Edge Enabled Systems 19 May 2010 The Problem Traditional military - - PowerPoint PPT Presentation

edge enabled systems
SMART_READER_LITE
LIVE PREVIEW

Edge Enabled Systems 19 May 2010 The Problem Traditional military - - PowerPoint PPT Presentation

U.S. Army Research, Development and Engineering Command Edge Enabled Systems 19 May 2010 The Problem Traditional military systems are developed and fielded by programs of record Adhere to strict acquisition policy (DoD 5000)


slide-1
SLIDE 1

U.S. Army Research, Development and Engineering Command

Edge Enabled Systems

19 May 2010

slide-2
SLIDE 2

The Problem

Traditional military systems are developed and fielded by programs of record – Adhere to strict acquisition policy (DoD 5000) – Discourage modifications by users in the field For good reasons: performance, security, availability, etc. But… Today’s Warfighters are engaged in asymmetric warfare, against a highly networked and agile enemy – Rely more than ever on information technology – Must adapt to changes in their environment and enemy tactics These are conflicting!

slide-3
SLIDE 3

The Solution

Warfighters have substantial and ever-increasing levels of technical skills – Some are capable of modifying systems in response to needs that were not anticipated by their designers

Software the Warfighter uses must be adaptable

slide-4
SLIDE 4

The Solution Cont’d

We need to facilitate creativity and innovation “at the edge” without compromising core system qualities p g y q We call this Edge Enabled Systems (EESs)

slide-5
SLIDE 5

The Rise of the Netw ork

Yochai Benkler’s The Wealth of Networks:

  • we are in the midst of a “radical

transformation” of how we create our information environment

  • this transformation is

restructuring society; models of production and consumption production and consumption

  • Benkler calls this commons-

based peer production p p

slide-6
SLIDE 6

Service-Dominant Logic

  • Service industries account for 55% of economic activity in

the United States t e U ted States Businesses have moved from a goods dominant view to a

  • Businesses have moved from a goods-dominant view, to a

service-dominant view

  • In this new view customers are seen as co-creators of value
slide-7
SLIDE 7

A Sea Change

  • These changes are much more than just a shift from goods

to services to se ces They are a reframing of the purpose of the enterprise and its

  • They are a reframing of the purpose of the enterprise and its

role in value creation

  • They are creating new phenomena, e.g. super-linear growth

in projects emergent behaviors in systems in projects, emergent behaviors in systems…

slide-8
SLIDE 8

Implications for the DoD

  • All change introduces risk, and all change is disruptive
  • Edge enablement is especially disruptive to an
  • rganization such as the Army where the consequences
  • rganization such as the Army where the consequences
  • f risk may be life and death
  • Inhibitors:

– Established Practices – Cultural Disconnect – Information Assurance and Policy – Security and Classifications

slide-9
SLIDE 9

A New Model

  • We suggest that a new model of

gg software creation is needed, based on the Metropolis Model

  • This model helps us think about

system creation that is system creation that is commons-based and peer produced: p

– MySpace, YouTube, Twitter, Facebook, Hi5, Wikipedia, Orkut, Craigslist Craigslist, …

slide-10
SLIDE 10

Metropolis Systems

All successful EESs and organizations share a common structure:

Masses

common structure:

A Metropolis structure: – the core ensures critical

(P (E (C Periphery (D

system qualities – users (developers,

Core Prosumers) End User) Customers) evelopers)

prosumers) are enabled at the edge

slide-11
SLIDE 11

Metropolis Model Characteristics 1. Mashability 2. Conflicting, Unknowable Requirements 3. Continuous Evolution 4. Focus on Operations 5. Open Teams 6. Sufficient Correctness 7. Unstable Resources 8. Emergent Behaviors

slide-12
SLIDE 12

Managing the Edge

  • What mechanisms can be employed for facilitating the edge?
  • What are their advantages and disadvantages?
slide-13
SLIDE 13

Mechanisms for Managing the Edge

  • Configuration

Configuration

  • Scripting
  • Application Platforms

Application Platforms

  • Sandbox
  • Qualification

Qualification

  • Monitoring
  • Adaptive Need-to-know Information Access

Adaptive Need to know Information Access

slide-14
SLIDE 14

A New Model of Softw are Development and Acquisition

  • The “Edge” is the intersection between users and their operating

environments

  • If future systems are to be EESs then the organizations that are tasked

to build these systems must change.

slide-15
SLIDE 15

Recommendations

  • Leadership and Management
  • Project Structure and Communications
  • Requirements Management
  • Quality Assurance
  • Architecture
  • Delivery Mechanisms
slide-16
SLIDE 16

Moving Forw ard

  • An EES creates operational risks, as compared with the

“locked down” systems of today “locked down” systems of today

  • A locked-down system also creates risks—from being

poorly aligned with the needs of the Warfighter poorly aligned with the needs of the Warfighter

slide-17
SLIDE 17

Resulting Questions

  • How adaptable should the system be?

Wh t d l t i i l h ld b l d t i t i t

  • What development principles should be employed to maintain to ensure

EESs?

  • What project management procedures and methods should be applied

p j g p pp to EESs?

  • What fundamental changes must occur in the QA process during fielding

and operating of an EES? and operating of an EES?

  • What fundamental changes must occur in the acquisition organization

and their processes?

  • Does an organization provide additional incentives to the participants?
slide-18
SLIDE 18

Recommendations

  • To make progress in enabling the edge we believe a documented,

repeatable method is required, including: – a classification of edge problems and selection of problems for experimentation empirical analysis of EES mechanisms – empirical analysis of EES mechanisms – development of an Edge design and evaluation methodology