EIA-748 guidelines, as interpreted for major U.S. Government projects, require that project managers develop and maintain bottoms-up estimates of the cost and schedule outcomes of their projects. There is a requirement for a comprehensive bottoms-up forecast to be done at least annually. That is supported by a requirement for a monthly update to the forecast, including best-case, worst-case, and most-likely outcomes for the project estimated final total cost.
This webinar covers these requirements and common associated processes and methods for developing the forecasts.
Included in the discussion are the topics of risk and opportunities management and their relationship to the EVMS; especially focused on the development of the risk/opportunities informed forecasts.
Rather than the development of three potential outcomes for the project timeline, the schedule portion of the discussion focuses on building and maintaining an Integrated Master Schedule (IMS) that meets the Generally Accepted Scheduling Principles (GASP) and the use of that IMS in establishing the probability of meeting the end date based on Schedule Risk Analysis (SRA) techniques.
The discussion ends with the topic of independent evaluations of the forecast using the Independent Estimate-at-Complete (IEAC) analysis process.
Download the presentation to learn more or visit us at www.unanet.com.
Unanet is a leading provider of Cloud and On-Premise software for project-based professional services organizations. Unanet delivers a purpose built Project ERP solution with skills management, resource planning, budgeting & forecasting, time & expense reporting, billing & revenue recognition, project management analytics and dashboards, and integrated financials with AR, AP, GL and cost pool calculations.
Over 2,000 organizations trust Unanet to maximize staff utilization, reduce overhead and administrative costs, improve speed and accuracy of invoicing, and support forward decision-making for improved operations.
Learn more about Unanet at www.unanet.com/videos .
The new CMMC version 1 was published in January 2020. This presentation was provided to small businesses's that are part of the DoD supply chain. It helps to understand the requirements.
The Cybersecurity Maturity Model Certification (CMMC) continues to take shape, with the formation of the Accreditation Body (AB) and continued release of framework and contract guidance. The CMMC will be used as a unified standard for defense contractors to demonstrate cybersecurity program maturity and protection of CUI, and will ultimately require a third party assessment to achieve required certification. The DoD acknowledges that contractors of varying sizes struggle to maintain an appropriate cybersecurity posture and believes this new framework will help contractors implement effective cybersecurity controls tailored to the size and nature of their business and meet the DoD’s requirements.
In this webinar, Tom Tollerton, Managing Director of Cybersecurity & Privacy at DHG will discuss the latest developments around the framework, expectations in contracts in the coming months, and offer actionable recommendations for steps to prepare for potential requirements.
Download the presentation today or visit us at www.unanet.com.
The DoD released v1.2 of the CMMC on March 18, 2020, Walkthrough the slides to understand
1. CMMC/DFARS/NIST SP 800-171
2. CMMC Framework
3. CMMC Levels & Requirements
4. The CMMC effort builds upon existing regulation
5. CMMC – Asset Management
6. CMMC Practices Across Domains per Maturity Levels
7. NIST 800-171 to CMMC Gaps
8. Certification & Accreditation Details
9. CMMC Training
10. Challenges being solved by Ignyte | Training
11. Challenges being solved by Ignyte | Automation
12. What is included within the Full CMMC Accreditation Package?
13. CMMC Accreditation Process Automated
In this video, you will learn:
1. How to specify the scope of Federal Contract Information (FCI) Assets
in your CMMC 2.0 Level 1 Self-Assessment.
2. What is the scope of CMMC 2.0 Level 2 Assessment?
3. How to map and categorize organizational assets?
4. What are the ways to reduce the scope of your assessment?
Learn more from the video: https://youtu.be/Tp3rya6EZCA
This presentation was developed to accompany the live webinar hosted by Federal Publications Seminars. Guests included Bryan Van Brunt, Founder of Van Brunt Law Firm, P.A, and Max Aulakh, Founder & CEO of Ignyte Assurance Platform and Ignyte Institute, who discussed how to get on board with the emerging Cybersecurity Maturity Model Certification (CMMC) compliance regulations and to be able to continue working with the DoD as a prime or subcontractor after the interim rule comes into effect. It gives you both legal and technical perspectives on how to protect your business and maintain a competitive advantage, explains what tools and manpower are required to become compliant within the optimal period of time and with limited IT resources. Speakers also shared important lessons learned while running NIST and CMMC projects.
Unanet is a leading provider of Cloud and On-Premise software for project-based professional services organizations. Unanet delivers a purpose built Project ERP solution with skills management, resource planning, budgeting & forecasting, time & expense reporting, billing & revenue recognition, project management analytics and dashboards, and integrated financials with AR, AP, GL and cost pool calculations.
Over 2,000 organizations trust Unanet to maximize staff utilization, reduce overhead and administrative costs, improve speed and accuracy of invoicing, and support forward decision-making for improved operations.
Learn more about Unanet at www.unanet.com/videos .
The new CMMC version 1 was published in January 2020. This presentation was provided to small businesses's that are part of the DoD supply chain. It helps to understand the requirements.
The Cybersecurity Maturity Model Certification (CMMC) continues to take shape, with the formation of the Accreditation Body (AB) and continued release of framework and contract guidance. The CMMC will be used as a unified standard for defense contractors to demonstrate cybersecurity program maturity and protection of CUI, and will ultimately require a third party assessment to achieve required certification. The DoD acknowledges that contractors of varying sizes struggle to maintain an appropriate cybersecurity posture and believes this new framework will help contractors implement effective cybersecurity controls tailored to the size and nature of their business and meet the DoD’s requirements.
In this webinar, Tom Tollerton, Managing Director of Cybersecurity & Privacy at DHG will discuss the latest developments around the framework, expectations in contracts in the coming months, and offer actionable recommendations for steps to prepare for potential requirements.
Download the presentation today or visit us at www.unanet.com.
The DoD released v1.2 of the CMMC on March 18, 2020, Walkthrough the slides to understand
1. CMMC/DFARS/NIST SP 800-171
2. CMMC Framework
3. CMMC Levels & Requirements
4. The CMMC effort builds upon existing regulation
5. CMMC – Asset Management
6. CMMC Practices Across Domains per Maturity Levels
7. NIST 800-171 to CMMC Gaps
8. Certification & Accreditation Details
9. CMMC Training
10. Challenges being solved by Ignyte | Training
11. Challenges being solved by Ignyte | Automation
12. What is included within the Full CMMC Accreditation Package?
13. CMMC Accreditation Process Automated
In this video, you will learn:
1. How to specify the scope of Federal Contract Information (FCI) Assets
in your CMMC 2.0 Level 1 Self-Assessment.
2. What is the scope of CMMC 2.0 Level 2 Assessment?
3. How to map and categorize organizational assets?
4. What are the ways to reduce the scope of your assessment?
Learn more from the video: https://youtu.be/Tp3rya6EZCA
This presentation was developed to accompany the live webinar hosted by Federal Publications Seminars. Guests included Bryan Van Brunt, Founder of Van Brunt Law Firm, P.A, and Max Aulakh, Founder & CEO of Ignyte Assurance Platform and Ignyte Institute, who discussed how to get on board with the emerging Cybersecurity Maturity Model Certification (CMMC) compliance regulations and to be able to continue working with the DoD as a prime or subcontractor after the interim rule comes into effect. It gives you both legal and technical perspectives on how to protect your business and maintain a competitive advantage, explains what tools and manpower are required to become compliant within the optimal period of time and with limited IT resources. Speakers also shared important lessons learned while running NIST and CMMC projects.
Why does DFARS exist?
Current requirements for companies with Controlled Unclassified Information (CUI) or DoD Covered Defense Information (CDI)
What is CMMC?
Setting up your compliance program at the corporate level.
Conducting Rapid - Low Fidelity Assessment for generating SPRS Scores.
Developing a completed SSP (System Security Plan).
How and why to create a POA&M (Plan of Actions & Milestones)
Performing PCI DSS Assessments Using Zero Trust PrinciplesControlCase
- PCI DSS Requirements & Secure Remote Working
- Assessments In Work From Home (WFH) Scenario
- Remote Security Testing
- Key Aspects For Remote Assessments
ControlCase discusses the following:
•About the cloud
•About PCI DSS
•PCI DSS in the cloud
•How to keep sensitive data secure as you move to the cloud
•Q&A
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
Presenters: Robert Landavazo, PNM Resources and Katherine Brocklehurst, Tripwire
With countless hours of work to go, PNM was far from ready for its coming audit in just 18 months. Confidence levels in its existing manual, and incomplete security controls, were at an all-time low; and the visibility into control center environments for quantifying its status and progress towards compliance was immeasurable.
With Tripwire, PNM’s preparation of the looming CIPv3 audit noticeably improved. With efficient reporting and automation, PNM’s now positioned to hold itself accountable for CIP auditable compliance of more than 3,500 explicit and supporting control points, satisfying CIP-002-3, CIP-004-3, CIP-005-3, CIP-007-3 and CIP-009-3. In addition, enhanced visibility and better control gave PNM the ability to effectively communicate meaningful and measurable initiatives to executive teams – resulting in increased support for their funding needs.
In this session, PNM – New Mexico’s largest electricity provider – will share a case study on its journey towards achieving continuous NERC CIP compliance despite a highly limited headcount, how it saved countless hours of labor-intensive manual effort, and the essential role that automation played in its success.
The North American Electric Reliability Corporation (NERC) introduced Critical Infrastructure Protections (CIPs) as mandatory cyber security regulations, intended to protect the bulk electric grid. This compliance guide, updated according to NERC CIP version 4 (applicable as of June 25, 2012), provides an overview of the compliance requirements as well as steps to achieve NERC compliance.
To download a free Nexpose demo, click here:
http://www.rapid7.com/products/nexpose/compare-downloads.jsp
To download a free Metasploit demo, click here:
http://www.rapid7.com/products/metasploit/download.jsp
Building an Intelligence-Driven Security Operations CenterEMC
This white paper describes how an intelligence-driven security operations center (SOC) improves threat detection and response by helping organizations use all available security-related information from both internal and external sources to detect hidden threats and even predict new ones.
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj Purandare ☁
Effective Security Operations Centre SOC building - by Manoj Purandare. This article tries to give a strategy towards building am effective SOC using its 4 major points steps and 11 effective steps recipe - for Organisation's / Govt's safety and security
The MCGlobalTech Managed Security Compliance Program helps small business government contractors meet the DFARS/NIST 800-171 compliance requirements by managing their security and compliance. Save Money. Run your business. Leave it to the experts.
ControlCase covers the following based on PCI SSC FAQs, blogs, and PCI SSC presentations from Community Meetings and other PCI SSC public events:
•Current status of PCI DSS (including information publicly available on PCI DSS ver. 4.0)
•PA DSS and upcoming Software Security Framework overview
•P2PE updates and new concepts
•PCI PIN, PCI 3DS and Card Production overview
•Chronological Time-frame for various standards
ControlCase covers the following:
- What is CMMC?
- Who does CMMC apply to?
What is the accreditation body (CMMC-AB)?
- What is a CMMC Third Party Organization (C3PAO)?
- What does CMMC mean for Cybersecurity?
- What are the CMMC certification levels?
- How often is CMMC needed?
- CMMC and NIST
- What is the CMMC Assessment process?
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
Presenter: Joseph Loomis, Southwest Research Institute (SwRI)
Asset Owners face challenges as they strive towards implementing the NERC-CIP V5 requirements. Meeting the requirements often require documentation and technical knowledge of how an asset operates that can only be provided by a Vendor. Vendors, likewise, may be unclear about how the NERC-CIP requirements affect them, and are unsure about how to meet the technical requirements. In this presentation we detail the lessons learned from a recent project where SwRI worked with a Vendor to determine how the requirements apply to them and what the Vendor needs to have to help support an Asset Owner in an audit.
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
"Like any information security processes, there should be an adequate and"
"reasonable level of assurance for cyber security, which completes the security perspective when combined with governance and management processes. Cyber security assurance requires a comprehensive set of controls that covers risk as well as management processes."
"These controls are supported by appropriate metrics and indicators for"
"security goals and factual security risk. This session will share the cybesecurity self assessment program in carrying out an audit or self- assessment review on cyber security controls and practices in a typical organisation. This assurance program will leverage on COBIT 5 framework"
"and COBIT 5 for Information Security as a baseline."
Why Do Projects Fail? Getting Ready for EIA 748 – Earned Value Management (EVM)Unanet
Every project based organization MUST be concerned about project execution. Over the years Humphrey’s and Associates has seen many projects and has assimilated a list of reasons for project failure.
During the webcast Paul Bolinger, an EVM expert from Humphrey’s and Associates, will refer back to the causes of project failure pointing out how a properly implemented and managed EVMS in compliance with EIA 748 can help mitigate or eliminate failure.
You will Learn:
• The major reasons that projects fail
• How a project management system can help avoid failure
• Overview of EIA 748
• What is an EVMS – Earned Value Management System
• How to implement an EVMS in your organization
• How difficult is it, how long might it take, is there an impact to project costs
If you would like to join Unanet at another upcoming webinar, please check out our upcoming webinars at;
https://www.unanet.com/webinars
Why does DFARS exist?
Current requirements for companies with Controlled Unclassified Information (CUI) or DoD Covered Defense Information (CDI)
What is CMMC?
Setting up your compliance program at the corporate level.
Conducting Rapid - Low Fidelity Assessment for generating SPRS Scores.
Developing a completed SSP (System Security Plan).
How and why to create a POA&M (Plan of Actions & Milestones)
Performing PCI DSS Assessments Using Zero Trust PrinciplesControlCase
- PCI DSS Requirements & Secure Remote Working
- Assessments In Work From Home (WFH) Scenario
- Remote Security Testing
- Key Aspects For Remote Assessments
ControlCase discusses the following:
•About the cloud
•About PCI DSS
•PCI DSS in the cloud
•How to keep sensitive data secure as you move to the cloud
•Q&A
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
Presenters: Robert Landavazo, PNM Resources and Katherine Brocklehurst, Tripwire
With countless hours of work to go, PNM was far from ready for its coming audit in just 18 months. Confidence levels in its existing manual, and incomplete security controls, were at an all-time low; and the visibility into control center environments for quantifying its status and progress towards compliance was immeasurable.
With Tripwire, PNM’s preparation of the looming CIPv3 audit noticeably improved. With efficient reporting and automation, PNM’s now positioned to hold itself accountable for CIP auditable compliance of more than 3,500 explicit and supporting control points, satisfying CIP-002-3, CIP-004-3, CIP-005-3, CIP-007-3 and CIP-009-3. In addition, enhanced visibility and better control gave PNM the ability to effectively communicate meaningful and measurable initiatives to executive teams – resulting in increased support for their funding needs.
In this session, PNM – New Mexico’s largest electricity provider – will share a case study on its journey towards achieving continuous NERC CIP compliance despite a highly limited headcount, how it saved countless hours of labor-intensive manual effort, and the essential role that automation played in its success.
The North American Electric Reliability Corporation (NERC) introduced Critical Infrastructure Protections (CIPs) as mandatory cyber security regulations, intended to protect the bulk electric grid. This compliance guide, updated according to NERC CIP version 4 (applicable as of June 25, 2012), provides an overview of the compliance requirements as well as steps to achieve NERC compliance.
To download a free Nexpose demo, click here:
http://www.rapid7.com/products/nexpose/compare-downloads.jsp
To download a free Metasploit demo, click here:
http://www.rapid7.com/products/metasploit/download.jsp
Building an Intelligence-Driven Security Operations CenterEMC
This white paper describes how an intelligence-driven security operations center (SOC) improves threat detection and response by helping organizations use all available security-related information from both internal and external sources to detect hidden threats and even predict new ones.
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj Purandare ☁
Effective Security Operations Centre SOC building - by Manoj Purandare. This article tries to give a strategy towards building am effective SOC using its 4 major points steps and 11 effective steps recipe - for Organisation's / Govt's safety and security
The MCGlobalTech Managed Security Compliance Program helps small business government contractors meet the DFARS/NIST 800-171 compliance requirements by managing their security and compliance. Save Money. Run your business. Leave it to the experts.
ControlCase covers the following based on PCI SSC FAQs, blogs, and PCI SSC presentations from Community Meetings and other PCI SSC public events:
•Current status of PCI DSS (including information publicly available on PCI DSS ver. 4.0)
•PA DSS and upcoming Software Security Framework overview
•P2PE updates and new concepts
•PCI PIN, PCI 3DS and Card Production overview
•Chronological Time-frame for various standards
ControlCase covers the following:
- What is CMMC?
- Who does CMMC apply to?
What is the accreditation body (CMMC-AB)?
- What is a CMMC Third Party Organization (C3PAO)?
- What does CMMC mean for Cybersecurity?
- What are the CMMC certification levels?
- How often is CMMC needed?
- CMMC and NIST
- What is the CMMC Assessment process?
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
Presenter: Joseph Loomis, Southwest Research Institute (SwRI)
Asset Owners face challenges as they strive towards implementing the NERC-CIP V5 requirements. Meeting the requirements often require documentation and technical knowledge of how an asset operates that can only be provided by a Vendor. Vendors, likewise, may be unclear about how the NERC-CIP requirements affect them, and are unsure about how to meet the technical requirements. In this presentation we detail the lessons learned from a recent project where SwRI worked with a Vendor to determine how the requirements apply to them and what the Vendor needs to have to help support an Asset Owner in an audit.
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
"Like any information security processes, there should be an adequate and"
"reasonable level of assurance for cyber security, which completes the security perspective when combined with governance and management processes. Cyber security assurance requires a comprehensive set of controls that covers risk as well as management processes."
"These controls are supported by appropriate metrics and indicators for"
"security goals and factual security risk. This session will share the cybesecurity self assessment program in carrying out an audit or self- assessment review on cyber security controls and practices in a typical organisation. This assurance program will leverage on COBIT 5 framework"
"and COBIT 5 for Information Security as a baseline."
Why Do Projects Fail? Getting Ready for EIA 748 – Earned Value Management (EVM)Unanet
Every project based organization MUST be concerned about project execution. Over the years Humphrey’s and Associates has seen many projects and has assimilated a list of reasons for project failure.
During the webcast Paul Bolinger, an EVM expert from Humphrey’s and Associates, will refer back to the causes of project failure pointing out how a properly implemented and managed EVMS in compliance with EIA 748 can help mitigate or eliminate failure.
You will Learn:
• The major reasons that projects fail
• How a project management system can help avoid failure
• Overview of EIA 748
• What is an EVMS – Earned Value Management System
• How to implement an EVMS in your organization
• How difficult is it, how long might it take, is there an impact to project costs
If you would like to join Unanet at another upcoming webinar, please check out our upcoming webinars at;
https://www.unanet.com/webinars
Quantify Construction Damages related to Delay, disruption, and inefficienciesMichael Pink
Learn how to quantify damages related to delay, disruption and inefficiencies on Construction projects. Convert your delays and impacts into cost claims with this proven process.
We provide end-to-end bookkeeping, finance and accounting Services and offer outsourcing as a strategic tool to enable you to meet your finance and accounting needs.
This presentation deals with the Performance testing implemented in the Project.
We have to use Certain Tools in the POC process.
1) VSTS
2) JMeter
finally, VSTS has been Implemented.
I hope this presentation helps the viewer to get the overview of the tools which Accenture Deals.
The Virginia National Guard Cooperative Agreement Process is how the State Department of Military Affairs seeks reimbursement from the Federal government for services rendered. This process was functioning in such a poor state that senior leaders in Virginia were considering furloughing employees due to tied up funds. At the end of this process we were able to take the reimbursement time from an average of 49 days to 5 days, improved their delinquency rate and standardized the process across all functions. This also resulted in a cost avoidance of 50% on behalf of the Federal Government while improving transparency for all parties involved.
Transforming Construction with Knowledge ManagementShelley Armato
Imagine a world where everyone is on the same page? A world where turnover is done at the end of the project? OCIP and CIP closed out? This is the world we have created! #jointherevolution!
Oil Industry Safety Directorate TrainingPharma Garage
Course Benefits:
This two days course has been designed for imparting awareness on Safety in Design, Operation &
Maintenance practices to be adopted by industries, Statutory provisions (PESO)/ OISD) requirements
as per latest standards, and best industry practices in hydrocarbon (mid stream & down stream) sector
DOES15 - Carmen DeArdo - How DevOps is Enabling Lean Application DevelopmentGene Kim
Carmen DeArdo, DevOps Technology Leader, Nationwide Insurance
The Nationwide Journey started with setting up agile development standing teams. With over 200 agile teams in place across the enterprise, significant quality and productivity improvements were realized. However it soon became obvious that we were reaching a point of diminishing returns due to wait states and contentions points in other areas of the delivery value stream.
At this point it became necessary to perform more analysis to determine how additional DevOps practices could be applied as part of a Lean Application Development Initiative. This required people (culture), process and technology changes. The application of DevOps practices providing continuous visibility and delivery, was a key component of optimizing the end to end delivery value stream.
This session will discuss where the journey picks up from last year and how continued application of DevOps methods is transforming our ability to deliver key business capabilities more quickly and predictably.
Similar to Project Forecasting from the Perspective of an EVMA and EIA-748 (20)
What is Going on in the GovCon Market? Benchmarks and Trends for Government C...Unanet
What is Going on in the GovCon Market? Benchmarks and Trends for Government Contractors Presented by Kim Koster, Unanet.
Uncover the insights and tips to grow your government contracting business.
* Plan & strategize for next fiscal year.
* Focus on internal control best practices and standards.
* Insights to create internal roadmaps and manage controls.
* Drive value in your overall organization.
DCAA Compliant Time & Expense Reporting AutomationUnanet
This webinar for project based government contractors will show the benefits of a web-based Time and Expense Reporting solution that reduces administration effort by 90% and enables compliance with Federal Government DCAA (Defense Contract Audit Agency) reporting requirements.
More than 2,000 organizations use Unanet with QuickBooks, Deltek, Microsoft Dynamics and other accounting systems to achieve visibility in real-time into project hours, costs and comments. In addition to reducing administrative and approval effort and satisfying reporting rules for DCAA auditors, Unanet ensures correct Per Diem expense reporting based on geography.
Unanet also offers integrated Financials capabilities with GL, AR, AP and Cost Pool Calculations, removing the need to exchange data with third party systems, and thereby providing a 'single source of truth'.
Unanet supports calculation of project direct and indirect costs in real-time, as well as indirect rate calculation, Earned Value (EVMS), resource planning and forecasting, and provides performance management for your projects and people.
Unanet software is accessed via your web browser and hosted in either our secure data center or on your own servers, and can be deployed within just a few weeks.
Download this webinar today to see how your project-based business can remain compliant with DCAA requirements.
Control the Future - Budget, Plan & ForecastUnanet
This webinar will help project managers and resource managers understand the opportunities for increased efficiency and effectiveness in managing people across projects.
The webinar will show how the web-based Unanet project portfolio management system enables effective forecasting, planning, assignment and tracking of your people, providing visibility of current commitments, utilization, future availability, and skills.
The webinar includes insights from Unanet customers on their approach to managing their project portfolio, including improving processes for resource management, performance analysis, and forecasting. One organization improved engineering staff utilization by 7% in the first year of adoption.
Download the slides today and learn how to take control of your budgeting, planning & forecasting.
To learn more, visit us at www.unanet.com
The Project Life Cycle Through the Lens of a Project Based ERPUnanet
Your ERP system must support every part of the project life cycle.
Learn how Unanet can help you plan, monitor, and account for projects in this infographic.
Learn more at; https://www.unanet.com/learn/infographics
Control the Future - Budget, Plan & ForecastUnanet
This webinar will help project managers and resource managers understand the opportunities for increased efficiency and effectiveness in managing people across projects.
The webinar will show how the web-based Unanet project portfolio management system enables effective forecasting, planning, assignment and tracking of your people, providing visibility of current commitments, utilization, future availability, and skills.
The webinar includes insights from Unanet customers on their approach to managing their project portfolio, including improving processes for resource management, performance analysis, and forecasting. One organization improved engineering staff utilization by 7% in the first year of adoption.
Download the slides today and learn how to take control of your budgeting, planning & forecasting.
To learn more, visit us at www.unanet.com
Win Your Next Defense Opportunity - Seaport Next Generation (NxG)Unanet
The Defense Department’s largest contract, SeaPort-e, has generated about $62 billion since fiscal 2001 and is soon concluding its performance period. It will be eclipsed by the follow-on contract, known as Seaport Next Generation (NxG), which was awarded to approximately 1,870 contractors in December 2018.
This webinar presented by Bloomberg Government, in cooperation with Unanet, discusses the opportunities that are ahead on SeaPort-NxG and how to capture upcoming opportunities.
Topics for the webinar will include:
• Top contractors winning work on SeaPort
• Insights on the SeaPort-NxG on-ramp schedule to take place in fiscal 2021
• The volume of activity at bureaus such as NAVSEA, NAVAIR, NAVWAR, and others that has flown through SeaPort and how that may change in the future
• Analysis of the U.S. Navy Department’s $80 billion annual spending on professional services and how multiple-award contracts including SeaPort, OASIS, and AMCOM EXPRESS dominate that spending
• Expiring work on SeaPort-e that will likely be competed on SeaPort-NxG
Resource Management Maturity - Does Your Resource Management Practice Work Fo...Unanet
How mature is YOUR resource management practice?
Only 25% of respondents in our most recent GAUGE survey said they have reached a “Very Mature” level of resource management practice.
This means that the vast majority of firms just like yours have a lot of improvements that can be made.
Download the slides to take a look at how Nalas transformed their resource management practice.This is a great presentation, no matter if you think you are managing your resources really well, or if you could make some improvements.
You will learn:
*Where you fall on the resource management maturity scale (level 1-5)
*What a practical deployment of an enterprise resource management practice looks like from Nalas
*How you can move up the maturity scale
To learn more, visit www.unanet.com
Control the Future - Budget, Plan & ForecastUnanet
Learn how the web-based Unanet project portfolio management system enables effective forecasting, planning, assignment and tracking of your people, providing visibility of current commitments, utilization, future availability, and skills.
This webinar helps project managers and resource managers understand the opportunities for increased efficiency and effectiveness in managing people across projects.
This presentation also includes insights from Unanet customers on their approach to managing their project portfolio, including improving processes for resource management, performance analysis, and forecasting. One organization improved engineering staff utilization by 7% in the first year of adoption.
Download the slides now and learn how to take control of your budgeting, planning & forecasting.
To learn more, visit www.unanet.com
Please join Unanet's Kim Koster, and BDO's Senior Associate, Tetiana Gervis, CPA , for an informative session to help in understanding your upcoming Incurred Cost Submission (ICS). The webinar will provide Government Contractors with an introduction to Incurred Cost Submissions, overview of preparation techniques and best practices, and common mistakes which could lead to scrutiny from the DCAA. Additionally, we will provide an update on the most recent DCAA audit trends.
You will learn about:
• Current ICS audit landscape
• General overview of the requirements of an ICS
• ICS schedules explanations
• ICS timeline and submission
• Common mistakes when preparing the submission and how these mistakes could lead to inadequacies and/or inquiries from the DCAA
If you would like to join Unanet for an upcoming webinar, please visit us at; https://www.unanet.com/webinars
If projects are the primary driver of your revenue this webcast is for you. Come learn how to optimize the project lifecycle in your organization.
Learning Objectives:
How to make the project lifecycle come alive
Growth, It All Starts with a Plan
CRM
Pipeline
Winning new Contracts
Execution
Budgeting
Forecasting
Earned Value Management
Project Management Office
Reporting/Analysis
Indirect Rates - What Strategy is Right for your OrganizationUnanet
Managing Projects with Ever Changing Rates:
Government Contractors struggle to forecast the impact costs will have when you bid a multi-year project. We will discuss how to carefully manage the ebbs and flows of the costs in the organization and stay vigilant and be ready for unexpected expenses during the execution of your project.
What should be included in the Fringe pool?
FAR 31.205-6(m) outlines what should be in a fringe pool. The question is should you have a separate fringe and overhead pool or just put fringe in overhead? In the session we will discuss the pros and cons of each methodology. What are the effects of rates on winning new business and executing projects?
Have you selected the right General and Administrative (G&A) base for your company?
You may be struggling with how to pick the right G&A base for your organization or considering making a change. The discussion will be around the finer points of Total Cost Base, Value Added Base and Single Element Base. You will learn about the components of G&A and the base, the rules and where to locate them, and the pros and cons of base selection. In addition, topics related to the FAR, CAS, and DCAA will be discussed.
Other Topics:
Other discussion topics will be Actual vs Provisional vs Target/Planning rates, calculating rates from GL budgets, and even for an organization with no cost plus work, why they should look at using indirect rates to understand profitability on T&M and FP projects.
Want to start using EVM principles for your project based business? This is a great primer to get you started. Brought to you by the team at Unanet.com.
Learn more at: https://www.unanet.com/news/demand-webinars
Learn how Unanet allows billing and revenue recognition to be integrated with the project life-cycle, and not as a separate function. Unanet offers robust support for Fixed Price, Time & Materials and Cost Plus contracts and allows managers to forecast revenue and margin in realtime. Unanet services automation software offers project-based organizations unique capabilities for engagement management, project accounting, and invoicing.
Learn more at: https://www.unanet.com/news/demand-webinars
Top Reasons to Make Managing Your Pipeline a PriorityUnanet
Managing your pipeline takes time and resources, but by making it a priority, you can drive ROI and growth, and even reduce your BD costs. Join Unanet and TargetGov to learn:
How to build a pipeline of targeted opportunities
Decision factors to consider in building an effective pipeline
How far ahead should you consider opportunities?
How do you properly track all your bid process efforts?
How do you learn from your wins and more importantly from your losses?
How do you manage forecasting for your business?
What kind of real-time visibility do you have into your pipeline and business?
Learn more at: https://www.unanet.com/news/demand-webinars
Top Signs You May Have Outgrown Your Legacy ERP SystemUnanet
Do you sometimes feel like your company is being held hostage by your legacy ERP?
Have you outgrown QuickBooks, GCS, or another system?
Did you build a home-grown system and you have simply outgrown it?
Change is scary, but making the switch to a purpose-built, cloud based, ERP solution does not have to be.
Supporting an ERP tool you have outgrown is expensive and inefficient. Poor visibility, constant reconciliation, manual integration, compliance challenges, and disparate spreadsheets are symptoms of an ERP that has outlived its usefulness.
In this webinar you will learn about Unanet, the one tool for People, Projects and Financials and how it can revolutionize your business operations.
• One source of truth – One UI, One dB, One Application
• Accessible 24/7 - 100% Web Based
• Full cycle ‘Bid-to-Bill-to-Book’ for GovCon & Commercial Firms
• Real-time Visibility into Project Status, Billings & Revenue
• Resource Forecasting & Reporting
• Flexible Invoicing, Integrated Financials with “Revolutionary” Cost Pool Calculations
Learn more at: https://www.unanet.com/news/demand-webinars
Government Contract Foundations – Understanding Indirect RatesUnanet
Join us for this webinar as we look at indirect rates and provide some tips and tricks for better managing them.
Whether you are new to Government Contracting, or are a long-term GovCon, there will be a little something for contractors of all shapes and sizes and all levels of experience.
We will take a look at the basics of indirect rates, how to develop your rates, what the submission process looks like, and how to remain compliant and avoid potential audits.
Understanding and better managing your indirect rates will allow you to in turn better manage your bottom line.
Learn more at: https://www.unanet.com/news/demand-webinars
Cybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last CallUnanet
In this webinar Unanet and H2L Solutions, a provider of cyber security and information assurance services, will be discussing the latest updates for the DFARS 7012 regulations and answering questions that anyone might have regarding the assessment and the NIST 800-171 controls. We will cover the key requirements, adequate security, reporting compliance, flow down, implementation experiences and and the impact the regulation is having.
Learn more at: https://www.unanet.com/news/demand-webinars
Improve Your Outcomes on Cost Type ContractsUnanet
Join Unanet and Aronson LLC for an educational webinar as we look at the complex world of cost type government contracts.
Many government service contractors successfully enter the government market with relatively straightforward T&M (Labor Hour) contracts. Eventually, an opportunity to bid and perform larger and more complex cost reimbursement contracts will present itself. The skills required to manage T&M contracts differ markedly from the skills required to manage a cost type contract. While the statements of work may be very similar, the administrative requirements associated with managing a cost type contract greatly exceed those required for T&M work.
Managing cost type contracts is a sophisticated undertaking. The contractor must understand what a “cost” is, have an adequate accounting system, establish both direct and indirect budgets (and actively manage them), and with actual (not billing) rates.
Failure to comply with these requirements can have serious ramifications, including incurring a loss, a poor cash flow, inaccurate cost reporting and an inadequate accounting system, An understanding of your obligations is essential to mitigating your risks, maximizing your cost recovery and maintaining your bottom line — essentially the difference between recovering your costs making a profit or losing your shirt.
Learning Objectives:
• What an "adequate" accounting system must include
• Which costs can — and can't — be reimbursed
• How direct costs are reimbursed
• How indirect costs are reimbursed
• How to handle invoicing on cost-type contracts
• The "Paid-to Cost" rule
• The limitation of Cost-and-Funds clauses
• How to facilitate a cost type contract in an accounting system
In this webinar you will learn to improve your outcomes on cost type contracts.
Learn more at: https://www.unanet.com/news/demand-webinars
NIST Cybersecurity Requirements for Government ContractorsUnanet
What is Controlled Unclassified Information (CUI)? What is NIST SP 800-171? How is my project management and accounting system impacted?
Navigating your way through these complex topics can be difficult for any government contractor, but protecting CUI in a non-federal environment is critical. Compliance is required by December 31, 2017.
Join us for this webinar to learn more about:
• What it means to be compliant with NIST SP 800-171
• Documenting your compliance status
• Preparing for audits and/or requests for compliance attestation/reports
• Key CUI requirements
• Suggested NIST processes
• How having the right system and team in place can help you remain compliant
Learn more at: https://www.unanet.com/news/demand-webinars
Please join Amy Hernandez, CPA, JD, Principal at Strategic FAR Advisors, LLC, as she provides invaluable insight on navigating the DCAA waters.
On this webinar you will hear the topics below:
1. Trends in DCAA audits
2. Why certain audits are performed
3. Discussion on the top three audits types
Pre-Award to include the Accounting System audit
Forward Pricing
Incurred Cost
4. How to approach an audit should you have one upcoming
5. How Unanet helps companies by providing a compliant purpose-built Project ERP solution
Learn more at: https://www.unanet.com/news/demand-webinars
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
Tim Combridge from Sensible Giraffe and Salesforce Ben presents some important tips that all developers should know when dealing with Flows in Salesforce.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Strategies for Successful Data Migration Tools.pptxvarshanayak241
Data migration is a complex but essential task for organizations aiming to modernize their IT infrastructure and leverage new technologies. By understanding common challenges and implementing these strategies, businesses can achieve a successful migration with minimal disruption. Data Migration Tool like Ask On Data play a pivotal role in this journey, offering features that streamline the process, ensure data integrity, and maintain security. With the right approach and tools, organizations can turn the challenge of data migration into an opportunity for growth and innovation.
Welcome everyone to our webcast on Project Forecasting from the Perspective of an Earned Value Management Systems ands EIA-748. In prior webinars we have covered the basics of Earned Value and today we’re going a little deeper into project forecasting.
I am Richard Hayden with Unanet and am here today with Paul Bollinger, Engagement Director with Humphreys and Associates. Humphreys and Associates have been recognized as leading experts in EVMS for over three decades. I think I first met and worked with Gary Humphries, President and CEO of Humphries & Associates in about 1990.
Paul is going to present the content here today, but before we get started I wanted to cover a couple of housekeeping items. We want you to submit any questions you have throughout the webcast via the gotowebinar dialog on the right of the screen. We will answer those questions if we have time at the end or via follow up email afterwards. Also you will receive a copy of this presentation and the recording within 48 hours.
To start we’d like to get a sense of how many of you are exposed to formal earned value according to EIA-748
Earned Value Management (EVM) is based upon some widely accepted guidelines. These guidelines evolved from government mandated specifications for management systems, to the government’s set of Guidelines a management system had to meet to be considered acceptable to the government, and finally to an industry-wide set of standards for earned value management systems – the EIA-748-D Standard for EVMS.
The EVMS Guidelines are intended to serve as standards for measuring the adequacy of a management control system. Contractors are free to organize in the manner best suited to their individual environments and management philosophies, and may select the internal methods and procedures of their choice.
In other words, there are probably as many ways to design a system to satisfy these guidelines as there are organizations that use them. However, the resulting system must provide the data and possess the capabilities specified in the guidelines in order to be acceptable.
Subcontractors may also be required by their prime contractors to satisfy the guidelines and provide reports that directly support prime contractor reports with similar data.
Based on our research we generated this list of reasons for project failure. Let’s talk about them and out them in perspective. If you have had any experiences with these, please share with the other attendees as the instructor covers them.
As we go through the workshop, we will periodically refer back to the causes of failure pointing out how a properly implemented and managed EVMS can help mitigate or eliminate failure.
The instructor should cover each bullet. Note that two following charts deep dive into communications and scope creep.
The feedback loops are the important aspects of this process map. The manager does not organize once, does not plan once, and does not direct just once. Those steps are on-going and result from the control step.
Discuss – if we see a failure or weakness in communications then we do…..
Discuss – if we detect scope creep then we do….
And so on….with the issues of project failures.
The manager spends most of his time in the control mode or step. The actions that can be taken are re-organizing, re-planning, and re-directing so those steps are repeated as needed. But each period during the project we take measurements, decide what they mean, and take action to correct our efforts to get back on plan.
The EVMS is perfect for this step because it provide large amounts of project information about plans progress in terms of budgets, accomplishments, and actual costs. It requires forecasts also. It is in the area of planning and forecasting where most decisions are made.
Each time we detect a movement toward failure then we act.
This is a common architecture for an EVMS. The Integrated Master Schedule (IMS) is built in a tool like Primavera, Open Plan, or Microsoft Project. The information about plans, progress, and forecasts begins in the IMS. The EV engine is where budget rates and forecast rates are kept and where all the informational elements are brought together to generate the management information.
The ERP system of the company is the source of information on actual costs and things like material receipts and issues as well as manufacturing.
Many companies use a viewer/analyzer tool to help them go through the data and see the significant issues.
There are special topic tools used along side the main tolls to do things schedule risk analysis. It is in these adjunct tools where computer simulations of the decisions and outcome will usually be done.
EAC is graphically displayed in a picture is like this.
This chart shows resources on the vertical axis, time on the horizontal axis, and a vertical line extending from the Time axis to represent Time Now. This shows that actual costs have been collected through Time Now. Next is to figure out what the EAC is. So what needs to be done? The answer is to figure out how much work is remaining to be done and then estimate how much that work is going to cost.
Now the difference between what has been spent already and the EAC is called the Estimate To Complete. People have a tendency to get the two terms Estimate At Complete and Estimate To Complete confused.
The real meat of the exercise is to figure what remains to be done and then re-estimate it just as was done at the beginning of the project. And of course, once the ETC is determined, by adding it to what was already spent (ACWP), the end result is the EAC. The BCWP value is a key element in evaluating the remaining effort to be completed.
This chart shows the EAC picture. Note how it shows that the Estimate At Completion is a dollar value at a point in time and is composed of the actual costs to date plus the estimated cost to complete the work.
This is the picture of what we have been saying. Vertical is resources, horizontal is time. Here is the full plan, the BAC, and this is the original expected (contractual) completion date. Our earned value has not quite been what we had hoped some are - SV. And our actual cost has exceeded our work completed by a significant amount. The Contractor project manager has to provide the best case, worst case, and most likely case EACs. Then the customer project manager calculates the straight-line IEAC and puts that in here. That’s where the project is projected to operate in the future as it has operated in the past. If that is how the project operates, this is where it will be at the end.
Here is an expanded illustration of the WBS/RAM and the resultant Control Account, which exists to capture scope of work measured in effort; materials; equipment; or any other resource consuming work. However, the control account is not the lowest level at which planning takes place. A control account is further divided into work packages and planning packages. Work packages are near term efforts that can be planned in sufficient detail to enable meaningful performance measurement. Planning packages represent work in the future about which not enough is known to do detail planning. (More on Planning Packages later.) Both work packages and planning packages contain a scope of work and time-phased budgets that sum to the control account’s time-phased budget. Work Packages are usually decomposed to measurable activities, each of which consumes time and resources as we already defined them. Level of detail parameters--also a product of the planning process we already defined--will govern the size of each Control Account's resources, both in time and monetary units. You and your company--working with the customer--will decide on the size of the Control Accounts.
Data Item Description DI-MGMT-81334C places the Work Breakdown Structure and the associated dictionary on contract. As stated previously, the first three levels of the WBS are usually fixed by the procuring agency. The contractor is then required to further refine the Work Breakdown Structure and develop definitions for each WBS element by compiling the dictionary.
The data item description for earned value reporting has some very specific requirements earning the estimate at complete.
This is one area where the data item description demands that risks and opportunities be considered the development of the project forecast.
In fact, the use of risks and opportunities in developing these forecasts should be explained in the project report
This is the Integrated Program Management Report (IPMR) Format 1. It is delivered monthly and is essentially the same as the CPR Format 1. Some of the block sizes are different such as Block 5.h. and Block 6. Column (1).
There are four responses or strategies to risk:
Some risks are part of doing business. We have a lot of experience in our company and we know how to be prepared for most events we encounter because we have seen them before. Having a detailed plan and schedule is a risk acceptance strategy.
The risk may be more consequential than project funding can absorb. Therefore, we purchase insurance for certain risk events. If the event occurs, we have the resources to cope with the event. Likewise, engaging a specialty contractor to perform a specific function (like X-rays of welds) is also a risk reduction tactic: engage the organization that does the specialty task for a living.
Some risks require a specific plan that may include active participation by other organizations. Jobsite accidents or breaches of security can be catastrophic, so an aggressive safety and security program can minimize risks and lost time associated with those types of events.
Excluding the risk includes contract language like Force Majeure. The massive tornado, the earthquake, a wildfire, etc., are classified in Contract language as Force Majeure events for which schedule relief is provided if the event occurs.
One of the requirements the integrated Master schedule data item description is that efforts identified in the risk mitigation planning area of the risk management register should be contained in the integrated Master schedule and identified with their relationship to the risk management register.
This example shows coding the integrated Master schedule that provides that relationship back the risk management register.
Is coding by the way for the schedule to be grouped and sorted by risk items instead of the normal sort by to ask or date or other structure such as the work breakdown structure. Having a schedule group and sorted and displayed by risk item is a powerful way to be able to communicate the project risk situation and plans for mitigation.
As a project progresses and actual events and costs do not follow plan (the third certainty after death and taxes), funding requirement’s will change if the desire is to complete the scope of work within the original schedule.
As the situation changes, companies must continually monitor the elements that make up the funds requirement. If material commitment are falling behind schedule, funds may not be needed as soon as planned. If actual costs are exceeding the budget plan, funds may be needed sooner than planned. Note that we did NOT say “actual costs are exceeding earned value” – this is the only instance in earned value management where expenditure variance (actuals versus budget) is important.
The project’s Estimate To Complete considers these possibilities and replaces the budget profile as the basis for forecasting funding requirements. In the example, the red line depicts a revised funding forecast based on the actual costs to date, the ETC, and the other factors previously mentioned that exceeds the current authorized funding. If the customer can support the revised profile, the ETC/EAC process is complete. However, if the customer cannot support this profile, a new ETC plan must be developed to bring the funding requirements within the customer’s capability. Usually, this results in a schedule delay because the customer cannot get the required additional funds until a following year.
What it is basically saying is this. Cumulative to date, from the inception of the project to the present reporting period, the project has been operating at an efficiency of .875 (87½% efficiency). For every dollar spent, 87.5 cents of earned value was accomplished. The To Complete Performance Index (TCPI) says to bring the job in for 230,000, for every dollar spent, $.93 of work must be accomplished (earned value).
What information is required before answering that question?
Well, one important question is how much work is there left to do? How far along is the project? What is the % complete? In this example, the work remaining is about 140,000. So, for the first third of the project, the cost efficiency was about 87.5%. For the last two thirds, the project will have to operate at about .93% cost efficiency to bring the job in on budget at 230,000 dollars spent.
Government studies of over 500 contracts indicate that the CPIe almost never improves after a contract is 20% complete. Dr. David Christensen, who was then at the Air Force Institute of Technology, found in a study of 155 contracts between 1971 and 1991 that the cumulative CPIe stabilizes at the 20% complete point. At the 50% complete point, variances from the efficiency at the 20% complete point were found to be only +/- 8%. Common reasons for this are front loading of budget and depletion of management reserve in early phases of the contract. On production contracts the receipt of firm fixed price material can give artificially favorable contract CPIe’s in early contract stages. On R&D efforts, costs accelerate after early contract stages when testing problems occur and the pressure of behind schedule delivery situations start to impact costs.
So how can this newfound information (that the CPI never gets better after the project is 20% complete) be used? It can be used to calculate an IEAC.
As Paul showed on an earlier slide, an EVMS comprises different elements when it comes to supporting software tools. A fundamental piece is the ERP system that does cost collection, procurement, finance & billings and feeds these actuals to the EV engine. Unanet provides all the capabilities shown here managing projects people and financials to support this. Covering planning, execution, monitoring, invoicing and accounting.
Where our customers have a formal EVMS requirement we have worked with forProject that delivers all the capabilities needed in an EV Engine in conjunction with Unanet in order to satisfy EIA 748 requirements, including schedule integration with leading scheduling tools, and additional reporting as needed.
And before we get to answer any questions that have been submitted, here is one public service announcement: every year we publish an industry benchmark working with a leading accounting firm. We’d appreciate it if you can complete our survey at the link shown here, and also we welcome you to visit Unanet.com where you can download the 2019 report from the website home page. It’s packed with great metrics and trends to help you manage your business.
On behalf of Unanet and Humphreys Associates we thank you so much for attending our webcast and please reach out to Paul or myself if you have any questions that were not covered today. We hope you all have a great day.