KeyLogic Blog: Program and Project Management

Learn more about the advances and expertise our KeyLogic team brings to their respective fields.

  • Paperwork

    Why the Closeout Process is So Critical for Successful Defense Contracting

    Apr 19, 2016
    For the past 15 years, the world of defense agency contracting has benefited from a growth period that continues at a frenetic pace. More often in today’s defense contracting system, integration and cohesiveness between Federal and commercial entities makes efficiency and success dependent on the synergy between government and business.
  • EVM

    Why Should a Project Manager Care About Earned Value?

    Dec 11, 2013
    In simplest terms, Earned Value Management (EVM) is a method of measuring project performance. There are many ways to measure performance, and EVM is a well-known, standard method, mandated in the case of many government projects.
  • Confused Business Leader

    Setting Expectations: How a RACI Matrix Can Help Your Program

    Oct 30, 2013
    Documenting the parties who are responsible, accountable, consulted and informed is a standard way of establishing the lines of authority across each task within a program. A recommended way to document this is in a matrix format; the Project Management Body of Knowledge (PMBoK) calls this either a Responsibility Assignment Matrix (RAM) or Responsibility, Accountability, Consulted, Informed Matrix (RACI).
  • Review Process

    Government Funding Awards – Considerations for the Review Process

    Oct 23, 2013
    Review procedures are a crucial phase of the competitive funding process for any award. During this phase, applicants’ materials are distributed to and examined by expert reviewers using the same predetermined factors and criteria for each application. Choosing the appropriate review procedures for your circumstances ensures that vigilant reviews are conducted and, the best applicant is awarded. But what do you need to consider when choosing procedures to best match your needs?
  • Secure Lock

    Key Factors in Building and Maintaining a Secure Information System

    Oct 15, 2013
    Software Security, Cyber Security, Data Security, Network Security, Information Security. The list of terminology related to Information Security is seemingly endless. This factor in and of itself presents a risk to properly addressing Information Security , as it precludes industry professionals charged with the responsibility of protecting information from communicating effectively while opening the door to those who make their living by creating and exploiting confusion caused by this seemingly exponential proliferation of Interrelated jargon.
  • Magnify

    Isn't IV&V/V&V Just Testing?

    Oct 10, 2013
    My earlier blog entry on ”What is the Difference Between SQA and IV&V/V&V?” dealt directly with the primary misconception that Independent Verification and Validation (IV&V or V&V) was nothing more than performing tasks related to Software Quality Assurance. A secondary misconception is that V&V is simply testing of the software system.
  • CPIC

    What role does Enterprise Architecture (EA) have within a Capital Planning and Investment Control (CPIC) program and IT Investment Management (ITIM) methodologies?

    Oct 03, 2013
    CPIC and EA programs have synergistic touch points, that when integrated, can effectively support an effective ITIM program. EA can assist the CPIC process by providing recommendations to streamline the investments, eliminate duplication of effort and encourage adoption of technologies that are required to achieve the future state.
  • Federal IT Dashboard

    What are the processes to use eCPIC and the Federal IT Dashboard for IT investment management and submission of OMB Exhibit 53 and Exhibit 300?

    Sep 19, 2013
    In managing the US Department of Labor (DOL) IT portfolio, the KeyLogic Capital Planning and Investment Control (CPIC) team uses DOL and OMB tools to improve the performance of the DOL investments and overall portfolio. One of these tools is the Federal IT Dashboard (
  • Cup of Coffee

    Practical Assurance Case Design

    Sep 05, 2013
    Assurance cases are a formalized means of presenting the case, or argument, for the truth of a proposition. Derived from legal documentation and safety case heritage, the assurance case is designed to provide a level of confidence in the veracity of the proposition, or claim. In the Assurance Case for IV&V Project Planning and Scoping project the assurance case is used to explore use of assurance cases in a simplified but realistic spacecraft IV&V project.
  • Life saver

    Risk Management Essentials

    Sep 04, 2013
    We have all heard the term “Risk” tossed around. Companies claim to reduce risk all the time, but many are using this as a marketing term and not really adopting comprehensive risk management processes. Good risk management is not an optional activity or a marketing term! Rather, risk management processes and techniques should be applied throughout a project lifecycle as well as to internal company processes and procedures.