Jump to content

Tiger team

From Wikipedia, the free encyclopedia

A tiger team is a team of specialists assembled to work on a specific goal,[1] or to solve a particular problem.[2]

Origin of the term

[edit]

A 1964 paper entitled Program Management in Design and Development used the term tiger teams and defined it as "a team of undomesticated and uninhibited technical specialists, selected for their experience, energy, and imagination, and assigned to track down relentlessly every possible source of failure in a spacecraft subsystem or simulation".[2] Walter C. Williams gave this definition in response to the question "How best can advancements in reliability/maintainability state-of-the-art be attained and used with compressed schedules?" Williams was an engineer at the Manned Spacecraft Center and part of the Edwards Air Force Base National Advisory Committee for Aeronautics.

The paper consists of anecdotes and answers to questions from a panel on improving issues in program management concerning testing and quality assurance in aerospace vehicle development and production.[3] The panel consisted of Williams, Col. J. R. Dempsey of General Dynamics, Lt. Gen. W. A. Davis from the Ballistic Systems Div., Norton Air Force Base, A. S. Crossfield from North American Aviation.

Examples

[edit]
  • A tiger team was crucial to the Apollo 13 crewed lunar mission in 1970. During the mission, part of the Apollo 13 Service Module malfunctioned and exploded.[4] A team of specialists was formed to address the resulting problems and bring the astronauts back to Earth safely, led by NASA Flight and Mission Operations Director Gene Kranz.[5] Kranz and the members of his "White Team", later designated the "Tiger Team", received the Presidential Medal of Freedom for their efforts in the Apollo 13 mission.
  • In security work, a tiger team is a group that tests an organization's ability to protect its assets by attempting to defeat its physical or information security. In this context, the tiger team is often a permanent team as security is typically an ongoing priority.[6] For example, one implementation of an information security tiger team approach divides the team into two co-operating groups: one for vulnerability research, which finds and researches the technical aspects of a vulnerability, and one for vulnerability management, which manages communication and feedback between the team and the organization, as well as ensuring each discovered vulnerability is tracked throughout its life-cycle and ultimately resolved.[6]
  • An initiative involving tiger teams was implemented by the United States Department of Energy (DOE) under then-Secretary James D. Watkins. From 1989 through 1992 the DOE formed tiger teams to assess 35 DOE facilities for compliance with environment, safety, and health requirements. Beginning in October 1991 smaller tiger teams were formed to perform more detailed follow-up assessments to focus on the most pressing issues.[7]
  • The NASA Engineering and Safety Center (NESC) puts together "tiger teams" of engineers and scientists from multiple NASA centers to assist solving complex problems when requested by a project or program.[8]

See also

[edit]

References

[edit]
  1. ^ Miller, Marilyn; Armon, Rick (6 June 2016). "University of Akron announces new "Tiger Team" to address enrollment slide, finances, leadership issues". Akron Beacon Journal. Akron Beacon Journal/Ohio.com. Retrieved 18 October 2016.
  2. ^ a b J. R. Dempsey, W. A. Davis, A. S. Crossfield, and Walter C. Williams, "Program Management in Design and Development," in Third Annual Aerospace Reliability and Maintainability Conference, Society of Automotive Engineers, 1964, p. 7–8, https://doi.org/10.4271/640548.
  3. ^ "Login - SAE Mobilus". saemobilus.sae.org. January 1964. doi:10.4271/640548.
  4. ^ "Apollo 13 Accident". nssdc.gsfc.nasa.gov.
  5. ^ "Gene Kranz A Blast from The Past" (PDF). Retrieved 29 August 2017.
  6. ^ a b Laakso, Marko; Takanen, Ari; Röning, Juha (1999). "The vulnerability process: a tiger team approach to resolving vulnerability cases". Proc. 11th FIRST Conf. Computer Security Incident Handling and Response. Brisbane, Australia: CiteSeerX: 1–2, 6. CiteSeerX 10.1.1.39.9438.
  7. ^ Ziemer, P. L. (1 January 1992). "The Department of Energy Tiger Teams; analysis of findings and plans for the future". 8. International Congress of the International Radiation Protection Association (Irpa8).
  8. ^ "Benefits of a One NASA Organization in Solving Program and Project Technical Issues". Lessons Learned. NASA. 7 May 2004. Archived from the original on 6 March 2016. Retrieved 6 November 2015.