NPS Proceedings of the 14Th Annual Acquisition Research

Total Page:16

File Type:pdf, Size:1020Kb

NPS Proceedings of the 14Th Annual Acquisition Research SYM-AM-17-34 Proceedings of the Fourteenth Annual Acquisition Research Symposium Wednesday Sessions Volume I Acquisition Research: Creating Synergy for Informed Change April 26–27, 2017 Published March 31, 2017 Approved for public release; distribution is unlimited. Prepared for the Naval Postgraduate School, Monterey, CA 93943. Acquisition Research Program Graduate School of Business & Public Policy Naval Postgraduate School The research presented in this report was supported by the Acquisition Research Program of the Graduate School of Business & Public Policy at the Naval Postgraduate School. To request defense acquisition research, to become a research sponsor, or to print additional copies of reports, please contact any of the staff listed on the Acquisition Research Program website (www.acquisitionresearch.net). Acquisition Research Program Graduate School of Business & Public Policy Naval Postgraduate School Table of Contents Keynote: Vice Admiral David C. Johnson, USN—Principal Military Deputy, Assistant Secretary of the Navy for Research, Development and Acquisition .. 1 Plenary Panel: The 809 Panel. Reviewing the Regulatory and Legislative Framework to Improve the Efficiency and Effectiveness of Defense Acquisition ................................................................................................................................... 3 Panel 2. Maximizing Contracting Effectiveness .................................................... 5 Analyzing the Effects of Source Selection Method, Acquisition Type, and Service Component on Acquisition Outcomes .................................................................... 7 Data Consolidation of Disparate Procurement Data Sources for Correlated Performance-Based Acquisition Decision Support ............................................... 23 Customizing the Use of TINA (Truth in Negotiations Act) in the DoD ................... 40 Panel 3. Improving DoD Software Design and Sustainment .............................. 55 The Policies and Economics of Software Sustainment: DoD's Software Sustainment Ecosystem ....................................................................................... 56 Software Vulnerabilities, Defects, and Design Flaws: A Technical Debt Perspective .......................................................................................................... 67 Applying the Fundamentals of Quality to Software Acquisition ............................ 76 Panel 4. Defense Acquisition After Shocks to the System ................................ 85 Post–Milestone B Funding Climate and Cost Growth in Major Defense Acquisition Programs .............................................................................................................. 86 Measuring the Impact of Sequestration and the Defense Drawdown on the Industrial Base...................................................................................................... 98 Panel 5. Contemporary Issues in Contracting................................................... 119 Overseas Contingency Operations Contracts After Iraq: Enabling Financial Management Research and Transparency Through Contract Labeling ............. 120 Use of Incentives in Performance-Based Logistics Contracting: Initial Findings 139 Price Analysis on Defense Logistics Agency (DLA) Contracts ........................... 158 Panel 6. Enabling Technology Transition .......................................................... 179 Accelerating Innovation—From S&T Labs to Acquisition Programs ................... 180 Effectively Implementing Policies That Mandate the Use of Technology—A Grounded Theory Study ..................................................................................... 189 CREATE: Accelerating Defense Innovation With Computational Prototypes and High Performance Computers ............................................................................ 218 Panel 7. Evolving Cost Estimating Methodology .............................................. 239 Empirical Cost Estimation Tool (PMS 320) ........................................................ 240 Acquisition Research Program: Creating Synergy for Informed Change - iii - Estimating the Estimate: Toward a Quick and Inexpensive Method for Weapons System Cost Estimation ..................................................................................... 263 Determining the Value of a Prototype ................................................................. 274 Panel 8. Cultivating the Future Acquisition Workforce .................................... 287 Army Contracting Workforce Organizational Climate Assessment ..................... 289 Understanding Defense Acquisition Workforce Challenges ............................... 298 2016 Assessment of the Civilian Acquisition Workforce Personnel Demonstration Project ................................................................................................................ 312 Panel 9. Enabling Cybersecurity ........................................................................ 315 Cybersecure Modular Open Architecture Software Systems for Stimulating Innovation ........................................................................................................... 316 Security Measurement—Establishing Confidence That System and Software Security Is Sufficient ........................................................................................... 335 Decision Support for Cybersecurity Risk Assessment ........................................ 343 Panel 10. Thoughts on Management of Complex Systems Acquisition ......... 351 A Systems Theoretic-Based Framework to Discover Pathologies in Acquisition System Governance ........................................................................................... 352 Optimal Selection of Organizational Structuring for Complex Systems Development and Acquisitions ........................................................................... 377 A Systems Complexity-Based Assessment of Risk in Acquisition and Development Programs ...................................................................................... 396 Acquisition Research Program: Creating Synergy for Informed Change - iv - SYM-AM-17-034 Proceedings Of the Fourteenth Annual Acquisition Research Symposium Wednesday Sessions Volume I Acquisition Research: Creating Synergy for Informed Change April 26–27, 2017 Published March 31, 2017 Disclaimer: The views represented in this report are those of the author and do not reflect the official policy position of the Navy, the Department of Defense, or the federal government. Acquisition Research Program: Creating Synergy for Informed Change - v - THIS PAGE INTENTIONALLY LEFT BLANK Acquisition Research Program: Creating Synergy for Informed Change - vi - Keynote: Vice Admiral David C. Johnson, USN— Principal Military Deputy, Assistant Secretary of the Navy for Research, Development and Acquisition Vice Admiral David C. Johnson, USN—the son of a Navy captain and a Pensacola, FL, native, graduated from the U.S. Naval Academy in 1982 with a Bachelor of Science in Aerospace Engineering. Upon commissioning, Johnson reported to Trident Refit Facility in Bangor, WA, where he served as docking officer, qualified as ship superintendent at Puget Sound Naval Shipyard, and earned his engineering duty dolphins. Johnson graduated from the Massachusetts Institute of Technology in 1989 with a naval engineer degree and a Master of Science in mechanical engineering. Subsequently, Johnson held submarine acquisition and repair positions at the Supervisor of Shipbuilding in Groton, CT; as a waterfront coordinator delivering Ohio-class submarines and later as the program manager’s representative for the Virginia-class submarine; at Trident Refit Facility Bangor as the planning officer; and at Program Executive Officer (PEO) Submarines as the assistant program manager for USS Jimmy Carter (SSN 23). Johnson became major program manager for the Virginia Program Office (PMS 450) in 2005. Under his guidance, the Virginia program reduced overall cost by $4 billion and delivered four submarines to the fleet. The program was awarded the 2007 DoD Value Engineering Award and the 2008 David A. Packard Award for Acquisition Excellence. Johnson also established and served as the first Undersea Enterprise chief technology officer. Johnson’s flag tours include PEO Submarines, deputy commander for Undersea Technology (SEA 073), deputy PEO Submarines for the Ohio SSBN Replacement Program, and commander for the Naval Undersea Warfare Center. In October 2015, he assumed responsibilities as principal military deputy for the Assistant Secretary of the Navy Research, Development, & Acquisition. Johnson has received various personal and campaign awards, including the Defense Service Medal, Legion of Merit, and the Meritorious Service Medal with three gold stars. Acquisition Research Program: Creating Synergy for Informed Change - 1 - THIS PAGE INTENTIONALLY LEFT BLANK Acquisition Research Program: Creating Synergy for Informed Change - 2 - Plenary Panel: The 809 Panel. Reviewing the Regulatory and Legislative Framework to Improve the Efficiency and Effectiveness of Defense Acquisition Wednesday, April 26, 2017 9:30 a.m. – Chair: Moshe Schwartz, Executive Director, 809 Panel 11:00 a.m. Current Research Agenda for the 809 Panel and Initial Findings William A. LaPlante, Vice President, Intelligence Portfolio, National Security Engineering Center Future Research Agenda Joseph W. Dyer, VADM, USN (Ret.),
Recommended publications
  • Ebook - Informations About Operating Systems Version: August 15, 2006 | Download
    eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org AIX Internet: AIX AmigaOS Internet: AmigaOS AtheOS Internet: AtheOS BeIA Internet: BeIA BeOS Internet: BeOS BSDi Internet: BSDi CP/M Internet: CP/M Darwin Internet: Darwin EPOC Internet: EPOC FreeBSD Internet: FreeBSD HP-UX Internet: HP-UX Hurd Internet: Hurd Inferno Internet: Inferno IRIX Internet: IRIX JavaOS Internet: JavaOS LFS Internet: LFS Linspire Internet: Linspire Linux Internet: Linux MacOS Internet: MacOS Minix Internet: Minix MorphOS Internet: MorphOS MS-DOS Internet: MS-DOS MVS Internet: MVS NetBSD Internet: NetBSD NetWare Internet: NetWare Newdeal Internet: Newdeal NEXTSTEP Internet: NEXTSTEP OpenBSD Internet: OpenBSD OS/2 Internet: OS/2 Further operating systems Internet: Further operating systems PalmOS Internet: PalmOS Plan9 Internet: Plan9 QNX Internet: QNX RiscOS Internet: RiscOS Solaris Internet: Solaris SuSE Linux Internet: SuSE Linux Unicos Internet: Unicos Unix Internet: Unix Unixware Internet: Unixware Windows 2000 Internet: Windows 2000 Windows 3.11 Internet: Windows 3.11 Windows 95 Internet: Windows 95 Windows 98 Internet: Windows 98 Windows CE Internet: Windows CE Windows Family Internet: Windows Family Windows ME Internet: Windows ME Seite 1 von 138 eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org Windows NT 3.1 Internet: Windows NT 3.1 Windows NT 4.0 Internet: Windows NT 4.0 Windows Server 2003 Internet: Windows Server 2003 Windows Vista Internet: Windows Vista Windows XP Internet: Windows XP Apple - Company Internet: Apple - Company AT&T - Company Internet: AT&T - Company Be Inc. - Company Internet: Be Inc. - Company BSD Family Internet: BSD Family Cray Inc.
    [Show full text]
  • IA-64 Program Overview
    IA-64IA-64 ProgramProgram OverviewOverview Ronald E Curry Director of Marketing IA-64 Processor Division Intel Corporation Intel ® Labs AgendaAgenda l The IA-64 Opportunity l IA-64 Program Update l Get Started on IA-64 Today Intel ® Labs IA-64IA-64 NextNext GenerationGeneration ArchitectureArchitecture Performance IA-64 Architecture: n Explicit Parallelism n Predication n Speculation n Massive Resources Superscalar Architectures 1.5 - 3 instructions / cycle CISC/RISC < 1 instruction / cycle 20-30% increase per year from semiconductor technology advances .3 ins / cycle Time Greater room for growth than traditional architectures Intel ® Labs IAIA ServerServer andand WorkstationWorkstation RoadmapRoadmap .. .. .. Madison .. IA-64 Perf .. .. ExtendsExtends IAIA Headroom,Headroom, Deerfield ScalabilityScalability andand AvailabilityAvailability IA-64 Price/Perf forfor thethe MostMost McKinley DemandingDemanding EnvironmentsEnvironments .. .. .. Future IA-32 Merced Performance Foster Cascades OutstandingOutstanding ® Pentium III Xeon™ PerformancePerformance forfor Processor 3232 BitBit VolumeVolume AppsApps ’99 ’00 ’01 ’02 .25µ .18µ .13µ Performance, Price/Performance, Scalability, Availability, Compatibility Intel ® Labs MercedMerced PublicPublic CommitmentsCommitments Third Party Operating Software Workstation Enterprise OEMs Vendors System Tools & Inf. Software Software Vendors Vendors Vendors Vendors • Bull • Adaptec • Compaq • EPC • Adobe • Ariba • Compaq • American • HP • Hummingbird • Avid • Baan • Data General Arium • IBM/SCO • IBM •
    [Show full text]
  • Case: 3:21-Cv-00031 Document #: 1 Filed: 03/31/21 Page 1 of 57
    Case: 3:21-cv-00031 Document #: 1 Filed: 03/31/21 Page 1 of 57 lIN THE DISTRICT COURT OF THE VIRGIN ISLANDS DIVISION OF ST. THOMAS AND ST. JOHN XINUOS, INC., ) ) Plaintiff, ) Civil Action No. __________ ) v. ) ) JURY TRIAL DEMANDED INTERNATIONAL BUSINESS ) MACHINES CORP. and RED HAT, ) INC. ) ) Defendants. ) ) COMPLAINT Case: 3:21-cv-00031 Document #: 1 Filed: 03/31/21 Page 2 of 57 COMPLAINT 1. Plaintiff Xinuos, Inc. (“Xinuos”), for its Complaint against Defendants International Business Machines Corp. (“IBM”) and Red Hat, Inc. (“Red Hat”) alleges on knowledge as to itself, its own acts and facts known to it and reasonable inferences therefrom, and on information and belief as to all other matters, as follows: 2. This case is simple. IBM and Red Hat conspired to illegally corner a market and crush competition. First, IBM stole Xinuos’ intellectual property and used that stolen property to build and sell a product to compete with Xinuos itself. Second, stolen property in IBM’s hand, IBM and Red Hat illegally agreed to divide the relevant market and use their growing market powers to victimize consumers, innovative competitors, and innovation itself. Third, after IBM and Red Hat launched their conspiracy, IBM then acquired Red Hat to solidify and make permanent their scheme. Fourth, IBM has been misleading its investors by falsely claiming all infringement claims against IBM regarding the copied code have been waived. 3. IBM and Red Hat have engaged in this well-worn, anticompetitive conduct in order to corner the market for operating system software that companies rely on to use servers.
    [Show full text]
  • IBM and ORACLE COLLABORATE to ADVANCE PROJECT MONTEREY Submitted By: Pleon Monday, 15 November 1999
    IBM AND ORACLE COLLABORATE TO ADVANCE PROJECT MONTEREY Submitted by: Pleon Monday, 15 November 1999 -Oracle Plans to Deliver Key Technologies within AIX, Monterey/64- IBM and Oracle today announced a comprehensive initiative in support of AIX and Monterey/64*. As part of this initiative, IBM and Oracle will offer Oracle Internet Directory within AIX and Monterey/64 as a directory option to customers. Furthermore, Oracle expects to port its database and application suites, currently available on AIX, to Monterey/64. This collaboration significantly advances Project Monterey, which is expected to provide customers with a secure and reliable UNIX platform from which to deploy their critical e-business applications. "By offering Oracle technology and applications with AIX and Monterey/64, customers will have increased choice and flexibility to implement new e-business solutions quickly and easily," said Rajiv Samant, general manager, UNIX, IBM. "The agreement marks an expansion of the business and technology relationship between IBM and Oracle on AIX and Monterey/64. The expected addition of Oracle's database and application suites is a further milestone in making the Project Monterey product line the leading UNIX platform for customers and software providers." "The integration of Oracle technology into AIX and Monterey/64 moves us toward solving several key challenges our customers face in becoming effective e-businesses," said Michael Rocha, senior vice president of Platform Technologies, Oracle Corporation. "Together, Oracle and IBM are providing a scalable, reliable solution across a broad spectrum of computing architectures that creates lasting stability, quality and reliability for our customers. This agreement helps make AIX and Monterey/64 a preferred Oracle platform for its strategic enterprise UNIX on IBM's POWER and Intel's IA-64 architectures." "Oracle's support for Monterey/64 is a tremendous step forward in delivering the industry's leading enterprise UNIX platform for Itanium processor-based systems," said Doug Michels, SCO's CEO and president.
    [Show full text]
  • Project Monterey
    IBM Servers Project Monterey: A Strategic Approach to Business Computing December 1999 Project Monterey provides a way to gain the full Changing the rules benefits of UNIX servers today and tomorrow. Around the world, organizations are using e-business solutions to rewrite the rules of competition. Not only are they buying and selling over the Internet — they’re using e-business to Leading the way reinvent the enterprise, creating innovative new business models that let them deliver higher levels Project Monterey is a major UNIX operating of customer value and gain a competitive edge. system initiative led by IBM®, joined by SCO, with participation from Intel® as well as major hardware Advancements in server technology have helped and software companies from around the world. enable the e-business transformation. Servers are Under the Project Monterey banner, IBM is the engines that drive e-business; they provide the working with SCO and others to deliver a single power that permits an organization to respond UNIX product line that will run on systems based quickly and precisely in an e-business world. As a on IBM Power and Intel 32- and 64-bit result, servers now play a key role in the strategic architectures. design and success of the business. The goal is simple: to produce a single UNIX Many organizations are choosing servers running product line with broad industry support in order to UNIX®-based solutions as being uniquely suited to provide organizations with the widest choice of this strategic transformation. The UNIX operating critical business solutions, leadership technology system offers the qualities of service — such as and the flexibility to run across servers ranging performance, reliability, manageability and from the workgroup to the data center.
    [Show full text]
  • RS/6000 Systems Handbook 2000 Edition
    RS/6000 Systems Handbook 2000 Edition The ideal deskside reference for the latest RS/6000 models and features Hundreds of tables and figures to accelerate your research A required reading for all RS/6000 and AIX professionals Jana Babnik-Gomiscek Volker Haug Jeanine Indest Stephen Lutz Shyam Manohar Irene D. Sideris Scott Vetter ibm.com/redbooks SG24-5120-01 International Technical Support Organization RS/6000 Systems Handbook 2000 Edition August 2000 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix K, “Special Notices” on page 773. Second Edition (August 2000) This edition applies to IBM RS/6000 Models 140, 150, 170, B50, 260, 270, F50, F80, H50, H70, H80, M80, S7A, S80, SP, and NUMA-Q. Related software offerings include AIX Version 4.3, program number 5754-C34, and subsequent releases. This document created or updated on August 9, 2000. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JN9B Building 003 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1999, 2000. All rights reserved. Note to U.S Government Users – Documentation related to restricted rights – Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures.................................................. xvii Tables....................................................xxi Preface................................................. xxvii The Team That Wrote This Redbook ...............................xxvii CommentsWelcome...........................................xxxi Chapter 1.
    [Show full text]
  • Dpus: Acceleration Through Disaggregation
    DPUS: ACCELERATION THROUGH DISAGGREGATION Hussein Baligh Ebrahim Serag Senior Advisor, Sales Engineer Analyst Sales Engineer Analyst Dell Technologies Dell Technologies [email protected] [email protected] Sameh Talaat Yehia Gaballah Senior Advisor, Customer/Technical Training Sales Engineer Analyst, Data Protection Solutions Dell Technologies Dell Technologies [email protected] [email protected] Knowledge Sharing Article © 2020 Dell Inc. or its subsidiaries. The Dell Technologies Proven Professional Certification program validates a wide range of skills and competencies across multiple technologies and products. From Associate, entry-level courses to Expert-level, experience-based exams, all professionals in or looking to begin a career in IT benefit from industry-leading training and certification paths from one of the world’s most trusted technology partners. Proven Professional certifications include: • Cloud • Converged/Hyperconverged Infrastructure • Data Protection • Data Science • Networking • Security • Servers • Storage • Enterprise Architect Courses are offered to meet different learning styles and schedules, including self-paced On Demand, remote-based Virtual Instructor-Led and in-person Classrooms. Whether you are an experienced IT professional or just getting started, Dell Technologies Proven Professional certifications are designed to clearly signal proficiency to colleagues and employers. Learn more at www.dell.com/certification 2021 Dell Technologies Proven Professional Knowledge Sharing 2 Table of
    [Show full text]
  • Application of Vmware Vprobes to Debugging of a Segmentation Based Separation Kernel
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2009-06 Application of VMware VProbes to debugging of a segmentation based separation kernel Sanders, Kyle Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/48137 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS APPLICATION OF VMWARE VPROBES TO DEBUGGING OF A SEGMENTATION BASED SEPARATION KERNEL by Kyle Sanders June 2009 Thesis Advisor: Cynthia E. Irvine Second Reader: David J. Shifflett Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK ii Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704–0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704–0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202–4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD–MM–YYYY) 2.
    [Show full text]
  • Plaintiff, V. I
    Case 2:03-cv-00294-DN Document 1160 Filed 02/08/16 Page 1 of 65 UNITED STATES DISTRICT COURT DISTRICT OF UTAH, CENTRAL DIVISION THE SCO GROUP, INC., A DELAWARE ORDER GRANTING IBM’S [783] CORPORATION; MOTION FOR PARTIAL SUMMARY JUDGMENT Plaintiff, 2:03-CV-00294-DN v. District Judge David Nuffer INTERNATIONAL BUSINESS MACHINES CORPORATION, Defendant. This case arises out of the relationship between The SCO Group, Inc. (“SCO”) and International Business Machines Corporation (“IBM”) regarding IBM’s production of its LINUX operating system. SCO held a majority of the UNIX-on-Intel market with its UNIX operating system in 1998 when IBM and SCO agreed to collaborate to produce a new operating system, Project Monterey. SCO claimed that IBM used this project to gain access SCO’s UNIX source code and then copied thousands or millions of lines of that code into LINUX. Because LINUX was offered at no cost in the open-source community, it rapidly displaced UNIX, and SCO’s UNIX sales rapidly diminished. SCO publicized the alleged copyright infringement and the alleged wrongs committed by IBM, and IBM argued that SCO’s tactics were improper and in bad faith, and that it had the right to use any lines of code it added to LINUX. Previously in this litigation, many claims have been resolved. This order addresses SCO’s tortious interference claims, granting summary judgment on those claims in favor of IBM. 1 Case 2:03-cv-00294-DN Document 1160 Filed 02/08/16 Page 2 of 65 TABLE OF CONTENTS Table of Contents ...........................................................................................................................
    [Show full text]
  • An Investigation of How Commercial Software Companies Should React to Open Source Software
    An Investigation of How Commercial Software Companies Should React to Open Source Software UW CSEP 590 TU Course Project December 10, 2004 Patrick Haluptzok, Bipin Karunakaran, Rodrick Megraw, Magdalene Tatum, James Welle, and Song Xue Abstract Open source software began as the hobby of a small number of programmers and has developed today into a worldwide phenomenon that is a viable economic alternative to proprietary software. As a proprietary software company, it is essential that you understand open source and how to interact with this type of software. You may choose to compete with open source or embrace it into your business model, but ignoring open source is not a viable option. We present this paper as a guide to open source software. First, we discuss what open source is and explain its history. We also explain the general advantages and disadvantages of open source software. Second, we explain the myriad of open source licenses and how they work. Next, we discuss how your workforce can safely and effectively coexist and interact with open source software. In the fourth section of the paper, we discuss the different open source business models and the benefits of each. Fifth, we discuss the specific legal issues involved with open source software and we highlight the recent SCO litigation. Finally, we present a case study on Microsoft Windows and other proprietary platforms and investigate how they have reacted to the open source phenomenon. We also investigate possible open source strategies for the Windows operating system. Haluptzok, Karunakaran, Megraw, Tatum, Welle, and Xue 2 0 Table of Contents 0 Table of Contents.......................................................................................................
    [Show full text]
  • Raja Srinivasan Director, Intel Division Oracle Corporation
    RajaRaja SrinivasanSrinivasan Director,Director, IntelIntel DivisionDivision OracleOracle CorporationCorporation * Third party marks and brands are the property of their respective owners Intel Labs AgendaAgenda l Oracle Products and Solution Stack – Industry can expect IA-64 Oracle platform at launch l Supported Platforms – Oracle solution will be available on all major IA64 OS platforms l IA-64 Challenges – OEM and ISVs need to address certain concerns such as co-existence of platforms l Industry Participation – Oracle platform taking advantage of industry standards l Resource Kits – Use these to build an IA64 solution on top of Oracle Intel Labs OracleOracle LeadsLeads UNIXUNIX RDBMSRDBMS MarketMarket UNIX RDBMS Market Share 1998 7% 4% 7% 8% 13% Oracle Informix IBM DB2 Sybase NCR Others 61% Intel Dataquest, March 1999 Labs OracleOracle LeadsLeads WindowsWindows NTNT RDBMSRDBMS MarketMarket Windows NT RDBMS Market Share 1998 10% 3% 12% Oracle Microsoft IBM DB2 Sybase 30% Others 45% Intel Dataquest, March 1999 Labs TopTop BusinessBusiness WebWeb SitesSites • Marshall Industries • Cisco Systems • Bay Networks • Dell 2X2X W2IW2I • Compaq 3RZH3RZH • Federal Express UHG%\UHG%\ 2UD2UD • IBM FOHFOH • W.W. Grainger • 3 COM • First Union Corp Source: NetMarketing Intel Labs TopTop ConsumerConsumer WebWeb SitesSites • 1800 Flowers • Amazon • CDNOW • Charles Schwab 2XW2XW 3RZH3RZH 2I2I • Cisco UHG%\UHG%\ • Dell Computers 2UD2UD • E-Trade FOHFOH • NECX • OnSale • REI Intel Source: Giga Group 1998 Labs Oracle:Oracle: CompleteComplete andand IntegratedIntegrated
    [Show full text]
  • United States Court of Appeals for the Tenth Circuit
    Appellate Case: 16-4040 Document: 01019681211 Date Filed: 08/31/2016 Page: 1 Docket No. 16-4040 In the United States Court of Appeals for the Tenth Circuit THE SCO GROUP, INC., a Delaware corporation, Plaintiff Counterclaim Defendant-Appellant, – v. – INTERNATIONAL BUSINESS MACHINES CORPORATION, Defendant Counterclaimant-Appellee. _____________________________ Appeal from a Decision of the United States District Court for the District Of Utah, Salt Lake City, Case No. 2:03-cv-00294-DN, Honorable David O. Nuffer, U.S. District Judge SEALED OPENING BRIEF OF PLAINTIFF COUNTERCLAIM DEFENDANT-APPELLANT Oral Argument Is Requested STUART H. SINGER EDWARD NORMAND BOIES, SCHILLER & FLEXNER LLP JASON C. CYRULNIK 401 East Las Olas Boulevard, Suite 1200 BOIES, SCHILLER & FLEXNER LLP Ft. Lauderdale, Florida 33301 333 Main Street (954) 356-0011 Telephone Armonk, New York 10504 (954) 356-0022 Facsimile (914) 749-8200 Telephone [email protected] (914) 749-8300 Facsimile [email protected] [email protected] BRENT O. HATCH MARK F. JAMES HATCH, JAMES & DODGE, P.C. 10 West Broadway, Suite 400 Salt Lake City, Utah 84101 (801) 363-6363 Telephone (801) 363-6666 Facsimile [email protected] [email protected] Attorneys for Plaintiff Counterclaim Defendant-Appellant Appellate Case: 16-4040 Document: 01019681211 Date Filed: 08/31/2016 Page: 2 CORPORATE DISCLOSURE STATEMENT Appellant, The SCO Group, Inc., is not owned by a parent corporation. No publicly held corporation owns 10% or more of SCO’s stock. On September 14, 2007, SCO filed a petition for reorganization under Chapter 11 of the Bankruptcy Code in the United States Bankruptcy Court for the District of Delaware.
    [Show full text]