Jump to content

User:Dcbrow10/sandbox

From Wikipedia, the free encyclopedia

A tiger team is a diversified group of experts brought together for a single project, need, or event. [1] They are usually assigned to investigate, solve, build, or recommend possible solutions to unique situations or problems. They are almost always populated with mature experts who know what's at stake, what needs to be done, and how to work well with others. Their strengths are diversity of knowledge, a single focus or purpose, cross-functional communications, decision-making sovereignty, and organizational agility.[2] Once their venture is completed they cease to be a team and usually go back to their previous assignments.[2]

The metaphor of a tiger comes from the power and agility of the teams. There are no limits to their size, reasons, or purpose parameters. They may be assigned to locate new knowledge sources, create an impactful event, or form an exit plan. The scope of their work may be very large or very small. They may be a team for a few days, or for many years. They may meet regularly, frequently, intermittently, or rarely.

History

[edit]

The concept originally came out of early NASA innovations for solving technical or systemic problems. Tiger teams began as specialized units to test computer security for the military and the aerospace industry. These teams were specifically hired to determine how easily an organization's security measures and data could be accessed or hacked. When successful, members of the tiger team would usually leave behind notes with messages such as "busted" or "your code book has been stolen" to indicate that the system had been penetrated[3].

Tiger teams were traditionally made up of expert hackers who had experience in attacking remote networks and secure communication channels. The members were regarded for their willingness to break the rules and their ability to think outside of the box and work beyond an organization's boundaries in order to ensure security and protection.[3] These teams were originally focused on espionage and spying, but have transformed and expanded over time to solve a wider variety of problems for businesses and organizations today.

Program Management in Design and Development

[edit]

A 1964 paper entitled "Program Management in Design and Development" introduced tiger teams and defined the term as "a team of undomesticated and uninhibited technical specialists, selected for their experience, energy, and imagination, and assigned to track down relentlessly every possible source of failure in a spacecraft subsystem".[4] The paper consists of anecdotes and answers to questions from a panel on improving issues in program management concerning testing and quality assurance in aerospace vehicle development and production[5]. One of the authors was Walter C. Williams, an engineer at the Manned Spacecraft Center and part of the Edwards Air Force Base National Advisory Committee for Aeronautics. Williams suggests that tiger teams are an effective and useful method for advancing the reliability of systems and subsystems in the context of actual flight environments.

Apollo 13

[edit]

A tiger team was crucial to the Apollo 13 lunar landing mission in 1970. During the mission, part of the Apollo 13 Service Module unexpectedly malfunctioned and exploded[6]. A team of specialists was immediately tabbed to fix the issue and bring the astronauts back to earth safely. The team was led by NASA Flight and Mission Operations Director Gene Kranz[7]. Kranz and the members of his "White Team", later designated the "Tiger Team", received the Presidential Medal of Freedom for their efforts in the Apollo 13 mission.

Security

[edit]

In security work, a tiger team is a specialized group that tests an organization's ability to protect its assets by attempting to circumvent, defeat, or otherwise thwart that organization's internal and external security. In this context, the tiger team is often created to work in perpetuity, as opposed to for a singular event, since security is typically an on-going effort in an organization.[8] For example, one implementation of an information security tiger team approach divides the team into two co-operating groups: one for vulnerability research, which primarily finds and researches the technical aspects of a vulnerability, and one for vulnerability management, which primarily manages communication and feedback between the team and the organization, as well as ensuring each discovered vulnerability is tracked throughout its life-cycle and ultimately resolved.[8]

Examples

[edit]
[edit]

The popular comic strip Dilbert released a published strip on May 11, 2010 making fun of the name and concept of specialized tiger teams in the workplace.[12]

In 2007 the Tiger Team (TV series) featured a tiger team that was hired to test for electronic, psychological, tactical, and physical threats and vulnerabilities for organizations.

The 1995 Apollo 13 (film) movie featured a scene where a tiger team was quickly formed by employees at NASA to solve a crisis with the spacecraft.[13]

See also

[edit]

References

[edit]
  1. ^ Miller, Marilyn; Armon, Rick (June 6, 2016). "University of Akron announces new "Tiger Team" to address enrollment slide, finances, leadership issues". Akron Beacon Journal. Akron Beacon Journal/Ohio.com. Retrieved 18 October 2016.
  2. ^ a b Wheelwright, Kim B. Clark Steven C. "Organizing and Leading "Heavyweight" Development Teams." California Management Review (1992). p 13-14
  3. ^ a b http://www.newdirectionsconsulting.com/leadership-engagement/tiger-teams-the-new-frontier-of-teaming-2/
  4. ^ J. R. Dempsey, W. A. Davis, A. S. Crossfield, and Walter C. Williams, "Program Management in Design and Development," in Third Annual Aerospace Reliability and Maintainability Conference, Society of Automotive Engineers, 1964, p. 7–8
  5. ^ https://saemobilus.sae.org/content/640548
  6. ^ http://nssdc.gsfc.nasa.gov/planetary/lunar/ap13acc.html
  7. ^ https://www.nasa.gov/sites/default/files/files/Gene-Kranz-Bio.pdf
  8. ^ a b Laakso, Marko; Takanen, Ari; Röning, Juha (1999). "The vulnerability process: a tiger team approach to resolving vulnerability cases". Proc. 11th FIRST Conf. Computer Security Incident Handling and Response. Brisbane, Australia: CiteSeerX: 1–2, 6. Retrieved 28 September 2016.
  9. ^ "Cyber Defense Exercise 2008 - NSA Video Transcripts - NSA/CSS". Nsa.gov. 2009-01-15. Retrieved 2012-01-08.
  10. ^ "Benefits of a One NASA Organization in Solving Program and Project Technical Issues". Lessons Learned. NASA. 2004-05-07. Retrieved 6 November 2015.
  11. ^ Hamilton, Jon. "How A Team Of Elite Doctors Changed The Military's Stance On Brain Trauma". NPR. All Things Considered, NPR. Retrieved 23 August 2016.
  12. ^ http://dilbert.com/strip/2010-05-11
  13. ^ https://www.youtube.com/watch?v=C2YZnTL596Q
[edit]

This article is based on material taken from the Free On-line Dictionary of Computing prior to 1 November 2008 and incorporated under the "relicensing" terms of the GFDL, version 1.3 or later.