JEDI will ease DOD’s FITARA woes, but when?

The latest FITARA scorecard released by the House Oversight Committee criticizes the Department of Defense yet again. 

Of the eight categories covered in the report, DOD’s letter grade was an “F” in five of them.  Citing data reported to Congress and multiple GAO reports, the Committee took DOD to task for failing to break up IT projects into manageable chunks, identify duplicative IT spending, optimize software licensing agreements, and move away from costly legacy IT investments.

DOD’s FITARA scorecard

In a response to the committee, DOD CIO Dana Deasy noted the challenge of addressing the complicated thicket of IT spending in an agency as large as DOD.  He was able to foreshadow progress in one particular area, however – data center consolidation.

The Data Center Consolidation Initiative (DCOI) was created in 2014 as a way of trimming down the out-of-control costs of data centers throughout the Federal government.  Since the program’s creation, DOD has closed 834 data centers, with an additional 1,112 closures planned for the current fiscal year.

This massive shift in resources begs the question – how will DOD meet its computing needs as all of these data centers are eliminated?  Enter the JEDI program, which is designed to move a significant amount of computing power away from both data centers and private clouds and into a COTS cloud offering.  The financial advantages of this approach are clear – JEDI will finally allow DOD to pay for compute based on what it actually uses instead of its perceived capacity requirements.


An avatar of the author

BlueCat provides core services and solutions that help our customers and their teams deliver change-ready networks. With BlueCat, organizations can build reliable, secure, and agile mission-critical networks that can support transformation initiatives such as cloud adoption and automation. BlueCat’s growing portfolio includes services and solutions for automated and unified DDI management, network security, multicloud management, and network observability and health.

Related content

Article

Network Device Configuration Standardization – Thoughts on Ethan Banks’ post

Ethan Banks has an interesting newsletter called The Hot Aisle. Worth following if you’re not familiar with it, basically the thoughts of a very…

Read more
Article

Gold Standard Configuration for Network Devices

  Network and security teams in large enterprises spend quite a bit of time defining their “Gold Standard Configuration” for network…

Read more
Article

Comparing Check Point’s SmartEvent and SmartReporter vs indeni

Check Point’s SmartEvent and SmartReporter blades have made quite some progress over the last two years. The database used for collecting log data has…

Read more
Article

NERC Compliance Best Practices for Critical Infrastructure Protection (CIP) v5

We have a number of US-based energy grid operators that are leveraging indeni’s capabilities to meet the NERC CIP v5 requirements, that are soon to be…

Read more
Article

Vulnerabilities from SWEET32 in F5 Load Balancers Reveal

How to Mitigate Vulnerabilities from SWEET32 in F5 Load Balancers The SWEET32 vulnerability is targeting long lived SSL sessions using Triple DES in CBC…

Read more
Article

Check Point Hardware Diagnostic Tool for Hardware and OS

Check Point Firewalls Diagnostic Tool Below are samples of hidden issues that maybe lurking in your network environment. Keep the clocks in sync…

Read more