Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
DoD leaders advocate plug-and-play IT buying
Wednesday - 7/11/2012, 6:36pm EDT
Too often, service members find themselves with obsolete IT because many large orders, such as tanks, take years to complete, said Maj. Gen. Mark Bowman, director of command, control, communications and computers (C4) for the Joint Staff. By the time the tanks roll off assembly lines, the technology inside is outdated.
DoD should be willing to accept partial solutions when drafting requirements, Bowman said, speaking at a Government Executive Media Group discussion Tuesday. The Pentagon can order tanks, for example, equipped with connections for communications gear but without the devices themselves.
When the contractor begins delivering, DoD can "buy the new radio off-the-shelf or from some vendor who's got the best thing going that interoperates with the standards that are set already, and plug it in. To me, that's the way of the future. That's the way of IT."
The Defense Information Systems Agency has learned from experience.
"DISA recently did a STIG — a Standardized Technical Implementation Guide — for an Android mobile device," said Rear Adm. David Simpson, DISA's vice director. "By the time we finished the STIG, how to use it in the DoD network securely, the product had reached the end of its life."
Simpson said all Pentagon components should build more flexibility into their IT planning processes.
"The adversary can pick and choose where they want to be on the technology curve," he said. "And they can be as agile as they want to be. And if we don't have processes that allow us to rapidly respond, we will cede cyber territory to the adversary."
TAGS: DoD Mark Bowman David Simpson DISA Joint Staff IT Technology Ruben Gomez