Earned value project management involves planning work to a manageable level of detail such that it is feasible to allocate a portion of the budget to each planned work unit (work package), and then tracking progress by the accumulated “value” of completed work units. As work is performed, it is “earned” on the same basisRead More
CSIAC Reports
CSIAC reports offer timely cutting-edge information to address the needs of our user community. CSIAC provides a variety of products developed by our subject matter experts (SMEs) in response to gap analyses and specific DoD stakeholder requirements related to our technical focus areas. Here you will find a variety of document types including State-Of-The-Art Reports (SOARs), technical study results, CSIAC Podcast papers, Quick-to-Community (QTC) reports, process documents, and guidelines. CSIAC's goal is to provide relevant products to meet your cybersecurity, software development, information management and modeling & simulation needs.
Wireless Wide Area Network (WWAN) Security
(.mil/.gov ONLY) Over the past few years, the use of wireless data devices, such as the BlackBerry unit by Research In Motion (RIM), has greatly increased within the Federal Government. The need for accessing E-mail remotely has been the primary market driver for this growth although device-to-device communications has also been a significant contributor. Nevertheless,Read More
Embedded Software Maintenance
The goal of this report is to describe the state-of-the-art of embedded software maintenance and provide a glimpse of state-of-the-practice embedded maintenance practices. Section 2 introduces the area of embedded software based on embedded systems, the implication of embedded software and some of its characteristics. Section 3 describes the more general area of software maintenance,Read More
Agile Software Development
The purpose of this report is to address this interest and provide a comprehensive overview of the current State-of-the-Art as well as State-of-the-Practice for Agile Methods. The first section discusses the history behind the trend, as well as the Agile Manifesto, a statement from the leaders of the Agile movement. The second section represents theRead More
Network Centric Warfare
(.mil/.gov ONLY) This report is the second in a series, which identifies key metrics for measuring the effects of network centric warfare (NCW). Volume I introduced two sets of metrics associated with the Reason (i.e., Command and Control) and Physical Spheres of warfare, and made specific recommendations for how the Navy and Joint communities couldRead More
Exploring Biotechnology: Opportunities for the Department of Defense
(.mil/.gov ONLY) Biotechnology has revolutionary potential for a broad range of U.S. military capabilities. Further, because of the United State’s unparalleled lead in research and development, biotechnology presents the opportunity to recast the framework of military operations and create a long term U.S. advantage in the global strategic environment. Biotechnology applications range from enhancing humanRead More
Malicious Code
(.mil/.gov ONLY) This SOAR updates earlier reports to DoD on the subject of malicious code, describes common detection, and prevention techniques, and provides pointers to resources for enhancing organizational information security. This update was considered necessary because, over the past three years, there have been numerous malicious code incidents spread through E-mail and the Internet,Read More
Software Tools for Knowledge Management
A variety of software tools for knowledge management have become available, some commercial and some academic. Not all tools that are labeled KM tools are indeed KM tools; their vendors attempt to make them more attractive by attaching this buzzword to them. The KM tools generally provide features such as search and database maintenance, intranetRead More
Knowledge Management in Software Engineering
Is knowledge management one of those hyped concepts that rise quickly, ambitiously claims to cure organizational headaches and then fails and falls quietly? Or is it an instrument that will really help organizations address some of the problems they face while trying to achieve their business objectives? In particular, is knowledge management valuable to softwareRead More
Verification, Validation, and Accreditation (VV&A) Automated Support Tools, A State of the Art Report: Part 2 – Details
This MSIAC State of the Art Report, divided into two parts, provides a compendium and an analysis of COTS, GOTS, and developmental automated tools that can be applied to the verification, validation, and accreditation (VV&A) of individual models and simulations (M&S) or of systems of models and simulations. This report, “Part 2 – Details”, ofRead More