Aerospace and Defense
Wharton School's knowledge source on Aerospace and Defense industry.
- RFID Tracks Military Supplies
- Security Experts Worried about Military Chips from Offshore
RFID TRACKS MILITARY SUPPLIES
The U.S. military's operations depend on the timely and efficient
movement of supplies and equipment around the world, whether the
country is at war or conducting peacetime operations. Radio
frequency identification tags (RFID) are the standard to track and manage the
military supply chain.
The wars in Iraq and Afghanistan, and the pressure they place on
the supply chain, have put the spotlight on RFID technology.
Read more? Go here.
SECURITY EXPERTS WORRIED ABOUT MILITARY CHIPS
The Pentagon spends millions of dollars annually on integrated circuits to control its military
gear manufactured in facilities secured by American companies
according to an article in The New York Times.
Cybersecurity experts, and current and
former military planners worry that malicious code, called
Trojan horses, can easily be embedded within the military chips from offshore.
Read more? Go here.
Systems Engineering
- System Engineering Directorate
- System engineering projects
- SE Modeling and Graphical Representations
SYSTEM ENGINEERING DIRECTORATE
The Office of the Deputy Assistant Secretary of Defense for Systems Engineering (ODASD(SE)) is responsible for the use of systems engineering in the Department of Defense acquisition process. It includes the offices of Major Program Support,
Mission Assurance, and System Analysis.
SYSTEM ENGINEERING PROJECTS
Judith M. Myerson has published more than 100 articles/reports on system engineering projects.
SE MODELING AND GRAPHICAL REPRESENTATIONS
Custom graphic representations are available for:
-
Functional Flow Block Diagram
-
Data Flow Diagram
-
UML Use case diagram
-
UML Sequence diagram
-
USL Function Maps and Type Maps
Technical Services
- Executive Briefs
- Governance, Risk and Compliance
- Technical Communication
- System/Software Engineering Manuals
EXECUTIVE BRIEFS
Many executives are too busy to read
lengthy reports. They need briefs in plain English to help them to make timely
decisions in a multi-priority environment. The trend shows
that more and more executives opt for the PowerPoint slides.
Use Case Study: Judith M. Myerson prepared highly effective presentation for the DISA
chief for system engineering discussion on vulnerabilities. As a result, I contributed to the first and later
versions of the NECC SLA Template
GOVERNANCE, RISK AND COMPLIANCE
- Securing and integrating RFID technologies
- DIACAP mapping to FISMA
- Risk /Vulnerability Assessments
- Quality Assurance reports
- Business Impact Analysis
TECHNICAL COMMUNICATION
We write, edit and speak on a wide range of IT technologies and
networking topics geared to specific needs of enterprise
stakeholders -- users, developers, engineers, business analysts and
executives.
- Strategic and life cycle planning
- System, software and network configuration controls
- Marketing and forecasting reports
- System engineering modeling and graphical representations
- Custom reports
Service Level Agreement
- Net-Enabled Command Capability (NECC) Annex SLA Template
- RFID applications
NECC Annex to SLA Template
A DISA chief discovered Judith M. Myerson's article on "Mitigate risks with vulnerabilities
with a SLA guarantee" as the "great one!" She was invited to send him PowerPoint slides on performance metrics for system engineering discussion with his team and then contribute to the first and later versions of the NECC Annex to the SLA Template.
RFID applications
Three main RFID applicationsfor military use are: Supply in the
Chain, Asset Tracking and Security. Each application must come with a
SLA guarantee to help the military to track supplies in the most
efficient manner.
Integration of RFID data with key applications, such as those for IT
infrastructure, help desk management and mobile users, can help to bring significant
increases in SLA compliance, IT infrastructure responsiveness, and
planned downtime. For this reason, performance metrics and
vulnerability mitigation are some important aspects of the SLA to ensure
guaranteed high uptime availability
Training and Workshops
- DIACAP mapping to FISMA
- RFID in the Supply Chain
- Risk Management for Professional Engineers
- Enterprise cloud integration/network
- Custom courses/training
DIACAP mapping to FISMA
To make your job easier of transitioning from DIACAP to FISMA security controls, we will provide custom courses to meet your business needs. For several years Judith Myerson was in charge of a large-scale Risk Management program.
To find out more, contact us.
RFID IN THE SUPPLY CHAIN
As of January 1, 2007 DoD required RFID
tagging for all
manufacturers and supplier who have new contacts issued with the
appropriate
contract clause. We need to address what the issues of integrating
with
enterprise systems are, what RFID security
concerns are, how RFID technology
contributes to Defense in Depth, and what RFID
standards are.
Course/Training Objectives:
- Discuss current state of the RFID
technology
- Find out what technology and security issues in RFID technology
the executives need to address
- Learn how the executives can make better decisions
RISK MANAGEMENT FOR PROFESSIONAL ENGINEERS
This course, originally designed by Judith Myerson, is available on the IEEE Website. You will learn how to apply the concept of Risk Management to your business or your organization in order to prevent
your exposure to the risks of loss due to the various risk factors
that are involved in any engineering disciplines including:
- Electrical
- Software, System and Computer
- Environmental
- Mechanical
- Biotechnology
- Packaging
You will learn how to use various controls in order
to mitigate the severity of losses when they do occur. This course
is grouped into six topics. They are professional liability, risk
identification and evaluation, loss prevention and loss control, new business,
contracts, and documentation.
To sign up for this course (IEEE.tv),
click here
Site content copyright
© 2004, 2007-2014 Judith Myerson, ACG (Adv Communication Gold)
ORDERING INFORMATION
Click on a book image to buy or rent
|
soup-to-nuts guide for painless RFID implementation in the supply chain
Giving organizations the ability to track,
secure, and manage items from the time they are raw materials through the
live-cycle of the product, radio frequency identification (RFID) makes
internal processes more efficient and improves overall supply chain
responsiveness.
Helping you bring your organization into the future,
RFID in the Supply Chain:
A Guide to Selection and Implementation
explains RFID technology, its applications in SCM, data storage and
retrieval, business processes, operational and implementation problems,
risks, security and privacy, facility layout, handling systems and methods,
and transportation costs.
In short, with its soup-to-nuts coverage, the book
ensures that your RFID implementation is successful and that you get the
most from your investment.
Features
-
Provides a comprehensive education about
the hardware, software, and other aspects required to deploy RFID
-
Presents compelling reasons for
transitioning to RFID technology and an overview of the RFID market
-
Reviews supply chain trends to provide a
backdrop for the balance of the program
-
Discusses costs and selection guidelines to support assessment of the
value proposition
Books by
Judith M. Myerson
RFID
in
the Supply Chain
A Guide to Selection and Implementation

Enterprise
Systems
Integration & Architectures
More safe, secure and
sound
DISA NECC Service Level Agreements (SLA) Template
√ Contributed to first and later
versions
√ Subcomponent of the NECC Developer's Handbook
Mitigate risks for vulnerability with a SLA
guarantee
√ Performance metrics
beyond Application Vulnerability Description Language (ADVL)
√ Great Web article!
Cyber-guerilla networking: Recognizing and
battling your enemy
√ Required reading for a graduate
course
RFID in the Supply Chain: A Guide to Selection
and Implementation
√ A soup-to-nuts guide for painless RFID implementation
in the supply chain
√ Order book here
RFID Security
√ Read it in the Supply and
Demand Executives magazine
Risk Management for Engineers
√ Widely-acclaimed online
course coming soon!
What is NECC?
Netric Enabled Command and Control
What is NECIS?r />
The likelihood of a threat exploiting a vulnerability.
It results in an adverse business impact.