SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Programmatic Architecture and the Cross Walk File 1
Using a Cross Walk File to Manage
Givers and Receivers
Ron Powell
Glen Alleman
Rick Price
Joint Space Cost Council
Ball Aerospace and Technologies Corporation
Boulder, Colorado, 21 September 2017
Programmatic Architecture and the Cross Walk File
❻ Steps to Building the Credible IMS
2
WBS
Risk
Register
Master Plan
Deliverable
Need Dates
Master
Schedule(s)
Master
Schedule(s)
Master
Schedule(s)
Master
Schedule(s)
Cross Walk File Connects Dependencies Between Master
Schedule
❻
❺
❹❸
❶
❷
AleatoryEpistemic
Programmatic Architecture and the Cross Walk File
Our Plan Has To Contain
 Who is going to do the work?
 What are the outcomes from this work?
 When does the work need to get performed?
 Where is the work being performed?
 Why are we doing all this?
 How is the work going to actually be
performed?
Our Plan Has To State Outcomes
 Who ‒ Staffing Plan
 What ‒ SOW/SOO/CDRL/WBS
 When ‒ Contract Delivery Dates
 Where ‒ Facilities and Services
 Why ‒ Contract / ConOps
 How ‒ Technical Deliverable Strategy
Six Honest Serving Men, from The Elephant’s
Programmatic Architecture and the Cross Walk File
❹ ‒ How Do We Establish “Need Dates”
Discussion Topics
 What does the Contract say
– How do we know this date is credible?
– How do we establish schedule margin for the date to protect the
contract date?
 At IBR how do you
– Show credibility for all the work, including subcontractor
– Using the SRA to establish margin
– Show how cost is adequate to meet requirements
– Understand the risks and their mitigations
5
Programmatic Architecture and the Cross Walk File
❺ ‒ The Integrated Master Schedule(s) …
6
 Show what Done
looks like.
 Show the work
needed to get to
Done.
 Defines the needed
resources to reach
Done
 Identifies risks to
Done and their
handling.
 Measures physical progress toward Done in units
meaningful to the decision makers.
Programmatic Architecture and the Cross Walk File
❻ ‒ Making Interdependencies Visible
7
Simple Representation of an IMS consisting of 4 project files linked serially.
CROSS
WALK FILESEIT Project Plan
Payload Project Plan
Ground Project Plan
Launch Project Plan
Output TO Payload
FROM SEIT
Input from SEIT
FOR Payload
Output TO Ground
FROM Payload
Input from Payload
FOR Ground
Input from Ground
FOR Launch
Output TO Launch
FROM Ground
Integrated Master Schedule
Each line represents an external link
between project files
Programmatic Architecture and the Cross Walk File
❻ ‒ Cross Walk Path
 Connections between Microsoft Project files are isolated through
the Cross Walk file to prevent accidental loops from being
introduced while the horizontal connections are developed.
– The inter-event margin between these program event files can be
placed in the cross walk file for easy management and visibility.
8
CROSSWALK
EVENT A
Shared Connection
Schedule Margin
Receiving Milestone
Send Milestone
AC SA
AC AC
AC
Inbound
Outbound
EVENT W
– The entire critical
path for the
program—through
all individual
program event
files—can be seen in
the cross walk file.
– Work on each program event file
can take place in parallel for
maximum efficiency of the
planning staff.
Programmatic Architecture and the Cross Walk File
The Problem with Distributed Planning and
Controls
 Individual .MPP files built by planner need to be integrated into a
submittal for the IMS section of the PMB
 Building the IMS is an iterative and incremental process
– Gather the data one step at a time
 Divide the program into segments, for example
– CDR and Before
– Post-CDR: Fabrication and Test
– Assembly, Integration Test and Operations
 Always keep the Events “in the box” at the end of every day
 Keep all work to the left of the Event with a Deadline
9
Programmatic Architecture and the Cross Walk File
Linking Program Events Vertically Across
Individual IMP Files
10
Programmatic Architecture and the Cross Walk File
Why A Crosswalk File?
 By using a crosswalk file between these links, we are able to:
– Stop unnecessary schedule turmoil before it propagates through entire
network,
» No one schedule can impact the other schedules without permission /
knowledge of crosswalk file owner
» No changes in one file will impact the work in other files until the Cross
Walk file is updated and republished
– Better management of the the triggers that keep the files in sync with
each other,
– Create a mechanism to manage the time (aka slack) between promised
delivery dates and actual need by dates of deliverables,
– Creates a mechanism for explicit margin to be added and managed
between project plans
11
Programmatic Architecture and the Cross Walk File
Discussion Topics
 How are multiple IMS’s being handled today?
– IPTs
– Subcontractors
 How is multiple change control processes being handled today?
 How is the critical path managed across and between IPTs today?
 How can a Cross Walk paradigm improve
– Visibility to interdependencies
– Manage schedule margin
– Show end-to-end Critical Path
– Provide visibility to Alternative Points of Incorporation
12

Weitere ähnliche Inhalte

Ähnlich wie Using a Crosswalk File to Manage Givers and Receivers

Introduction to WorksLink
Introduction to WorksLinkIntroduction to WorksLink
Introduction to WorksLinkAndrew McGrath
 
3c66a73971f4307a1e447e4bf76e0c3d_MIT1_040s09_lec02.pdf
3c66a73971f4307a1e447e4bf76e0c3d_MIT1_040s09_lec02.pdf3c66a73971f4307a1e447e4bf76e0c3d_MIT1_040s09_lec02.pdf
3c66a73971f4307a1e447e4bf76e0c3d_MIT1_040s09_lec02.pdfNanoSana
 
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...Faster, more Secure Application Modernization and Replatforming with PKS - Ku...
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...VMware Tanzu
 
SathishKumar Natarajan
SathishKumar NatarajanSathishKumar Natarajan
SathishKumar NatarajanSathish Kumar
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
Resume Aden bahdon
Resume Aden bahdonResume Aden bahdon
Resume Aden bahdonAden Bahdon
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final DocumentationJennifer Cordes
 
Tejaswi Desai Resume ASP Dot Net WPF WCF MVC LINQ Agile
Tejaswi Desai Resume ASP Dot Net WPF WCF MVC LINQ AgileTejaswi Desai Resume ASP Dot Net WPF WCF MVC LINQ Agile
Tejaswi Desai Resume ASP Dot Net WPF WCF MVC LINQ AgileTejaswi Desai
 
Web Site Development - Project Proposal
Web Site Development - Project ProposalWeb Site Development - Project Proposal
Web Site Development - Project ProposalNoel Flowers
 
Breaking the Monolith
Breaking the MonolithBreaking the Monolith
Breaking the MonolithVMware Tanzu
 
CNCF Introduction - Feb 2018
CNCF Introduction - Feb 2018CNCF Introduction - Feb 2018
CNCF Introduction - Feb 2018Krishna-Kumar
 

Ähnlich wie Using a Crosswalk File to Manage Givers and Receivers (20)

Introduction to WorksLink
Introduction to WorksLinkIntroduction to WorksLink
Introduction to WorksLink
 
Harish Srivastava -Resume
Harish Srivastava -ResumeHarish Srivastava -Resume
Harish Srivastava -Resume
 
LaMima Gilbert Lewis PM
LaMima Gilbert Lewis PMLaMima Gilbert Lewis PM
LaMima Gilbert Lewis PM
 
Shillum "Building for the Future: Interoperability"
Shillum "Building for the Future: Interoperability"Shillum "Building for the Future: Interoperability"
Shillum "Building for the Future: Interoperability"
 
Resume Shirley 2015
Resume Shirley 2015Resume Shirley 2015
Resume Shirley 2015
 
Lakshmankumar_Resume
Lakshmankumar_ResumeLakshmankumar_Resume
Lakshmankumar_Resume
 
3c66a73971f4307a1e447e4bf76e0c3d_MIT1_040s09_lec02.pdf
3c66a73971f4307a1e447e4bf76e0c3d_MIT1_040s09_lec02.pdf3c66a73971f4307a1e447e4bf76e0c3d_MIT1_040s09_lec02.pdf
3c66a73971f4307a1e447e4bf76e0c3d_MIT1_040s09_lec02.pdf
 
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...Faster, more Secure Application Modernization and Replatforming with PKS - Ku...
Faster, more Secure Application Modernization and Replatforming with PKS - Ku...
 
SathishKumar Natarajan
SathishKumar NatarajanSathishKumar Natarajan
SathishKumar Natarajan
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
3 - Using MS Project 12-05-17.pptx
3 - Using MS Project 12-05-17.pptx3 - Using MS Project 12-05-17.pptx
3 - Using MS Project 12-05-17.pptx
 
Resume Aden bahdon
Resume Aden bahdonResume Aden bahdon
Resume Aden bahdon
 
MichaelRichardsonResume2016
MichaelRichardsonResume2016MichaelRichardsonResume2016
MichaelRichardsonResume2016
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final Documentation
 
Tejaswi Desai Resume ASP Dot Net WPF WCF MVC LINQ Agile
Tejaswi Desai Resume ASP Dot Net WPF WCF MVC LINQ AgileTejaswi Desai Resume ASP Dot Net WPF WCF MVC LINQ Agile
Tejaswi Desai Resume ASP Dot Net WPF WCF MVC LINQ Agile
 
Web Site Development - Project Proposal
Web Site Development - Project ProposalWeb Site Development - Project Proposal
Web Site Development - Project Proposal
 
Kincaid86 - 2
Kincaid86 - 2Kincaid86 - 2
Kincaid86 - 2
 
Breaking the Monolith
Breaking the MonolithBreaking the Monolith
Breaking the Monolith
 
CNCF Introduction - Feb 2018
CNCF Introduction - Feb 2018CNCF Introduction - Feb 2018
CNCF Introduction - Feb 2018
 

Mehr von Glen Alleman

Managing risk with deliverables planning
Managing risk with deliverables planningManaging risk with deliverables planning
Managing risk with deliverables planningGlen Alleman
 
A Gentle Introduction to the IMP/IMS
A Gentle Introduction to the IMP/IMSA Gentle Introduction to the IMP/IMS
A Gentle Introduction to the IMP/IMSGlen Alleman
 
Increasing the Probability of Project Success
Increasing the Probability of Project SuccessIncreasing the Probability of Project Success
Increasing the Probability of Project SuccessGlen Alleman
 
Process Flow and Narrative for Agile+PPM
Process Flow and Narrative for Agile+PPMProcess Flow and Narrative for Agile+PPM
Process Flow and Narrative for Agile+PPMGlen Alleman
 
Practices of risk management
Practices of risk managementPractices of risk management
Practices of risk managementGlen Alleman
 
Principles of Risk Management
Principles of Risk ManagementPrinciples of Risk Management
Principles of Risk ManagementGlen Alleman
 
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...Glen Alleman
 
From Principles to Strategies for Systems Engineering
From Principles to Strategies for Systems EngineeringFrom Principles to Strategies for Systems Engineering
From Principles to Strategies for Systems EngineeringGlen Alleman
 
NAVAIR Integrated Master Schedule Guide guide
NAVAIR Integrated Master Schedule Guide guideNAVAIR Integrated Master Schedule Guide guide
NAVAIR Integrated Master Schedule Guide guideGlen Alleman
 
Building a Credible Performance Measurement Baseline
Building a Credible Performance Measurement BaselineBuilding a Credible Performance Measurement Baseline
Building a Credible Performance Measurement BaselineGlen Alleman
 
Integrated master plan methodology (v2)
Integrated master plan methodology (v2)Integrated master plan methodology (v2)
Integrated master plan methodology (v2)Glen Alleman
 
IMP / IMS Step by Step
IMP / IMS Step by StepIMP / IMS Step by Step
IMP / IMS Step by StepGlen Alleman
 
DHS - Using functions points to estimate agile development programs (v2)
DHS - Using functions points to estimate agile development programs (v2)DHS - Using functions points to estimate agile development programs (v2)
DHS - Using functions points to estimate agile development programs (v2)Glen Alleman
 
Making the impossible possible
Making the impossible possibleMaking the impossible possible
Making the impossible possibleGlen Alleman
 
Heliotropic Abundance
Heliotropic AbundanceHeliotropic Abundance
Heliotropic AbundanceGlen Alleman
 
Capabilities based planning
Capabilities based planningCapabilities based planning
Capabilities based planningGlen Alleman
 
Process Flow and Narrative for Agile
Process Flow and Narrative for AgileProcess Flow and Narrative for Agile
Process Flow and Narrative for AgileGlen Alleman
 
Building the Performance Measurement Baseline
Building the Performance Measurement BaselineBuilding the Performance Measurement Baseline
Building the Performance Measurement BaselineGlen Alleman
 
Program Management Office Lean Software Development and Six Sigma
Program Management Office Lean Software Development and Six SigmaProgram Management Office Lean Software Development and Six Sigma
Program Management Office Lean Software Development and Six SigmaGlen Alleman
 
Policy and Procedure Rollout
Policy and Procedure RolloutPolicy and Procedure Rollout
Policy and Procedure RolloutGlen Alleman
 

Mehr von Glen Alleman (20)

Managing risk with deliverables planning
Managing risk with deliverables planningManaging risk with deliverables planning
Managing risk with deliverables planning
 
A Gentle Introduction to the IMP/IMS
A Gentle Introduction to the IMP/IMSA Gentle Introduction to the IMP/IMS
A Gentle Introduction to the IMP/IMS
 
Increasing the Probability of Project Success
Increasing the Probability of Project SuccessIncreasing the Probability of Project Success
Increasing the Probability of Project Success
 
Process Flow and Narrative for Agile+PPM
Process Flow and Narrative for Agile+PPMProcess Flow and Narrative for Agile+PPM
Process Flow and Narrative for Agile+PPM
 
Practices of risk management
Practices of risk managementPractices of risk management
Practices of risk management
 
Principles of Risk Management
Principles of Risk ManagementPrinciples of Risk Management
Principles of Risk Management
 
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...
 
From Principles to Strategies for Systems Engineering
From Principles to Strategies for Systems EngineeringFrom Principles to Strategies for Systems Engineering
From Principles to Strategies for Systems Engineering
 
NAVAIR Integrated Master Schedule Guide guide
NAVAIR Integrated Master Schedule Guide guideNAVAIR Integrated Master Schedule Guide guide
NAVAIR Integrated Master Schedule Guide guide
 
Building a Credible Performance Measurement Baseline
Building a Credible Performance Measurement BaselineBuilding a Credible Performance Measurement Baseline
Building a Credible Performance Measurement Baseline
 
Integrated master plan methodology (v2)
Integrated master plan methodology (v2)Integrated master plan methodology (v2)
Integrated master plan methodology (v2)
 
IMP / IMS Step by Step
IMP / IMS Step by StepIMP / IMS Step by Step
IMP / IMS Step by Step
 
DHS - Using functions points to estimate agile development programs (v2)
DHS - Using functions points to estimate agile development programs (v2)DHS - Using functions points to estimate agile development programs (v2)
DHS - Using functions points to estimate agile development programs (v2)
 
Making the impossible possible
Making the impossible possibleMaking the impossible possible
Making the impossible possible
 
Heliotropic Abundance
Heliotropic AbundanceHeliotropic Abundance
Heliotropic Abundance
 
Capabilities based planning
Capabilities based planningCapabilities based planning
Capabilities based planning
 
Process Flow and Narrative for Agile
Process Flow and Narrative for AgileProcess Flow and Narrative for Agile
Process Flow and Narrative for Agile
 
Building the Performance Measurement Baseline
Building the Performance Measurement BaselineBuilding the Performance Measurement Baseline
Building the Performance Measurement Baseline
 
Program Management Office Lean Software Development and Six Sigma
Program Management Office Lean Software Development and Six SigmaProgram Management Office Lean Software Development and Six Sigma
Program Management Office Lean Software Development and Six Sigma
 
Policy and Procedure Rollout
Policy and Procedure RolloutPolicy and Procedure Rollout
Policy and Procedure Rollout
 

Kürzlich hochgeladen

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Kürzlich hochgeladen (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Using a Crosswalk File to Manage Givers and Receivers

  • 1. Programmatic Architecture and the Cross Walk File 1 Using a Cross Walk File to Manage Givers and Receivers Ron Powell Glen Alleman Rick Price Joint Space Cost Council Ball Aerospace and Technologies Corporation Boulder, Colorado, 21 September 2017
  • 2. Programmatic Architecture and the Cross Walk File ❻ Steps to Building the Credible IMS 2 WBS Risk Register Master Plan Deliverable Need Dates Master Schedule(s) Master Schedule(s) Master Schedule(s) Master Schedule(s) Cross Walk File Connects Dependencies Between Master Schedule ❻ ❺ ❹❸ ❶ ❷ AleatoryEpistemic
  • 3. Programmatic Architecture and the Cross Walk File Our Plan Has To Contain  Who is going to do the work?  What are the outcomes from this work?  When does the work need to get performed?  Where is the work being performed?  Why are we doing all this?  How is the work going to actually be performed?
  • 4. Our Plan Has To State Outcomes  Who ‒ Staffing Plan  What ‒ SOW/SOO/CDRL/WBS  When ‒ Contract Delivery Dates  Where ‒ Facilities and Services  Why ‒ Contract / ConOps  How ‒ Technical Deliverable Strategy Six Honest Serving Men, from The Elephant’s
  • 5. Programmatic Architecture and the Cross Walk File ❹ ‒ How Do We Establish “Need Dates” Discussion Topics  What does the Contract say – How do we know this date is credible? – How do we establish schedule margin for the date to protect the contract date?  At IBR how do you – Show credibility for all the work, including subcontractor – Using the SRA to establish margin – Show how cost is adequate to meet requirements – Understand the risks and their mitigations 5
  • 6. Programmatic Architecture and the Cross Walk File ❺ ‒ The Integrated Master Schedule(s) … 6  Show what Done looks like.  Show the work needed to get to Done.  Defines the needed resources to reach Done  Identifies risks to Done and their handling.  Measures physical progress toward Done in units meaningful to the decision makers.
  • 7. Programmatic Architecture and the Cross Walk File ❻ ‒ Making Interdependencies Visible 7 Simple Representation of an IMS consisting of 4 project files linked serially. CROSS WALK FILESEIT Project Plan Payload Project Plan Ground Project Plan Launch Project Plan Output TO Payload FROM SEIT Input from SEIT FOR Payload Output TO Ground FROM Payload Input from Payload FOR Ground Input from Ground FOR Launch Output TO Launch FROM Ground Integrated Master Schedule Each line represents an external link between project files
  • 8. Programmatic Architecture and the Cross Walk File ❻ ‒ Cross Walk Path  Connections between Microsoft Project files are isolated through the Cross Walk file to prevent accidental loops from being introduced while the horizontal connections are developed. – The inter-event margin between these program event files can be placed in the cross walk file for easy management and visibility. 8 CROSSWALK EVENT A Shared Connection Schedule Margin Receiving Milestone Send Milestone AC SA AC AC AC Inbound Outbound EVENT W – The entire critical path for the program—through all individual program event files—can be seen in the cross walk file. – Work on each program event file can take place in parallel for maximum efficiency of the planning staff.
  • 9. Programmatic Architecture and the Cross Walk File The Problem with Distributed Planning and Controls  Individual .MPP files built by planner need to be integrated into a submittal for the IMS section of the PMB  Building the IMS is an iterative and incremental process – Gather the data one step at a time  Divide the program into segments, for example – CDR and Before – Post-CDR: Fabrication and Test – Assembly, Integration Test and Operations  Always keep the Events “in the box” at the end of every day  Keep all work to the left of the Event with a Deadline 9
  • 10. Programmatic Architecture and the Cross Walk File Linking Program Events Vertically Across Individual IMP Files 10
  • 11. Programmatic Architecture and the Cross Walk File Why A Crosswalk File?  By using a crosswalk file between these links, we are able to: – Stop unnecessary schedule turmoil before it propagates through entire network, » No one schedule can impact the other schedules without permission / knowledge of crosswalk file owner » No changes in one file will impact the work in other files until the Cross Walk file is updated and republished – Better management of the the triggers that keep the files in sync with each other, – Create a mechanism to manage the time (aka slack) between promised delivery dates and actual need by dates of deliverables, – Creates a mechanism for explicit margin to be added and managed between project plans 11
  • 12. Programmatic Architecture and the Cross Walk File Discussion Topics  How are multiple IMS’s being handled today? – IPTs – Subcontractors  How is multiple change control processes being handled today?  How is the critical path managed across and between IPTs today?  How can a Cross Walk paradigm improve – Visibility to interdependencies – Manage schedule margin – Show end-to-end Critical Path – Provide visibility to Alternative Points of Incorporation 12

Hinweis der Redaktion

  1. There are many ways to remember what is needed in a good schedule and the plan that starts the schedule. Here’s a simple one. Rudyard Kipling's poem The Elephants Child contains a list that he used as a reporter. This list is the basis of our test for a good schedule. These six trusted friends should be obvious in any schedule to build or look at: Who is doing the work is in the resource pool and the assignment of those resources to the work. What are the outcomes are deliverables from the work. These deliverables are tangible evidence that the work has accomplished what it was planned to do. This evidence is meaningful to the consumers of the project. When doe this work take place is shown in the sequence of work package in the schedule. Work Packages are much better that Tasks. Work Packages result in outcomes that say their name. They are Packages of Work. Tasks simply show the consumption of time and resources. Where the work is being performed can be used for locality, functional departments, or similar information. Why must be answered through a description of the needed capabilities for the project to fulfill its mission. There must be a reason for every requirement, every action, every expense. How the work is performed must be described in the narrative associated with the Work Packages and the Work Breakdown Structure.
  2. There are many ways to remember what is needed in a good schedule and the plan that starts the schedule. Here’s a simple one. Rudyard Kipling's poem The Elephants Child contains a list that he used as a reporter. This list is the basis of our test for a good schedule. These six trusted friends should be obvious in any schedule to build or look at: Who is doing the work is in the resource pool and the assignment of those resources to the work. What are the outcomes are deliverables from the work. These deliverables are tangible evidence that the work has accomplished what it was planned to do. This evidence is meaningful to the consumers of the project. When doe this work take place is shown in the sequence of work package in the schedule. Work Packages are much better that Tasks. Work Packages result in outcomes that say their name. They are Packages of Work. Tasks simply show the consumption of time and resources. Where the work is being performed can be used for locality, functional departments, or similar information. Why must be answered through a description of the needed capabilities for the project to fulfill its mission. There must be a reason for every requirement, every action, every expense. How the work is performed must be described in the narrative associated with the Work Packages and the Work Breakdown Structure.
  3. The perfect schedule has some attributes we need to understand before we start. The schedule tells us what DONE looks like in units of measures meaningful to the decision makers. This phrase units of measure meaningful to the decision makers will be at the heart of everything we do today. The schedule shows us what work needs to be done to produce the outcomes needed for the project to be successful. Actually it shows us the work that needs to be done that increases the probability of success for the project – since all project work is probabilistic. The schedule shows us what resources are needed to do that work. The schedule must show us what are the impediments to performing that work. What are the risks to the project’s success. And finally the schedule shows us how we are measuring the tangible evidence of progress to our plan. This evidence and these measures are usually not part of the traditional approach to scheduling. In that traditional approach, work is planned left to right, resources assigned – you do have a resource loaded schedule right?. And then that work is executed. What we’re going to learn today is that another paradigm is needed in order to increase the probability of success. This paradigm is called the Integrated Master Plan or IMP. The IMP is used – and many times mandated in large defense and NASA programs. But it is also found in Enterprise IT programs. Project like ERP.
  4. Lockheed Martin Proprietary Information