240 likes | 257 Views
This review assesses the AR2D2 system from a customer's perspective, evaluating RFP criteria, scoring, and communication effectiveness. It includes win strategies, approach, appearance, and consistency, focusing on flexible, reliable, and cost-effective solutions. Technical evaluations cover system overview, architecture, traceability, and risk mitigation. Proprietary information aids in the strategic development and evaluation process. Requirements traceability enhances scheduling, risk mitigation, and product development. Contact Thomas DiNetta for further information.
E N D
Autonomous Remote Routing for Defensive Driving Systems(AR2D2) TEAM Red Team Review April 12, 2011 Contact Information: Thomas DiNetta Lockheed Martin 9500 Godwin Ave Manassas ,VA, 22207 thomas.dinetta@lmco.com 703-367-2856
Introduction • Evaluate Draft from Customer’s Perspective • RFP Evaluation Criteria • Formal Scoring (Quantitative Assessment) • Review Final Draft for Effective Communication • Win Strategies • Approach • Appearance • Readability • Consistency A-Team Proprietary Information – Mock Competition Sensitive
Agenda Win Strategies RFP Evaluation Criteria Technical Volume Summary A-Team Proprietary Information – Mock Competition Sensitive
Win Strategies • Flexible • COTS, Open Architecture, Industry Standards, OOP, Modular • Reliable • Redundancy, Contingency for failed seekers • Proven Components • Use of COTS to reduce development time and budget of new technologies and risk • Reduced Footprint • Affordability - Capability packed into a smaller package reducing deployment and storage costs • Spiral Development • Ensure transparent progress and minimize complexity of the overall system A-Team Proprietary Information – Mock Competition Sensitive
RFP Evaluation Criteria • RFP-Section MThe following conditions must be met in order to be eligible for award: • The proposal must comply in all material respects with the requirements of the law, regulation and conditions set forth in this solicitation. • The proposal must meet all solicitation requirements. • Ratings(Outstanding, Good, Satisfactory, Marginal, Unacceptable, Deficiency, Strengths, Weaknesses) • Weighted Factors (Decreasing Importance) • Systems Overview and Performance • Systems Architecture • Requirements Traceability A-Team Proprietary Information – Mock Competition Sensitive
Technical Volume • Systems Overview and Performance • System Architecture • Hardware • Software • Technical Analysis & System Tradeoffs • Requirements Traceability • Verification and Validation • Risks and Opportunities • Reliability, Maintainability, and Availability A-Team Proprietary Information – Mock Competition Sensitive
Technical Volume • Systems Overview and Performance • System Architecture • Hardware • Software • Technical Analysis & System Tradeoffs • Requirements Traceability • Verification and Validation • Risks and Opportunities • Reliability, Maintainability, and Availability A-Team Proprietary Information – Mock Competition Sensitive
Systems Overview and Performance A-Team Proprietary Information – Mock Competition Sensitive
Technical Volume • Systems Overview and Performance • System Architecture • Hardware • Software • Technical Analysis & System Tradeoffs • Requirements Traceability • Verification and Validation • Risks and Opportunities • Reliability, Maintainability, and Availability A-Team Proprietary Information – Mock Competition Sensitive
Systems Architecture • Hardware Design • COTS • Modular • Redundant • Batteries A-Team Proprietary Information – Mock Competition Sensitive
Technical Volume • Systems Overview and Performance • System Architecture • Hardware • Software • Technical Analysis & System Tradeoffs • Requirements Traceability • Verification and Validation • Risks and Opportunities • Reliability, Maintainability, and Availability A-Team Proprietary Information – Mock Competition Sensitive
Systems Architecture Software Design FSP POC A-Team Proprietary Information – Mock Competition Sensitive
Technical Volume • Systems Overview and Performance • System Architecture • Hardware • Software • Technical Analysis & System Tradeoffs • Requirements Traceability • Verification and Validation • Risks and Opportunities • Reliability, Maintainability, and Availability A-Team Proprietary Information – Mock Competition Sensitive
Technical Analysis & System Tradeoffs A-Team Proprietary Information – Mock Competition Sensitive
Technical Analysis & System Tradeoffs A-Team Proprietary Information – Mock Competition Sensitive
Technical Volume • Systems Overview and Performance • System Architecture • Hardware • Software • Technical Analysis & System Tradeoffs • Requirements Traceability • Verification and Validation • Risks and Opportunities • Reliability, Maintainability, and Availability A-Team Proprietary Information – Mock Competition Sensitive
Requirements Traceability • Iterative Map Building • Provides scheduling • Event Driven • Mitigates schedule risk and maximizes field rest benefit • Requirements Analysis • Creates technical specifications and quicker product turnaround • Requirements Traceability Matrix • Maps requirements to technical specifications, events and software/hardware components to a common area for ease of readability and customer understanding A-Team Proprietary Information – Mock Competition Sensitive
Technical Volume • Systems Overview and Performance • System Architecture • Hardware • Software • Technical Analysis & System Tradeoffs • Requirements Traceability • Verification and Validation • Risks and Opportunities • Reliability, Maintainability, and Availability A-Team Proprietary Information – Mock Competition Sensitive
Verification and Validation • Iterative Testing Plan • Finds problems earlier in development; therefore, faster, affordable fixes • Using software simulator to send messages • Validates routing algorithm and message processing early in program A-Team Proprietary Information – Mock Competition Sensitive
Technical Volume • Systems Overview and Performance • System Architecture • Hardware • Software • Technical Analysis & System Tradeoffs • Requirements Traceability • Verification and Validation • Risks and Opportunities • Reliability, Maintainability, and Availability A-Team Proprietary Information – Mock Competition Sensitive
Risks and Opportunities • Assessment – Change fundamental design of IED detection • Mitigation – Keep seeker design modular (SW and HW) to allow seamless future enhancements of the system • Assessment:Enemy successfully capturing seeker and reverse engineer our solution to gain technology • Mitigation:Utilize data encryption and anti-tamper device which wipes data if not initially disarmed • Assessment:Possible to complete other mission types besides safe route finding for HVAs • Capture Plan:Through COTS, open architecture, and modularity, other mission types can include resource scouting and reconnaissance A-Team Proprietary Information – Mock Competition Sensitive
Technical Volume • Systems Overview and Performance • System Architecture • Hardware • Software • Technical Analysis & System Tradeoffs • Requirements Traceability • Verification and Validation • Risks and Opportunities • Reliability, Maintainability, and Availability A-Team Proprietary Information – Mock Competition Sensitive
Reliability, Maintainability, and Availability Creating list of sources of failure COTS and proven performance increases MTBF Modularity, OA, and OOP simplifies maintaining FSP and reducing mean time to support Partnering with component manufacturers increase customer input on component changes A-Team Proprietary Information – Mock Competition Sensitive
Summary A-Team Proprietary Information – Mock Competition Sensitive