample Clause
This Agreement is governed by the Law of [insert name of country].
10.5.16 Effect, Modification, Term, and Severability
10.5.16.1 Effect
This article states that the agreement does not come into effect until the parties sign it.
10.5.16.2 Modification
Any modification, addition, or alternative provisions to the agreement should only be made in
writing and agreed by all parties.
10.5.16.3 Termination
The period of one month proposed in this clause regarding termination notice may be extended
by the parties. It is not advised to reduce it as it is considered as a minimum.
The Termination Clause provides that some rights and obligations relating to the agreement are
of fundamental importance and should remain in effect following termination of the agreement.
10.5.16.4 Severability
A paragraph should be inserted to prevent a party from terminating the agreement simply
because one clause has become invalid. It is also intended to prevent parties from terminating an
agreement to avoid certain obligations
Sample Clauses
Effect. The Agreement shall be effective from the date on which it is signed by the
Parties.
Modification. Where required, additional or alternative provisions to the Agreement
including modification to the User Manual, agreed in writing by the Parties, will be
considered as part of the Agreement upon the signature on behalf of the Parties by the
original signatories or their authorized representatives.
Termination. Any Party may terminate the Agreement by giving not less than ...[one]
months notice either by registered post or by any other means (e.g., by an Electronic
Data Interchange Message) agreed between the Parties. Termination of the Agreement
shall only affect Electronic Data Interchange (including Electronic Mail) transactions
after that date. Notwithstanding termination for any reason, the rights and obligations of
the Parties referred to in Clauses ADMISSIBILITY IN EVIDENCE OF ELECTRONIC
DATA INTERCHANGE MESSAGES, SECURITY, PROTECTION OF INCONFIDENCE INFORMATION, DATA-LOG RECORDING AND STORAGE AND
RECONCILIATION OF ELECTRONIC DATA INTERCHANGE MESSAGES,
DISPUTE RESOLUTION and APPLICABLE LAW shall remain in effect.
297
Severability. Should any clause or part of a clause of the Agreement be deemed invalid,
all other clauses shall remain in full force and effect [and the Parties shall agree on a
substitute provision]. All annexes to this Agreement shall be an integral part of the
Agreement.
10.5.17 Signature Page
Sample Clause
For the Minister of Defense
of [insert name of country]
[insert name]
[insert title]
298
299
301
operate and support the Viking Submarines and be based on open, international, or de facto
standards.
Operational level documents of the Through Life Information Management Strategy, which
forms the framework for this program and the Through Life Information Management Plan, are
located at Appendix J and Appendix K respectively.
12.2 The Crusader (US Howits)
The crusader program will produce the US Armys next generation cannon artillery system. Its
objective is to develop and field a revolutionary Cannon Artillery system of systems, consisting
of 155mm Self-Propelled Howitzer and an armored Resupply Vehicle for Force XXI. The prime
contractor is United Defense Limited Partnership, UDLP.
Figures 12-1 and 12-2 show examples of the Internet access to the Project management site.
This site provides a Web based CITIS access for both on post and Off-post users as well as
program management information, milestones and schedules and general information.
Following the figures is a document describing the Programs Integrated Data Environment.
302
303
computerized service that provides the needed environment for Integrated Product Development
(IPD) and virtual co-location of data.
It is expected that the engineering data environment generated in the program will be highly
complex and the shortened timeline will require a level of coordination of effort that is missioncritical. This coordination of effort is compounded by the fact that there will be many companies
involved in the design and fabrication of the Crusader.
View and markup tools supporting the ability to gather and manage multiple reviewers was
deemed necessary, as was workflow, sign-off, and routing mechanisms to improve end-users
productivity and efficiency, prevent the production of paper based data, eliminate duplication of
effort, and provide a fully integrated data environment supporting multiple data types,
throughout the products life-cycle.
A goal of the Crusader IDE is to contain all contractor generated data and GFI, including
engineering, support, and management data. The Contractor is required to deliver all data
electronically.
In addition to providing engineering data delivery, data management, and
configuration management services to the Office of the PM, the Crusader IDE will serve as the
mechanism by which the large, geographically dispersed industry team will share engineering
data. This method of developing the product requires that the team have near-real time access to
information as it is created.
The goal of the Crusader IDE system is to provide this access, ensuring that the most recent data
is identifiable, revision histories are included and is accessible by any member of the team. The
extended scope of the Crusader IDE includes access by the Government to all contractor workin-progress information, rather than merely to contractually deliverable documents - this feature
is an enabler for IPD and, coupled with the integration of cost and schedule data, makes the IDE
a primary tool for overall program management and control.
12.2.2 CALS Technologies, Philosophies, and Standards Implemented
The Crusader IDE was developed under contract as a CITIS (Contractor Integrated Technical
Information Service), initially defined IAW MIL-STD 974, but expanded greatly under PM
Crusader. The Crusader IDE is a robust technical information service that goes beyond
traditional "CITIS" mechanisms, towards a true integrated product environment that includes
procedures, processes, specifications and software applications for the generation, protection,
integration, storage, exchange, and on-line access of digital data.
The Crusader IDE implements the philosophy and intent behind the CALS initiative, by
integrating all program data and allowing concurrent use of real-time, in-process (work-inprogress) data in a virtual co-location scenario. The Crusader IDE Intranet supports a growing
user community involving multiple tiers of Contractors with an initial combination of T1, and
Internet connections. It supports an environment that involves clients with widely diverse data
demands.
The Crusader IDE is an integration of commercial off the shelf (COTS) software that is modular,
scaleable, and capable of adapting to evolving program needs, and includes Product Data
304
Manager (PDM) and document viewer software. The IDE systems integration work done by the
prime contractor and its subcontractors is fully owned by the Government.
The PDM client/server software is integrated with other software to handle core functions such
as Windows 95 desktop access, workflow management, configuration management, and
view/markup. The technical files are represented in an object-oriented data architecture that
graphically mirrors the program WBS and other views into the information such as product
structure, with a relationship-based data model that allows data to be tied to one another via softlinks that support their interrelationships.
Technical files are managed by the metadata, controlled by the PDM engine, supported by
Metaphase Technologies, a division of SDRC. Metaphase is an industry-accepted client/server
PDM. The Crusader IDE is designed for single point access into one logical data system to
ensure the integrity and uniqueness of stored data relationships.
The Crusader IDE architecture employs the PDM to facilitate the combined management of
data, processes, and users and allow information systems architects to define groups, workflows,
and metadata. Additionally, this software allows for tailoring of data workflows and automated
life-cycles, allowing for future growth and expansion as the program matures from PDRR to
EMD and beyond.
The Crusader IDE architecture (a) makes data easier to find so that users will be less likely to recreate data that already exists, (b) enforces CALS and application standards that help data flow
from one application to another, and (c) provides multiple views into the data repository. An
integrated common toolset includes standard commercial off the shelf (COTS) software for the
generation and management of design models, documentation, and other product information.
MS-Office was chosen as the standard for integration of textual, spreadsheet, and presentation
data. Cost and schedule data are fully integrated and available to the IPD Teams via a desktop
toolset that includes the use of WInsight and OpenPlan.
Pro-Engineer is integrated at a "level 3" which provides for management of the IDE drawing data
from inside the Pro-E tool itself. Other tools integrated include: Rational/Rose/Apex, Adobe
Exchange, RTM/RDD-100, and workflows from CMSTAT. Encryption of sensitive data is
enabled over local and wide area networks, and over the Internet.
12.2.3 Team Members
The Crusader IDE Team consists of members from the Office of PM Crusader, United Defense
Limited Partnership (UDLP), and EDS. Additional participation came from General Dynamics.
Consulting support was obtained from Metaphase/SDRC, CIMdata, Adobe, Parametrics
Technologies, CMSTAT, and other software vendors. NSA, DIS, and ARDEC contributed
guidance on specific areas within the IDE, via the PMs encryption Process Action Team (PAT).
EDS performed the actual IDE systems integration effort under direction from UDLP (the
Crusader prime contractor) and the Government IDE Team members in accordance with the
philosophies and goals of true IPD and teaming. Special support was provided by the EDS onsite technical people, who provided direct support to the end-users, and essential IDE training.
305
306
PMCMS felt that the IDE would lead to electronic vs. actual team meetings, would make team
and corporate knowledge more widely available and accessible, information mobility would
enhance both team and individual responsiveness and that the IDE would facilitate rapid changes
in team size and composition.
The IDE solution at PMCMS links the PMCMS at Warren, MI, the prime contractor, UDLP at
York, PA, the US Army Engineer School at Ft Leonard Wood, MO, TEXCOM at Fort Hood,
TX, Anniston Army Depot, Anniston, AL and other key activities (eleven sites, 165 users).
Using a series of defined workflows PMCMS achieves reduced times to let production contracts,
resolve corrective actions and provide cost avoidance.
Appendix L is an abstract of the PM CMS IDE solution. This paper provides a description of
the effort and lessons learned from the government perspective.
307