Configuration and data management

We provide support in configuration and data management to help control scope and manage change while delivering expected capabilities.

Contact Us

Key contact

Rob Teasdale

Global Business Development Director

Australia

+61 (0) 3 86206180 defence-security@bmtglobal.com

Configuration management and data management (CM/DM)

Engineering changes, project scope, establishing baselines, asset management, knowing where you are in the development or maintenance of a major asset. These are all activities that are handled through the application of a robust configuration and data management program. 

We use effective and practical techniques, developed from our long involvement in a wide range of complex acquisition projects, to streamline capability delivery and minimize through-life costs.  Our experience includes supporting the Canadian Department of National Defence with change management projects and heavily supporting the UK's acquisition change management program.  We also offer our customers data architecture analysis and support in implementing online web-enabled information systems and asset management systems.

Configuration and data management is an inherent part of the solution, and it can be tailored to the specific requirements of each project, creating a structured and auditable base from which to collaborate between employees, departments and offices, and allowing staff to make clear, concise and speedy decisions.

Services include:

  • Implementing CM/DM programs including processes, plans and training materials in accordance with a client's customized needs, or to international standards such as MIL-STD-973 or ANSI-EIA-649
  • Establishing baselines and change control procedures
  • Helping customers to select and implement tools and processes
  • Processing engineering changes and packages
  • Maintaining configuration of technical data both in the design phase and the in-service phase of a program
  • Needs analysis for information systems and asset management systems, including suggested data architectures
  • Providing customized training
  • Conducting independent configuration audits, both functional and physical audits, as well as support for first article inspections and source inspections