comparemela.com

Doctor subcommittee will come to order at ask unanimous consent the chair could declare recess in a timer that objections order. Good morning everyone thank you for we are here today to discuss one of the most with the u. S. Arsenal. That is software. It is crucial to our ability very in the air, the sea come , onlinein space anderspace. Aircraft carriers will be able to leave our pier they can deliver a payload over its target we expect the system and code we rely on work when■j needed. Despite this was seo dartmenterg and prioritizing software. Congress do know when something is wrong and something is right or in something is working or w. We read the studies repeatedly noting the department struggles with software findings that are remarkably consistent the 1980s untilin today. Its fundamentally amiss. My hope is for the witnesses to not only describe the problem but contextualize where possible what is being done to date with the largest barriers have been to address these issues in a ma. I cannot think of a better set of witnesses in front of us today to help with thatm task r undersecretary for defensive acquisition and sustainment. Doctor Richard Murray professor of controlling and systems and bioengineering at caltech, and cochair of the 2019 Defense Innovation boards of Software Acquisition and senior fellow at the hudson institute. Today. You all for been with us i will not recognize the Ranking Member for his remarks. Thank you mr. Chair thank you Shalanda Young excellent witnesses. Looking forward to hearing from you. The department of defense and u. S. Government has been critical in the development of software and technology in this country. Representative of Silicon Valley i remember is our mission to the moon to the acquisition of semi conductors. We had not had the u. S. Government by semi conductors in the skill they did he would never seen the development of Silicon Valley and the technology. Now the innovation is happening in my district and in the private sector. To strengthen the collaboration betwee our department and defense and private sector in pr recognizing the dynamic nature of software and how softly it chgee need that innovation to keep us the Strongest Military country in the world. I am looking forward to your comments and your suggestions. Thank you, mr. Chairman. Thank you. Ill start the witnesses miss lord you are recognize her five minutes for opening thank youyo very much congressman for chairing this hearing and thank you for members of the subcommittee to in sockos on my former colleagues and now current colleagues. In ann era of strategic Competition Among technologically advanced powers software were shape the nation of deterrence and define a National Security advantage. The urgency to empower our defense and National Security both the best existing andain emerging technology is critical not only to preserve our freedom but also those of our partners and allies. Our nation has developed and operationalized Technology Solutions that have transformed our commercial sector. An intern, our everyday lives. Now we must harness and apply bolster superiority in theion to digital age. Given current geopolitical the stakes cannot be implementation in support a child of the moment to fall short now would not be just a bureaucratic come but a source of imminent risk to our ability to deter fight and win. The ability to quickly develop and deliver close the gap between information discovery and Mission Response is a defining differentiator in the global competition defense and intelligence agencies must develop, acquire, execute and maintain software to meet Current Mission needs while also having the agility to quickly respond to future threat environments the statutory regulatory and budgetary framework for these agencies are ripe for streamlining to build and maintain the Nation Software advantage. The department of defense procurement process is one of the greatest challenges and opportunities to Software Acquisition. Often software is purchased using the same approach that is traditionally employed for major hardware systems purchases. Typically this entails setting rigid requirements conducting a lengthy solicitation and ultimately years later facing costly sustainment contract to adapt software that is often obsolete upon delivery. Although alternative acquisition pathways exist there only as effective as an acquisition professionals ability to implement them. Funding professional training and development for acquisitiony have key skills for implementing the full spectrum of acquisition approaches will enable the best and most Innovative Software and technology to be quickly provided for our National Security workforce. Policies andmo procedures modern Software Development and delivery practices Software Development lifecycle, software as a service delivery, human centered design, and modern technology. Training the Acquisition Workforce is necessary but not sufficient to modernize Software Development and deployment. Resourcing must be available to, rapid and continuousde authority to operate and leadership must demand all relevant authorities procedures and processes are employed. My submitted testimony goes into more details on these items. I would like to close by acknowledging three efforts producg ommendations that might be useful to the gosubcommittee. One is the commission on planning programming budgeting and just last week produce our final report. Chairman rogers Ranking Member smith held a hearing in which we talked about recommendations that would help our software initiative. Two, the software Defense Coalition that is led by jane lee is producing actionableul recommendations for the subcommittee. And finally the Atlantic Council commission on Software Defined a warfare of which i serve is ctionable recommendation. I urge the committee to follow up on these. Thank you. Thank you, doctor murray you are recognize her five minutes. Undistinguished numbers in the subcommittee. Thank you for inviting me too speak with you this morning on Software Development and t. From 2016 to 22 known as a member of the board and cochaired along with michael that study on Software Acquisition processes. This was established in the 2018 and daa and our report was titled software is never done released in may 2019. The key findings of our report is congress and sabin talk about the importance of software struggling how to make better use of Software Support the National Security for decades. In many ways the report of 2019 was a rephrasing of the 1987 Defense Science Board Task force on military software with 32 years earlier. Which identified itself over 30 previous studies in the same topic. We described in our report Chapter Three we need to do we just need to figure how to actually do it to get to it. In our 2019 report we identify three thater important points to make. The first is speed and cycle time of the most important metrics for software. Being able to develop and deploy faster than adversaries means we can provide more advanced capabilities, respond to your adversaries be more responsive to endusers. Reduces risk reduces in reliability gives us a Tactical Advantage on the battlefield by allowing operation response inside our adversaries to observe. Second, software is made by people and for people so Digital Talent matters for dod resource policies a not conducive to attracting and retaining and promoting Digital Talent. Talented Software Developers and acquisition Personnel Software experience are often put in job which does not allow them to make use of those towns particular in the military working job may not recognize Software Develop an experiee dof the necessary skills exists and scenting advantage we put them in an environment wherets difficult to be effective. Third not all software is the same. Statutes regulations that govern the developed procurement develt sustainment of different systems. Software development is hardwar. Software should be developed deployed contested continues to improve using much different cycle time support infrastructure and maintenance strategies. Stop was never done must be managed as enduring capability y that treated differently. Inso preparing the recent repors on the implementation of some of the recommendations from the study about which we partnered with us see theyve made substantial progress in implementing many of our recommendations including establishing acquisition pathways for software, exploit appropriation categories allow software to be funded as a single budget item. These important steps and should be in addition to these actions on the process dod implemented actions on other primary and secondary recommendations from and continuous ato which dideli. As of april 2023 it appears the guidance foror containers is not yet been published. I would encourage dod to do so if it hasf÷ already. Another area of high importance is recruiting Digital Talent. Dod progress mind personnel for specialized teams and career track for Software Developer something we recommend. A correct Service Members allow dod to train retain the Skilled Workforce necessary to design build and test modn software systems. Finally an error thats completely different todaycl thn it was five years ago is the role of Artificial Intelligence and military system. The implication will be profound across all areas of society in the field is changing so rapidly its impossible to predict how a i will predict over the next three years. Moderate l■ models are writing code based on descriptions of the desired function and are being used in industry to speed development. In the future integral to testing deployment production of software as well. And for adversaries. Software for systems is too critical to fail we must find ways to harness those tools that fihe increased levels required in safety and missioncriticalal systems dod mustang top of the developments and of current u. S. Leadership being developed in the commercial sector. Congressmen with dod plays in the central moving forward thank you for your attention and i look forward to our discussion bro. Thank you doctor murray doctor pratt your recognize her thank you for inviting me here to speak. On such an important topic. Re an individual capacity by serve diverse roles offering the perspective on cutting edge of National Security technology and threats. Rod Techno Economic shifts which are reshaping the globall order in the vibrant commercial tech ecosystem. As you all know itus powerful is for economic productivity for government effective dues eric of our time strategic competition peoples republic of china. It is this. Competition advantage ultimately depends on the ability of one side to adapt mo by year mitigating weaknesses and building advantage. The kinds of questions we end up with in the military dimension of competition or things lik are our weapons systemsmi relevt against a relentless pace of new threats can commanders accessri. Can we invent new ways of fighting but the prc on back foot and dissuade aggression. These are the issues the department of defense must tackle if it wants to compete in every one of these issues now s. Even changing military unit tactics depends on a software update. Not your state whiteboard planni session. We need look no further than the battlefields of ukraine for evidence units which are able to change the software more quickly see better outcomes. So we face a choice. We can be victims of software cursing its bugs, delays and overruns are we can harness it for competitive advantage leveraging American Ingenuity arose talent base, and leading technology. That is our question can we create a Defense System built for evolution and adaptation . System built to compete my central message is this it will echo those of my fellow witnesses here. The process of gettinge from ama programmer into an operatiol system is critical. This is what is so different about software. We blur the line between development and what his what is operations using that same thing. Making this quick andoc robust s a necessary condition for competition. There are a handful of fort leading trailblazers in the department during this well today. But they remain in the minority they face daily struggles against organizations and processes built for another era. I call your attention to two actionable items for oversight. First enad1blingapid Software Deployment and updates through the ato process. Again it refers to the process of how the departm if software is safe to deploy and use. The second item, talentsy qualified Technical Expertise to guide Software Development and procurement. The first topic i will introduce an ways making software it resembles a potter molding wet clay. Forming into some finished pieces. When works with source codes it acts like wet wt clay aiken quickly adjusted, may fix it. Once the code has compiled, but, shipped and becomes fixed and brittle. The executable code only works in one particular type of process as we fix assumptions ab operating. It has so many dependencies need to f t the Engineering Team you need a cycle. And the process often makes is quite difficult. This is addressed in greater detail my written statement. On the second topic, technical Talent Software is a complex ma. Details matter. The bits of matter we hear these headline sometimes like one simple trip can Call Software or get to the cloud went software it rules them all or higher Silicon Valley. Those are great tools. Those are useful things. But navigating the complexity requires judgment and organic technical talent on the part of the department. The dod needs technical leaders driven by mission. It is not meet■ armst can attrat if given the right tools using things like Term Appointments and giving these peoplee autonomy. Thank you. Thank you doctor patsy. We will move into questioning. I will open operate you will hit on that. I hate to say it seems mike you guys should not leave im going to talk to you guys if you want to hang out. Yes, totally cool sit back down. The authority operates it seems like its improper medium fore. Software innovation into the departments. Software is updated every half second of every minutef hour of every day. It moves so fluidly. For the past 40 years the authority operates seem to be in down. Ill start with you ladies first. Whats the i do know and to report we dont never read. What is the actual fix for the pr■oblem . This is the forward lean in front of our adversaries. The system is failing its self. The challenge is the need for speed. And i believe there are two things that wele need to do. One, moved to continuous ato. Aa lot discussed. But continuous atos are not yet implemented. I would suggest drawing posture hearings will be a very good thing to ask dod leadership about two. Secondly, we are repeatedly across event programs, military services, agencies, not allowing reciprocal rights for atos. The samee is being reauthorized again and again. Those of the two key things i think we should push on picnics break down the silosfy between multiple partners . Absolutely. Not looking at discrete repetitive approvals. Right now theres only a requirement to approve 12 systems aso year which given the fact most of our systems run on hardware, software, andrf frightening. I completely agree. You think about continuous ato what do we need toe able to do . We need to be able to say the Software Needs to be updated. Hes be updated now the longer we wait the more risk we put more risk. How to get to the point where industry . My cell phone there will be at update in the next day or two theyve already figured out how to put an update out there thats not going to break all and satisfy their own security we need to do that was in the dod we need to find that that is. I think he should be asking on every program what is a cycle time this going into the software . How much of the cycle time is the ato process . If the ato process is more than a day there is a problem because iteeds to be a continuous ato needs to be something we automatically checked does it satisfy the security requirements . This is important cody got to be careful thatut what needs to get out there quickly are putting our workers at risk. Pat . Lex i agree very much with those comments. The ato is about the risk of using the software. About deploying the software but gets aligned with mission risk. Th p lost. Buying a body armor and you can separate these decisions of dented by the body armor doesnt meet the is it safe to use this on a mission doesnt help support the mission . With software these lines get blurred. I will say one of the places where you see progress in the department is where they tried to put these risks together. If you look at in the navy rpm w150 their Program Officers and Program Managers with both own the risk oftr the use of these soft on the Operational Network and the development of the software. You move those things together you tend to get more mission focused outcomes. These are the organizations which have been successfully able to use continuous atos. We expect some of his forte as doctor murray said we often focus on ato like the old Fashion Software model wein fort the rk■t of n updating the software. Of not deploying new features which will make us more successful in our mission. We become to focus on compliance checking the boxes did we meet the boxes we said we would diminish if the software do we a mission here. The most important thing is the cycle time to keep coming back to y. Updating and mitigating problems. If i may have one quick followup on that . I think we need to differentiate within the department between Risk Management and risk elimination. We are never going to elimina all risk. These tradeoffs are what take human judgment and what doctor pat is talking about. He also called out is very important for congress to recognize those individuals in the department who are leaning forward and demonstrating, embracing authorities, policies procedures. And i would say■. ■ i think shes moving along peo iws comments on the admirably thank you. Thank you. For all the young men and women sitting behind the witnesses, they are talking to you. You are the next generation that would keep this country ahead of nefarious act across then; glob. Highly recommend you play the state back because we are counting on you, do youu. Understand . Outstanding producer connie recognized five minutes. In my district we have a software challenge at apple or google they dont just go out software. In fact as the last thing they do. They have a mission and they figure things out. I have heard from people who consult the dod a worked at the dodst they buy new software to check off the box they have complied. This is innovating on the way the private sector does. Would you comment on how we ch culture . Other than getting to run these things . It comes down to investing in the human individuals are not trained to be smart buyers we cannot attract contemporary coders and so forth we will not change that culture. Right now we have a huge issue this is mentioned in our final report with the modernizing a lot of our business systems. Were pretty good at talking to we typically do not talk about innovative systems. We need to digitize those systems and attract individuals who wont work right now we ha f Software Specialist in the department because we are work on 10, 20, 30yearold software. And frankly there is not the knowledge as to what can be done. I suggest work with d8 you, charting the acquisitiont professionals on what a digital environment really is. Thank you. I completely agree with you inbut we cannot say this softwae is not doing what its supposed to do so lets go specify them put a bunch of requirements in are thats going to do that i go by that somehow in five years later the sink comes along. We see in Silicon Valley and other places we say we need a platform in that platform is an enduring capability but were going to search for ever delivering apps to cell phones forever. Were going be tracking and tras in space forever theres an enduring capability there there software is going to do that we need to think about that platform is something thats going to be updated, new and other things we are not going to say it lets write down their requirements for that by it and its done and its in a sit there for 10 or 20 years was something we need to say every are going to invest a certain amount of money and that software they develop team is going to do that. We need to create a system we capability we get into the mindset its absolutely possible weve seen in the commercial sector is part of the reason the u. S. Commercial sector so far ahead as we are able to jump on all those things. We have to do that within the dod i think their spots doing that we need to again amplify those we need to recognize those we need to do that more. One other thing i will say as i think we cease and that starting in the Software Acquisition but they appeardo soft. The sittinged on top of hardware in the hardware mindset dominates. Weve got to break out of that. Its that software also needs to be updated if■ youre looking at 22 there software on that but some should say that for a decade or more but much of that i things that should be updated on a one more question ill give you the chance to answer it. If there is a company in their awarded a second phase■f and grt is lot of the startups do their waiting for a year or year end a half to get sbir three. Is the n Silicon Valley and a lot of startups. Psis there a way to authorize a contracting officer to give a letter of that they are going to get the grant . So many of the started to dont make it. Yes. This a question on Acquisition Policy is there are a variety of tools the government can use theirs also limits for example a frequent limit that comes up i worked in antideficiency thing. Often you have to wait for funding to become available from a futurear year. The government cannot indicate advance notice. Some t report, its recommendation could create a directional flexibilities can be delegated down which could allow flexibility. Allow the same year flexing of our priorities of maybe move some money thats not being used to good purpose to advancing an spr phase three award. Following up on that a little bit as important to note right now the National Academies is running a study on recertification for just this very reason. And as danan mentioned we did nt have discrete budget line elements but had more capability elements we could allow peos agility. Especially in the air of execution to move money towards emerging technology and these smaller companies. Right now unfortunately in my opinion the process as an afterthought for most peos and pms. Theres not a lot of education on it and it is a little bit trickier to use it. So again educating the workforce is critical. Thank you. Mr. Gates you are recognized for. March 7 of this year aviation times. Com reported the tr three dod to combat code f3 five. The i do not know what it means to combat code something it sounds dangerous. So maybe you could explain what that is whether its a good idea . I am not sure until i like coding on the go. I will cite f35 is a perfect example of a program that looked where its critical for National Security. But frankly, to a large degree has excluded the Small Companies fo that is where the coding capability is. And i think having lived through the tr three drama if you will we need to decompose this and make sure when we are awarding the large contracts we are reaching out to the companies d. And again manage a risk dont eliminate risk and find a way to bring them in big. Aw heres a challengehese compae dying to get the contract they do all sorts of things to get these big old contracts to get wondered 80 milliondollar copy of 35. And then he went to protect the source code and not allow other innovators to access it to springboard and innovate off of it. As the f351 of these hardware dominated paradigm systems where the upgrthe upgrades needed forr fighter are now being executed through this combat coding system . Dont over the combat coding systems being is there but certainly the case it is a large Hardware Program thats used from what i can tell a very traditional process. You mean thats a critique. Yes as a critique i agree. The Software Components again some Software Components embedded Flight Control code is not something you should be■l changing every day. Others are doing logistics are things that we want to be agile about and want to take advantage of. How do we end those programs not that we should break the rules because now theres a crisis were going to do differently. But rather we have a welldefined way of putting software in there, checking atos. Part of the processes we net with the frequency of which were going to update theis software. What they say to a student updated frequently. And we need to be solesource and of course we cannot sure source chord with anyone else to the might be able to participate in that update. Soow do i break through that . Is a great question. Ill let dance a little bit e about it. You have to think about where the pieces of Software Going to come from but they all have to come necessary from when the manufacturer per. Will have to wake him up was smelling salts not every update has to come through them. So first let me add some operational context to this. Sometimes i think it is taught hard to understand how important lets just look at ukraine one of things you see ukrainian radios last three weeks before a counter comes along and they have to re program or change the way. Drop from 70 effectiveness to 6 6 effectiveness over a matter of a few months. Expect our majn System Program to use the processes and spent years planning a tackle refresh how do vendor lock. E to adapt the other some get a continuous ato to lock themselves in because its so expensive. You can spend a Million Dollars getting third ato process. But there are a set of principles these are known as congress put these in9i place. Miss lord oversaw a number of efforts these are poorly used. Manager is in charge of the acquisition, shall define modules and interfaces and make thoseors. To the government. Ol■÷ it works in that context. Putin in law poorly adopted. I greatly appreciate that itho further on ai and hypersonics. Ill be submit and those for the record thank you. Quick to reckon its a five minutes. Thanks are being your thoughts at the pentagonou for seven in the five ish years i have been here we have done a ton of hearings that look at this issue from one way problem of speeding up decisionmaking particularly as it relates to tech. To the point we are admiring the ma they need to spin up and speed up that string concept to feeling the technology of any kind software being some of the most complicated. It has led me too believe as even as someone who cares deeply about the pentagon interNational Security it is not o any one ofy its truly culture. Culture across administration. Culture across leaders. And i am not aimed burn it down kind of person saying the system doesnt work so we need to destroy it and start from zero. But it is separating yourself from the tech. If you clding for the day on one cultural change what would that be . Aware of the fact that pentagon has a lot of rules and restrictions and they useley ane does not have to adhere too. Its different than a small startt up. Its never going to be the same thing comparing the two is apples to speaking from culture what is the one thing you would change . I would ask a leadership to demonstrate smart risk smart riskmanagement benefits the war fighter in our nation. There many more rewards they can be given to those individuals whether civilians were in smart risks. Ed forward and t they manage risk and they do not try to eliminate it. And they move at the speed of need here. And i believe that leadership needs to speak up and make rewardindividuals who are doinge right thing and recognize that people will falter not to blame them if you will when everybodys looking for perfect being of good enough. A certain light now and Silicon Valley one o to visit its like people wear their mistakes as a badge of honor. I started a company it did not succeed but i learn these important lessons and now im on my Third Company look at this amazing stuff it was so strange as a pentagon official to visit pentagon and hear people talk about their feelings because of the pentagon you never talk about your failures precooked with all due respect i think congress has a piece of this. For short. Sir you got o line here. Its a great question i think you are right changing that culture if you look what happened in Silicon Valley or other places you seat turn of oureople are not there for 10, 20, 30 years doing this they come in for two years they start another company. How do we take advantage of the commer■cial sector bring them to government, put them in a position that skipping a couple levels and other things because they are super tales of the know what to do to get them in there. I think they will h culture beck why question require we doing it this move are reading it this way . I think thats what i would do if change the culture were not going toin change the culture by just taking people for their insane change i think we do that by bringing people and who looked different and think about things differently and thats very quickly in my reclaiming time. Fostering a culture of doers is really the key here. That is encouraging the accountabilityown to an individual Program Manager for the outcomes they achieve. When you are a decades Long Development and you only serve in a position for a few years it is very h sense of accountability, responsibility or pride in the outcomes that get delivered. But the great thing about software as you cans these delivery timelines and suddenly you can start to celebrate this. Combined with the suggestion doctor murray just made him bringing in people for shortomml industrymp you can get a vibrany and dynamism and the perspective and talent to drive results per. Thank you very much i yield back. Mr. Mccormick you are recognized for five minutes. Think it mr. Chair and thank you to the witnesses for being here today. Its fastening a hell of a variety of questions that has been all over the map you guys are such a great subject matter experts. Im going to go a little off the chart things i was supposed to ask a day because im fascinated by this topic. We have a couple doctors and technological field im a doctor of medicine and it is inst to watchut take it this very similar to where the print business fastening for kids up there and how ai has developed in different parts of your brain affecting different parts of your body specifically designed for this part of your brain this year arm, her leg, this part of urr decisionmaking this is your personality. Within thehe same thing in ai since we can no longer rely to shrink the size of these structf thinness and per layer which is fascinating to me we can designed software tont hardwaree to do specific functions just like we do in our brain. As is fascinating. After all the technology and all the science were getting back to the way god designed the brain it is fascinating. My question is, this is a right to technologyxp do this and areg software to maximize the hardware we are Going Forward in that process how does that affect Cyber Security and are our enemys ability to combat us question how do we design the Software Goinges forward . I will give it a starch. As i said earlier i think it is hard for us to predict the impact that ai is going to have it. Its clear its going to be huge and we have to figure how to manage that. Our adversaries are going tp. O take advantage of that if we are not on the front end of that we are in trouble. I think one of the things we have to do is start saying we need to be using ai to design soo test the software will use it to try attack Software Code would take advantage of that technologyr the goes quickly. It is fascinating because ai is one those areas i heard talk about and said Ai Developers of the technology were legitimately surprised by what it could do. They did not know it would be able to code they did not know would be able to do these things. It is amazing. It did what they designed it to do. Ai is something that really is nothing faster than we thought it w move i think its going to be huge and the dod needs tos take advantage of that. And use of large language. Before you get started one of things i also want to consider we have 250,000 students from india here in the United States studying. We got a ton of kids from china studying. In the production in taiwan. We have production overseas weh. How do we protect this from being used against us when we are training those people and producing the chipsrseas inin a nation we said were going to take over i am concerned about the security measure that. An important question the complexity of our software and hardware in the codesign is absolute exploding. I will say that you can use this complexity as a tool for exampe one of the things you can do you can create a chips and produce the hardware you can set features of it later you can defer some ofa that. You can build in forms offense. But at the same time i dont think its possible to prevent all vulnerabilities beforea ha. This is one of the reasons why 6c■mgoing back the tech problemd write up is so important we begin to see this now for example some of the navy Operational Networks automated anomaly detection there able to push a patch before any use or see a problem. So tools likeure have to use this exploding complexity that we see to the advantage of the u. S. Is how we stay ahead. I want to push that questionle back on you again talk about securing our software. Felt developing software we do not create our own hardware with ai how do we protect our technologies and the bad guys . What we have to do is look from a defense of an offense of point of view. And its absolutely critical that we■5ave standards that are held to when we look at the system level. That we alsoys understand the providence of a half to an software that we include right now we dont always understand the Beneficial Ownership of some of the companies in our supply chain and ai has done an incredible job and illuminating supply chain scraping publicly available information to really understand where items began. The department of defense has ut contracts in place to use that Technology Needs cybersecurity standards are already to some degree in the acquisition policies but that needs to be followed up on. Thank you i yield. Mr. Ryan five minutes per. Thank you mr. Chair thank yo. And i really appreciate your input and also your service and the various hats of the country. Despite m desire to■n ask about tiktok i am not going to do that this morning. Im sure many in our audience but curious myself included. Something specifically you said, you started to say congress has a role in this discussion about culture and changing the Risk Appetite if you will end tolerance. Could you talk a little you hav . Absolutely. I think often it is easy to look at what has gone wrong bod. And pound on that if you will. I think perhaps learn from this . How did it happen how do we do things differently in the future . That line of discussion would be very useful. Also i think asking questions about what is holding you back from taking more risk. I think there is an incredible fear of failure. If you could engage seniorg relative to discussions about that and ask them how to motivate and reward them to act more like the commercial sector were we do things quickly fit we pull the patches in a day or so. I think that will be really, really useful. Lex and setting up others to answer and somewhat leading couldnt ever makein sense for there to be some more public or broad assessment of which are lh individuals are accepting risk holding them up in a more formal way per. Absolutely. For years when i was in the building we talked about Holding Hearings to showcase these types of individuals. This types of things like tiktok to work about. There is so much y c with recognition talking to that media, inviting people up to your office for an hour■n or sot does not cost much would go a long way and cost a very long shadow. Thank you. Congre does shaping the culture of the dod and thats the way you ask questions if you do Something White and cheap meet these requirements youre forcing us into a system which were lurking and checking all the boxes that might not be the right answer but look at speed and cycle time < metrics y can you get something out in the field that is fantastic and get a leaderboard going this program that got their time down weeks e doing better . We get people in a friendly these Different Software dominated programs can get things out into the field was most remarkable technologicalme achievements is how safe civil air travel is. It is remarkable how few the reason it became so safe and so successful is there is a strong culture around and blame free which is if you step forward and talk about the problem than it is about learning is not about failure. This is the same principle we need to apply here as we figure out collectively how to do software rights. To collect two specificc o exas many ofd you have heard of the air force a project called capitol rock. Many of you h h airports the advance Battle Management system thats run by peo c3 bm in the air force. Both of those efforts are efforts there early efforts and they said w need to pivot. Early choices we made around architecture and how to approach this or how we think about managing this effort are not right and we need to those are the kinds of people, the kind of decision and the blame free culture the focus on work. I appreciate that. I with a 20 seconds i have left i think recognizing that has to start from the very, very top. And it has to be a principle of all the senior leadership. That something we can hopefully all agree so thank you mr. Chair thank you mr. Ryan. I want to thank the excellene your time. Shedding light in applying information again weve talked about it we learn more from our failures them ever will our to your point sir we never spoke about how well the operation went. We talked about how horribly small things in order to capitalize on the next. Ive been sitting back here i think i have a not going to saye and the house of representatives. Ill keep that to myself since im on tv rightht my colleagues and i will definitely discuss that. Again thank you. With five Business Days to submit your questio f adjourned. [inaudible conversations] [inaudible conversations]k ■s [inaudible conversations] [inaudible conversations] [inaudible conversations] [inaudible conversations] we are counting on you to do it. Here on out before do great in [laughter][inaudible conversati] [inaudible conversations] fulton countyuperior court judge has dismissed six counts gives formerresident trump his codefendant in the georgia 2020 election interrence case two ofhe charges dismissed have to do with the phone call to secretary state during which the former president allegedly asked georgia officials to find him additional votes. While the court has moved to dismiss six of the crges the majority of the indictments against former President Trump remain. On thursday head o the u. Administration joinsth Emergency Management oicials to tti on wildfire threats d response efforts. Watch a life before the Senate Homeland security govnmtal Affairs Committee at 10 00 a. M. Eastern on cspan three comments snt now are free mobile video app or online at cspan. Org. All the democracy does not just look like this. It looks like this. Americans conceived democracy at work truly informed our republic thrives. Get informed straight from the source on cspan. Unfiltered, unbiased, word for word from the nations capitol to where ever you are because the opinion that matters most is your own. This is what democracy looks like. Cspan is powered by cable

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.