We're here to help

Bob Carr  |  NETCENTS2 Ops Center  |  1-703-408-3951  |  bobcarr@us.ibm.com

Services and Solutions

The contractor shall provide application services that support sustainment, development, migration and integration, as well as web services and netcentric data services for legacy systems, content delivery and presentation services, and new mission applications that operate in netcentric enterprise environments and exploit AF infrastructures.

Systems Sustainment
The contractor shall support system sustainment activities to include maintaining existing legacy systems and environments IAW disciplined engineering practices and to sustain applications, databases, and interfaces. The contractor shall provide application services to support, maintain, and operate systems or services which are compliant with the DoD Information Assurance Certification and Accreditation Process (DIACAP) and DoDI 8500.2, Information Assurance Implementation or Intelligence Community Directive (ICD) 503 as applicable in the task order.

Systems Development, Migration, and Integration
The contractor shall provide services including, but not limited to, software development, software security, web services development, web services testing, smart phone or other IT devices applications and testing, security layer integration, database clean-up, data wrapping, and data conversion. The contractor shall provide system performance tuning, system re-hosting, and integration services. The contractor shall provide systems migration and integration support services to migrate legacy systems to an Enterprise Resource Planning System (ERP) or an existing standard infrastructure such as the Global Combat Support System (GCSS) or DoD Enterprise Computing Center (DECC). The contractor shall use only Government-Off-The-Shelf (GOTS) tools or approved Commercial-Off-The-Shelf (COTS) tools for systems design and development, or incorporation in system solutions, in accordance with AF Instruction 33-114, Software Management, and AF Policy Directive 33-2, Information Assurance (IA) Program, and the Air Force 33-200 series publications. Task orders for classified and mission-system networks will follow guidance and standards as identified in the task order.

Information Services
Task orders for classified and mission-system networks will follow guidance and standards as identified in the task order. The contractor shall provide application and content presentation services that identify and exploit existing services, create new SOA applications and data services, create presentation services, define, align and register vocabularies, expose the information assets for discovery in the Metadata Environment (MDE) for Communities of Interest (COIs), provide wrapping services, and provide data layer connectivity as described in the paragraphs that follow.

Development of New SOA Applications and Data Services
The contractor shall develop new information capabilities, as defined by a COI or other applicable Government organization. The contractor shall expose authoritative data as defined by the re-engineering of a business process, identifying the sources for the authoritative data, and establishing user roles and permissions for the information access as directed by Communities of Interest. The contractor shall support lifecycle management of new SOA-based applications that encapsulate business logic to provide new functional/ operational mission capabilities.

Create Aggregation Services
The contractor shall create aggregation services that deliver capabilities by coupling multiple core data services with business processes or sets of business rules to construct new information assets, utilizing enterprise services delivered through the NETOPS PWS in accordance with the enterprise architecture. The contractor shall make every effort to avoid duplication of data which is available from another authoritative source in the enterprise unless performance issues dictate a local cache or copy of the data. The contractor shall invoke appropriate enclave security services to address security issues that arise from the aggregation of information taken from multiple ADSs. The contractor shall create aggregation service specifications for review and approval. The contractor shall implement and deploy aggregation services.

The contractor shall provide aggregation services that apply business rules, as specified by applicable Government organizations, or through Enterprise Architecture analysis of business process models, to transform authoritative data into new information assets. The contractor shall create repositories for new authoritative data which are generated by aggregation services.
The contractor shall provide services through which content can be creatively combined, searched, and/or correlated in mashups—web applications that combine data from more than one source into a single integrated tool—for presentation to meet user requirements, such as dashboards.

Create Presentation Services
The contractor shall create presentation services, not already provided as enterprise services and available for reuse, that are required to display information unique to a specific set of users and to deliver specific mission capabilities. The contractor shall develop user presentation services, including, but not limited to, mashups, lightweight composite content, dashboards, portals, portlets, Rich Internet Applications (RIA), transformation and enrichment layers, and functionality source content to meet specific mission capability requirements. The contractor shall develop these presentation services to be available from the SOA infrastructure to provide content on-demand to meet specific mission capability requirements.

Specify Information Assets for Exposure
The contractor shall generate specification for exposing authoritative data as information asset payloads according to schemas or other guidance provided by the responsible Government organization, utilizing enterprise services delivered through the NETOPS PWS in accordance with the enterprise architecture The contractor shall provide semi-automated services that enable the specification of information asset by editing, sorting, filtering, and translating. The contractor shall utilize the data definitions and standards (vocabularies, ontologies, access rules, etc.) in specifying the information asset that will be exposed by the ADS owner. The contractor shall create schemas, documentation, or other supporting designs, for the ADS owners, COI or other Government organizations, to register for use throughout the DoD enterprise. The contractor shall establish access rules consistent with DoD Directive 8320.2 Net Centric Data Sharing and its implementation guide and/or Intelligence Community Information Sharing Steering Committee guidance.

Registering Services
The contractor shall support the registration of ADS exposure services, aggregation services, and presentation services in the MDE Service Registry, along with schemas for discovery purposes. The contractor shall support the registration of ADS exposure services for Top Secret and Intelligence, Surveillance, and Reconnaissance (ISR) mission systems per task order specifications.

Web Services
The contractor shall create and maintain web services using standards as defined within the Enterprise Architecture to include but not be limited to, Extensible Markup Language (XML), Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL) and Universal Description, Discovery and Integration (UDDI) to enable sharing of data across different applications in an enterprise. These interfaces shall enable sharing of business logic, data and processes across a network, to specific functionality end-users.

Service Lifecycle Management
The contractor shall generate necessary design and implementation artifacts that will support lifecycle management of each service developed, defined as service development, testing, certification, registration, sustainment, and evolution aligned with defined requirements. These artifacts will include the metadata needed for service lifecycle management IAW the current version of the DoD Discovery Metadata Specification (DDMS). The design and implementation artifacts for Top Secret network systems and applications, as well as ISR mission systems, are owned by the Government and provided to the Government representative prior to the end of the task order at no additional cost to the Government unless otherwise stated in the task order.

Vocabulary Management
The contractor shall support the development of vocabularies to include developing schemas (e.g., use of Universal Core), semantic models, logical data models from structured repositories, and vocabularies that describe content in unstructured or semi-structured information assets. The contractor shall create and maintain Web Ontology Language (OWL) vocabularies and schemas to represent metadata that will enable service and data discovery using semantic web technologies. The contractor shall verify that vocabularies do not overlap or contradict other ADS vocabularies and resolve any discrepancies and eliminate redundancies before the vocabularies are registered.
Tasks may include the administration of COI-defined or other applicable Government organization vocabularies, in accordance with approved templates. The contractor shall create indexes that will be used to discover information in the vocabularies for mission assurance. The contractor shall translate information from one context to another, from a logistics perspective to a mission planning and execution perspective.

Register Vocabularies
The contractor shall support alignment, articulation and registration of vocabulary artifacts in the MDE for use during discovery and information access across the DoD and Air Force registries Model in accordance with NetOps infrastructure layer processes or Intelligence Community (IC) processes.

Data Stores
The contractor shall create or maintain data stores when a requirement for a new authoritative source of information is determined by the COI. The contractor shall make every effort to avoid duplication of data which is available from another authoritative source in the enterprise. The contractor shall provide services such as data cleansing, redundancy resolution, and business rule validation for those data stores. These data stores shall provide standard functionality and Continuity of Operations (COOP), and shall not degrade user operations, nor introduce critical points of failure. The contractor shall monitor and maintain these data stores to ensure data availability, accuracy, precision, and responsiveness.

Information Exposure Services
The contractor shall provide application services to expose specified information. The contractor shall prepare data to be retrieved by manipulating legacy information sources to be compatible with defined standards. Any modifications to the existing legacy system shall not have any adverse effects on the functioning of the legacy application. The contractor shall modify the information source, its interface, its data, and/or its behavior so that it is accessible using standards in accordance with the enterprise architecture. The contractor shall transform communication interfaces, data structures and program semantic alignment to allow exposure. At the direction of the Government, the contractor shall be responsible for configuration management of existing legacy baseline code and data exposure code.

Communication Wrappers
The contractor shall provide communication wrapping services by transforming the calling interface between two or more programs, managing event traffic between the information source and other services, and transforming method and function calls between the information source and other services. Any modifications to the existing legacy system shall not have any adverse effects on the functioning of the legacy application.

Program Wrapping
The contractor shall provide application program modifications, which may involve wrapping internal modules within an application for exposure in a SOA environment.

Data Language Translation
The contractor shall provide data language transformation by translating between different data manipulation languages, such as incompatible Structured Query Languages (SQL’s). Transformations must not have any adverse effects on the functioning of the data retrieval or the legacy application.

Wrapping Standardization Processes
The contractor shall employ enterprise-wide processes for wrapping the information to be provided in accordance with the enterprise architecture, to eliminate redundant efforts and develop reusable libraries of information sources.

The contractor shall make the wrapped data re-usable, providing common interfaces to information sources that follow widely accepted standards, allowing wrapped sources to be accessible to a wide class of coordination and mediation services.

Systems Operations
The contractor shall provide operational support services including, but not limited to, database administration, systems administration, to include system performance monitoring and tuning, customer training, and help desk support in support of legacy applications and systems or in support of new systems that are developed in compliance with the target enterprise architecture.

Database Administration
The contractor shall provide database administration support for logical and physical database designs. The contractor shall create and test backups of data, provide data cleansing services, verify data integrity, implement access controls to the data, ensuring maximum availability and performance. The contractor shall assist developers of data exposure services to efficiently and effectively use the database.

Systems Administration
The contractor shall provide a wide range of system administration services which may include, but not be limited to, installing, supporting, and maintaining servers or other computer systems, and planning for and responding to service outages and other problems. The contractor shall quickly and correctly diagnose software and hardware failures to resolution. The contractor shall assist in the prevention of computer hacking and other security problems by implementing preventive measures in compliance with AF or IC enterprise architecture. The contractor shall ensure all firewalls and intrusion detection or other information assurance systems are fully functioning as intended and are kept current. The contractor shall monitor the performance of the system and resolve any issues related to the efficient and effective use of the system in general.

Customer Training
The contractor shall provide on-site training at Government and contractor locations, tailored to the specific requirement. The contractor shall allow the Government to videotape on-site training so the Government can use the tapes to conduct follow-on training of newly assigned personnel at that site. For training that is developed by the contractor at the contractor’s expense, videotaping and reproduction by the Government will not be permitted unless terms/conditions/costs are incorporated in the task order. Training may be classified as initial or recurring. When a task order stipulates a requirement for training, the contractor shall submit, for Government approval, a training plan and lesson plan. The Government will specify the scheduling and location of the training course(s). Under certain conditions, prototype lab site configurations shall be setup at the contractor’s facility and used not only for verification and validation but also as a training site for selected users. The contractor shall develop, maintain and/or update student and instructor training materials. This may include computer-based training (CBT), lesson plans and handouts, manuals, train-the-trainer material, textbooks, workbooks, manuals, evaluation forms and other documentation. This may include delivering copies of these materials to the extent specified in the task order. For training development that is provided under a task order, the contractor shall allow the Government to reproduce and distribute contractor customized training materials, at no additional cost to the Government. The contractor shall allow that follow-on training for newly assigned Government personnel may be conducted by Government trainers. The Government owns all rights to the current and future training materials developed by the contractor at Government expense. Examples of training requirements may include a combination of CBTs, classroom lecture, demonstration, hands-on experience, and manual/documentation familiarization for each student. The contractor shall ensure training stays current with the services offered throughout the life of the contract. The training shall not contain proprietary information and may be augmented/altered by the Government after delivery.

Help Desk Support
The contractor shall provide Help Desk Tier 1, Tier 2, and Tier 3 support for technical assistance, order processing, support of multiple software versions, training, warranty, and maintenance, 24-hours a day, 7- days a week, 365 days a year. This tasking may be a stand-alone tasking or as support of an existing Government help desk operation. The contractor shall provide customer assistance and information on warranty service, configuration, installation/implementation, systems administration, database administration, back-up/contingency planning, systems management, facilities management, operation of the contractor-provided software and hardware, and assistance to isolate, identify, and repair failures.
The contractor shall provide trained technicians and shall provide technical assistance to users at worldwide installations. The contractor shall provide toll-free telephone access for obtaining technical assistance from worldwide locations. The contractor's technical assistance support shall be available 24- hours a day, 7-days a week, 365 days a year, worldwide.

Tier 1: Provides basic application software and/or hardware support to callers.
Tier 2: Provides more complex support on application software and/or hardware and is usually an escalation of the call from Tier 1.
Tier 3: Provides support on complex hardware and operating system software and usually involves subject matter experts.