Welcome to CogniVault, LLC








Program/Project Management

Intelligent Information Systems

Independent Verification and Validation


Woman Owned Small Business

ISO 9001:2008

Health IT
Systems and Software Development
Science and Math
IT Security
Business Operations



Science and Math

CogniVault's principals have a background founded in the physical, life, and applied sciences and mathematics. This training is what drives our approach to client support. The definitions of the “scientific method” varies a little but they all agree that it is an approach to assessing answers to a problem through gathering relevant observable measurable data, devising a solution (hypothesis for basic research), implementing a controlled process (experiment), and testing to validate the outcome. Further, these steps must be repeatable, to guard against mistake or confusion. We apply the scientific method to every endeavor we undertake. The utilization and tailoring of standards provides CogniVault the necessary framework of polices processes, and procedures to enable the scientific method approach. This ensures that the right techniques are selected and applied to acquire and document the necessary and sufficient data through observation, modeling, testing and objectively measuring the resulting evidence allowing us to apply the appropriate cognitive processes to convert and integrate the data into meaningful unbiased knowledge. Using full disclosure, this knowledge is then communicated to our clients in the correct comprehensive coherent format enabling the continuous feedback loop of:


• Planning/revising;
• Implementing;
• Monitoring, testing, verifying, validating; and
• Continually improving;

Our background in mathematics and statistics ensures that all models developed and data collected are statistically reliable and provides for the ability to validate our methodology and verify our outcomes by enabling them to be reproduced. Using information technology tools and standards framework ensures that all of activities are effectively and efficiently captured, documented, and traceable from problem identification (business cases and requirements) through testing and deployment; processes are always under control (configuration management/ chain of custody); variations are effectively controlled (change management); independent and dependent variables (risks) are proactively identified, assessed, monitored, and managed; and quality assurance is continuously verified with quantitative data throughout assuring replication and continuous validated improvements are embedded.