Now that the contract is awarded, are DOD agencies ready to actually move forward with JEDI deployments? Buried deep in DOD’s 1,000+ Q&A responses during the RFP process is the idea that migrations to the JEDI cloud will come through a separate contract. Whether this is competed as a multi-award vehicle at the department level or agency by agency, it’s going to take some time to operationalize the migration piece of JEDI – certainly longer than it will take to stand up the JEDI cloud itself.
This contracting disconnect sets up a scenario where the JEDI cloud is ready, but DOD agencies aren’t ready to use it. It takes an average of eighteen months for Federal agencies to migrate assets and compute into the cloud. Even if they started today, most DOD agencies wouldn’t be ready to take advantage of the JEDI cloud when it appears.
Prudent DOD agencies should be doing everything in their power to prepare the groundwork for JEDI cloud migrations now, while they have both time and end-of-year money to burn.
First and foremost, DOD agencies can get their network infrastructure in order. Managing DNS between on-prem and cloud resources isn’t easy, particularly if the DNS infrastructure is decentralized. By centralizing and automating their underlying DNS infrastructure now, DOD agencies will save time and energy during the cloud migration process.
BlueCat offers DOD agencies relevant solutions to prepare the way for the JEDI cloud, all of which can be easily fit into an end-of-year budget request. Learn more about BlueCat’s JEDI solutions here.
Critical conversations on critical infrastructure
Find out how your peers are managing their networks through profound change. Watch this series of live interactive discussions with IT pros & join the debate in Slack.
Six non-hype network automation lessons from IT pros
Five IT pros get real about network automation during the first Critical Conversation on Critical Infrastructure hosted in the Network VIP community.
Technical Know-How: Deploying DDNS with BlueCat
Dynamic DNS automatically updates DNS records when an IP address changes. Learn how to deploy DDNS on the BlueCat Address Manager and DNS/DHCP server.
To better see the threats on your network, try DNS
DNS is a vector used in most cyber attacks. When it comes to DNS, BlueCat can enhance visibility, detection, and containment of threats to your network.
The bigger the business, the more misguided the DDI
EMA research for BlueCat found an inverse relationship between commercial DDI use and business size, as well as more surprises about DDI adoption trends.