![]() |
John W Beck, PhD | ![]() |
AT&T Bell Labs
Enhanced Modular Signal Processor - System EngineerEMSP is a US Naval signal processor at the front-end of weapon systems to reduce digital sensor data to target data for input to data and display computer systems. My team and I developed computer simulators to demonstrate proof of concept and to optimize the 'principal of operations' early in the design phase of the program. EMSP is an advanced, distributed, parallel, data-flow architecture optimized for acoustic signal processing and supports modular expansion and technology insertion. The architecture is fault tolerant in that any circuit board can be dynamically removed from the system without interuption or degradation of performance. Twenty one of the twenty two integrated circuit chips were custom fabricated with zero defects. The last chip had one defect that was quickly identified and corrected. The software and hardware was developed in compliance with military standards. This process technology was later integrated by me into the AT&T Best Current Practices program.
Program Management - DSMCI attended the Program Management Course at the Defense Systems Management College in Fort Belvoir, VA (a 4½ month program). This course provided a comprehensive study of program management and an overview of the Department of Defense acquisition policy. It included management techniques from technical, business, policy, and other organizational fields. The course utilized small group discussion and work teams, computer-assisted simulations, case studies, decision exercises, and an extensive guest speaker program. Knowledge, technology, and lessons learned from this experience was integrated into the AT&T Government Systems technical project management discipline with the following benefits: I brought this knowledge and experience to the Software Technology Center years later as we developed the Best Current Practices program. AT&T Global Logon - AuthenticationThe AT&T Global Logon provides authentication services for over 5,000 internal applications and 375,000 employees, contractors, and partners. My task in early 2000 was to prototype the proposed architecture, optimize the configuration, and prove the system can support the expected load for the life of the service. A prototype system was developed, six servers running Silk Performer were used for load testing, and an approach to disaster recovery was formulated. In the first ten years of operation there were no outages and we achieved our target reliability of greater than 99.999%. Some of the original hardware is still in production (a scary thought).Recently, I was assigned the task of developing methods and procedures for top tier technical support. The business value that I established in this initiative include the following:
Identity Management - Role Based Access ControlIdentity Management includes web-based user interfaces and core technology provided by IBM Tivoli's Identity Management product. Role Based Access Control (RBAC) provides for the definition of roles in terms of services, servers, and databases. If a person becomes a member of a role, they will be assured to get accounts on the necessary services, servers, and databases automatically.Contingency planning provides for a large number of striking employees to be removed from roles and their replacement workers to be added to roles overnight. There are a thousand roles, tens of thousands of employees, and a very large number of accounts. A failure of this system would be catastrophic. Key aspects of the success of our contingency planning include: The support for contingency planning has made the Identity Management service more robust. |