Data and Services Deployment (DSD)
Secured Availability (SA)
Shared Infrastructure Environment
Computing Infrastructure Readiness (CIR)
Communications Readiness (CR)
NetOps Agility (NOA)
Overview and Summary Information (AV-1)
Integrated Dictionary (AV-2)
DoD IE Vision (CV-1)
Capability Taxonomy (CV-2)
Capability to Operational Activities Mapping (CV-6)
Capability to Services Mapping (CV-7)
High-Level Operational Concept Graphic (OV-1)
Operational Activity Decomposition Tree (OV-5a)
Operational Rules Model (OV-6a)
Services Context Description (SvcV-1)
Services Functionality Description (SvcV-4)
Standards Profile (Std V-1)
IE Capabilities Description
Achieving a rich information environment demands a cultural shift regarding how information is considered. Today’s data silos support an approach in which information is hidden and hoarded. Meeting the needs of unanticipated users requires information to be visible and shared. The world wherein information is power is shifting to a culture that embraces and leverages the power of information.
The net-centric vision assumes a rich information sharing environment in which data and services will be widely available, easily discoverable, usable and trusted across the GIG. Sufficient context will be available to understand the data and services that are available and to determine suitability for a particular purpose. All data and services that exist will be visible and accessible. As a result, information stovepipes will be eliminated and decision-making agility and speed increased. Regardless of time or place, users will be able to say, “I can get the information I need to perform my mission.”
The DSD priority focuses the Department on the challenges of transforming its approach from deployment of systems to the delivery of information and services and provides definitions, rules and principles that will guide us in achieving the net-centric vision.
Enabling the Data and Services Environment
Services and support for information providers and consumers must ensure information in a net-centric environment is secure, properly available and effectively used. Different ways to fund and sustain IT solutions will be required as DoD increasingly seeks shared information, solutions, processes and resources. Near-term issues include:
Definition: Defense Information Enterprise
The DoD CIO governed Defense Information Enterprise enables a new, net-centric way of working – it is constructed from the information itself, as well as a set of standards, services and procedures that enable information to be widely available to authorized users. It is a set of services and tools that provide information and capabilities that enable end-user communities to more effectively and efficiently support mission operations. Finally, the Defense Information Enterprise includes the networks over which information travels and the security protocols that protect it.
Communities of Interest must decide the specific information their users need to perform their missions. Each community must determine, design and implement solutions based on business process review and engineering efforts that leverage enterprise resources to meet mission needs.
As the net-centric environment evolves, an ever increasing number of information services will become available to users across DoD. It will be critical to maintain acceptable and measurable levels of support for all Enterprise capabilities. Users will have certain expectations regarding the pedigree, reliability and availability of Enterprise Services, and these attributes should be consistent across all such services. Being able to do this requires Enterprise Services to be defined and characterized.
An Enterprise Service is any capability provided for broad use across the Department of Defense that enables awareness of, access to or delivers information across the GIG.
A small set of Enterprise Services, designated as Core Enterprise Services, are mandated for DoD-wide use by the DoD CIO in order to provide enterprise-wide awareness, access and delivery of information via the GIG.
Principles and Business Rules
The principles and rules detailed on the next page define how data and services will be treated in the net-centric environment and, thus, apply to all appropriate DoD IT investments regardless of Component or portfolio.