This is the participant guide for Thursday, June 26's Cloud Computing Hackathon, an ASI Government Learning Path: Cloud event.
Still time to register! http://aws.amazon.com/events/wwps/symposia/washington/
Let's learn & earn together.
Make some joke about how this slide could get me arrested. Sorry NSA! Not that kind of hack!
Encourage people to send in sample scope statements or solicitations for case study materials – if a group of practitioners wants to hack through a requirement they are working on, we will make that opportunity available to them. Ie, bring your own team! Come as a team!
Quick fire presentations – 5 minutes per team [create a summary slide template for each group], held after challenge 1-3, 4-5, and then 6. This is the way that points get awarded.
Conclude with a takeaway session – either a round the room or open sharing (depending on pace & number of participants)
This will be a continuous challenge – terms & definitions will be posted to our “sticky wall” sandbox. Start this off during the team review of the sample scope statements. Two ways to play: identify terms you don’t understand, submit your understanding of the word / or your proposed definition. (Don’t worry if its wrong – we encourage everyone to continue posting definitions throughout the day – anytime something comes up, post it to the wall!!). Need to have some terms pre-populated – for example, SLAs.
This is done while the teams review their scope statement
Terms of art don’t make business easier. They can be misused and lead to confusion, or wielded for intimidation and deceit. Plus they annoy me sometimes. So NYU’s Governance Lab (@TheGovLab) created the Tech-Policy Dictionary, a project to “break down the barriers between tech and policy so we can all better understand each other.”
It crowdsources shared knowledge to build consensus on technical terms and jargon. Words like “RFP” and “solicitation.”
I loved the idea so much, I posted a companion Cloud Acquisition Dictionary. Anyone may contribute definitions for cloud-related terms to this worksheet I put on Google Drive. If we get enough interest, we can move this from a Drive document to a real product. In fact, the Gov Lab put their code on GitHub and are encouraging that others use it to build-out the Tech-Policy Dictionary.
If you are a CLP-earner, I’ll award half a CLP for every 5 contributions you make.
Cloud elevator speech? From the Agile class – for whom, what & why - better
The Federal Acquisition Regulation (FAR) emphasizes three primary characteristics for writing requirements documents (FAR 11.002):
Full and open competition to the maximum extent practicable
Limited use of restrictive provisions
Description in terms of function, performance, and essential physical characteristics
Preference for commercial items
Consistent with part 12 procedures as well.
For the peer vote, each team will read / present their Function, Performance, Characteristic description for each type of service model. The audience (including the other teams) will have an opportunity to “upvote” the definition; 1 point for each upvote
Here are some helpful hints:
Syllogism part is going to be tricky…
(c) Appropriate techniques should be applied to manage and mitigate risk during the acquisition of information technology. Techniques include, but are not limited to: prudent project management; use of modular contracting; thorough acquisition planning tied to budget planning by the program, finance and contracting offices; continuous collection and evaluation of risk-based assessment data; prototyping prior to implementation; post implementation reviews to determine actual project cost, benefits and returns; and focusing on risks and returns using quantifiable measures.
But is that always the case? Could discuss the risk of overpaying for software or development projects, given the perverse outcomes created by misapplication of fixed price
from Pat Shields to Everyone:
FFP shifts all of FINANCIAL risk to contractor - but ONLY financial risk. Due to the contractor having assumed the financial risk, the risk to BOTH parties of a failure increases. The risk of devoting government expending additional resources to remedying issues increases. Risk of not getting the desired ourcome/need met at all increases.
Once you understand your risks (technical, schedule, cost), you can create performance measures and other incentives that describe to the CSP what is most important about your service level. However, you must keep in mind that SLA’s are not free!
Evaluating proposals is never an easy task, and it is perhaps more complicated when evaluating IT service proposals due to the variance of vendor solutions.
This challenge will