At PPC we ensure investments meet OMB and agency requirements through our integrated CPIC Process. Our CPIC professionals are a select group of experts at the top of their field who work closely with clients to design and implement a customized CPIC process to maximize the funding case for a federal IT investment.
PPC's Cloud Realization Services advise our customers on strategies to meet GSA's Cloud First policy. Cloud Roadmapping is how we at PPC get our clients to the Cloud. Our Cloud consulting services help you build for a successful Enterprise Architecture.
This paper describes the V&V approach used to develop several low-resolution multi-purpose simulations of integrated industrial facilities and industrial sectors for a government customer.
Recently, a great deal of attention has been focused on information assurance, which is a relatively new area of interest focused on protecting information infrastructure from internal and external attacks. Much less attention has been focused on the area of environmental assurance. Environmental assurance concentrates on the tools and processes for assuring the protection of the natural environment. The threats to our natural environment are as significant and complex as the threats to our information infrastructure.
Part of the planning process to launch any new tool should include assessing the cultural and emotional impact of the tool and developing a plan to communicate, get buy-in, and set expectations with your user base.
This paper explains how we use Monte Carlo simulation to incorporate uncertainty into cost estimates and provide a range of costs for the cleanup program. After an introduction on cost uncertainty, the paper explains what Monte Carlo simulation is and how it can be used to predict project cost uncertainty. The paper then discusses the results of such analyses.
System dynamics modeling in the professional arena allows for in-depth understanding of how systems work and can help facilitate cost-effective responses.
In today's digital age there is a need to establish and maintain credentials on many connected and disconnected systems, and in turn use these credentials to grant rights or access to users.
Personnel reliability programs (PRPs) are designed to prevent the theft, unauthorized or accidental use of nuclear weapons by assessing the loyalty, trustworthiness, and mental stability of personnel with access to nuclear weapons or weapons-usable nuclear material. In the post-9/11 world, such programs must be re-evaluated world wide as part of a larger assessment of the threat such materials pose to U.S. national security and in choosing an appropriate American response.
Knowing how aportal is being used and mapping usage trends provide empirical evidence of a successful portal initiative.
The value of enterprise storage lies in the intellectual property contained therein. When data is stored and organized in a way that enables an organization to synthesize new information, it drives all the major business processes, applications, and, ultimately, revenue. Business critical applications... add to the bottom line by using knowledge stored in the company’s data.
When an application or computer system is supposed to be running and isn’t, it impacts productivity and costs money. When an application becomes unavailable, the work that it was doing simply stops. At best, such an outage simply results in lost productivity.... High Availability attempts to specify an amount of time as a percentage of the intended duty cycle that a system must be functional.
Orthographic approaches compare two strings in terms of their spelling without reference to how they sound.... We are interested in predicting names that may later be mistakenly associated with an existing name when written.
This volume is a worthwhile investment for anyone involved in process improvement. It is not a book that you pick up, read from cover to cover, and then put on a shelf to gather dust.
Taxonomies can be powerful tools. But too often, their complexity defeats the users they are supposed to help. The business taxonomy offers a simpler alternative.
Assuming data are being analyzed from across the data landscape, commonly used analytical methods are not adequate to truly uncover important patterns and trends.
This paper introduces IT financial management as a critical aspect of an organizational IT strategy. It specifically provides an overview of how costs incurred by the IS enterprise in support of the business units can be recovered. In this discussion, we address the major opportunities, considerations, approaches, and benefits for implementing and/or modifying IT chargeback schemes in an organization.
Having recognised the need for master-data management what is the appropriate architecture for a company?
Without portal governance guiding processes, developing policies and procedures, and maintaining authority, portal projects risk absolute failure.
This white paper compares the capability of the existing DLT 8000 and LTO-1 tape drives with the latest LTO-2 technology for a large business and describes how LTO-2 tape drives can provide twice the performance and capacity of the current system.