Department of Defense (DoD) Transformation Initiative
The Department of Defense (DoDs) transformation initiative was launched in 2014 to transform federal governmentwide information technology (IT). The DoD intends to modernize its hardware infrastructure across the board and develop cloud-based computing services. The DoD will provide access to information to civilian agencies who request data.
Cloud Computing
Cloud computing provides shared pools of computational resources via Internet protocols. The DoD plans to use cloud computing to create a new model where users pay only for what they consume rather than purchase upfront.
Open Source Software
Open-source software is free software whose code is freely accessible, modifiable, and distributed under open licenses. The goal of open-source software is to encourage collaboration among developers around the world while benefiting the community.
Agile Methodology
Agile software development methodology refers to developing software using short iterations along with user-friendly interfaces.
DOD Unveils Major Transformation of IT Services
Cybersecurity
Cybersecurity is the protection of critical information systems from malicious attacks, intentional or accidental misuse, or natural disasters. There have been numerous cybersecurity breaches recently, including those of Target, Home Depot, Anthem Inc., Equifax, Yahoo!, the U.S. Office of Personnel Management (OPM), Sony Pictures Entertainment, Ashley Madison, TalkTalk Group, and Uber Technologies. Many breaches were caused by weak security practices. As a result, federal agencies and private companies are strengthening cyber defenses.
Cloud Computing
Cloud computing is an internet-based service model that provides shared capacity, data storage, software applications, and processing power over the Internet. It provides access to resources and services at low cost via a subscription based model. In cloud computing, the consumer’s use of application and network resources occurs inside the perimeter of a provider’s network, rather than within the user’s own premises. The consumer does not manage the underlying infrastructure, instead opting to consume only ready-to-consume virtualized resources.
Data Analytics
Data analytics enables businesses to gain useful insights from large volumes of digital data. It includes techniques for extracting knowledge from raw data using statistical methods and algorithms. Big data technology uses advanced analytic tools to identify patterns and trends, predict future outcomes, and optimize operations. These technologies are rapidly becoming a necessity, especially in the healthcare industry where medical professionals can use them to track patient data and make decisions quickly.
Mobility
Mobility refers to a person or object having the capability to move or relocate freely. Mobile devices are ubiquitous these days. People carry smartphones and tablets everywhere they go. They utilize them for everything, from checking email to playing games to staying connected with loved ones while away from home. More importantly, people rely heavily on their mobile devices for work purposes. Employees need to be able to securely access company networks no matter where they may be. They need to be able to check emails, share documents, and perform business transactions from anywhere. Without mobility solutions, employees would not be able to accomplish daily tasks.
Artificial Intelligence
Artificial intelligence is a term referring to machines mimicking human cognitive processes. AI can be thought of as thinking programs designed to mimic human thought. AI is being applied to many fields such as medicine, manufacturing, and customer service. Machine learning is a subfield of artificial intelligence that deals with developing computer systems that learn without explicitly programmed. It has been widely employed in a broad variety of machine learning problems, including natural language processing, speech recognition, visual perception, robotics, game playing, financial fraud detection, decision support system, drug discovery, logistics, transportation, and management control.
Enterprise Social Media
Enterprise social media is the use of social networking sites to promote product marketing and brand awareness. These websites help small businesses build relationships with customers and prospects online. Such platforms include Facebook, Twitter, LinkedIn, Pinterest, YouTube, Google+ etc. Enterprises create profiles on each site and then engage with the followers. These interactions are often managed by social listening software that automatically follows conversations and identifies relevant content. In addition, social media monitoring software tracks mentions of brands and keywords across the web.
Virtual Reality
Virtual reality (VR) is a simulated environment created by electronic devices. VR headsets allow users to immerse themselves in a fully realized three dimensional experience. VR is being utilized in a wide range of industries, including gaming, medical training, and architecture.
DOD Unveils Major Transformation of IT Services
DOD is taking a major step toward its transformation into a digital service organization and is announcing significant changes in how it provides information technology services, known as the Defense Enterprise Service Infrastructure (DESI) program.
DESI includes six programs aimed at delivering secure, reliable and innovative technologies across DOD’s entire enterprise.
The Department of Defense Information Network & Technology (DoD IN&T), which provides data communications solutions to Defense agencies, will become the first program under DESI.
Other DESI programs include a Data Center Consolidation Program, a Cybersecurity Program, a Secure Communications Program, an Advanced Technical Architecture Program, and a Software Modernization Program.
All of these programs were planned years ago, but they have been delayed for various reasons. Now that things have changed in the way we use technology, DoD wants to make sure that it is ready to provide the best possible services to the American public.
“A lot of change is happening in our business right now. We want to get ahead of those changes,” said Thomas F. Farrell II, deputy assistant secretary of defense for net-centric capabilities and products.
DESI complements the recently announced acquisition of HPE’s U.S. government cloud business. Together, these efforts will help transform the way we do business.
This change is going to take some time, but once the programs are fully implemented, we should notice a large difference in how we work.
Subscribe to the Mothership! An ancient Chinese legend says if dragon’s breath could kill, then the Yellow River would drown every year. In fact, since 2011, China’s Yellow River has experienced catastrophic floods beginning just after the summer solstice and continuing until early autumn—a trend scaled back due to conservation efforts. As China faces the issue of water scarcity, this event occurs once every five years, and is predicted to happen again soon.
On June 24, 2016, YWN conducted a live interview with David Lien, CEO of Dragon Innovation and Adriel Johnson, Senior Advisor for Agriculture and Rural Development at the International Food Policy Research Institute (IFPRI). Both experts discuss IFPRI report on food security in China, d “China’s rural food security: A shared responsibility.”
DOD Unveils Major Transformation of IT Services
DOD Delivers Digital Service Delivery
The Defense Department (DoD) has been operating under the assumption that information technology services could be delivered using existing commercial solutions. While this approach has worked well in some cases, it does not address fundamental challenges in delivering digital services that meet DoD’s mission requirements. As a result, the DoD is moving away from its current model of contracting for individual products, instead adopting a service-based approach that prioritizes collaboration between the government and industry. In addition, DoD is seeking to transform the way the department buys cloud services from vendors, encouraging them to partner with the government. These changes represent a major transformation in how the government does business and require substantial change management and cultural shifts at all levels.
Government Wide Technology Modernization
To achieve these goals, DoD is initiating a major modernization effort that involves replacing legacy systems with modern, interoperable, secure, and resilient infrastructure, applications, and devices; migrating data to cloud architectures; integrating software across the enterprise; and aligning human capital processes with emerging technologies. This is expected to cost tens of billions of dollars over the next several years. To date, the majority of efforts have focused on building and deploying the core capabilities necessary to enable the transformation, while less attention has been paid to supporting the culture shift and leadership needed to make the transition happen. Successful implementation requires a strong senior executive champion who provides vision, direction, and clear accountability.
A New Contracting Model for Information Technology Services
As DoD begins moving toward service delivery, the way it contracts for these services must evolve as well. Today, the DoD purchases individual products and services from a variety of providers. However, due to the complexity of the IT environment, traditional procurement approaches are insufficient to deliver best value to the government. Instead, the DoD requires a strategic partnership with private sector partners to build capabilities that meet its specific needs. As a result, DoD is working to develop a new set of best practices for IT contracting that will strengthen its ability to partner effectively with industry. This includes developing a framework for evaluating and selecting potential contractors that focus on performance attributes, including technical capabilities and willingness to collaborate; establishing clear expectations around responsibilities and timelines; defining metrics for success; and providing continuous feedback throughout the contract lifecycle.
Cloud Computing as the New Norm
In order to make progress toward achieving their goals, DoD must adapt to the new reality of today’s increasingly mobile workforce. The department recognizes that the nature of work is changing rapidly, driven by advances in virtualization, mobility, and the Internet of Things. One consequence is that people are no longer tied to physical location and access to computing resources is becoming ubiquitous. As a result, workers need to take advantage of opportunities for flexible and remote work arrangements that are supported by ubiquitous access to information and communications technologies. This will enhance productivity and organizational effectiveness by enabling employees to work where they want, when they want, and collaborating with others wherever they are.
DOD Unveils Major Transformation of IT Services
The Department of Defense (DOD) in its fiscal year 2017 budget request proposes $52 billion in funding for information technology services. That represents a 16 percent increase over 2016 levels and includes $8 billion for the department’s Joint Information Systems Technology Enterprise (JITE). JITE comprises four core programs:
Defense Digital Service (DDS)
Military Intelligence Agency (MIA)
DOD Enterprise Architecture Program Office (EA/PAO), and
Joint Tactical Command and Staff College (JTCCC).
The proposal reflects President Trump’s focus on modernizing the military’s information systems and his commitment to reforming the federal government. The FY17 budget request is the first step toward implementing major reforms announced last month at the White House Summit on Cybersecurity and Infrastructure Security.
As part of the modernization plan, DOD began a review of its information security posture in April 2016. Over the course of two years, that review resulted in the release of three documents aimed at enhancing both cybersecurity and infrastructure. A February report end “Report to Congress on DOD’s Approach for Securing Cyberspace” was followed by a May 2016 document on DOD’s “Cyberstrategy Roadmap and Implementation Plan.” Finally, the third report, released in June 2016, focused on “Managing Risk to Protect the United States” and outlined plans for increasing cyber defenses.
The reports were published under the authority of the Secretary of Defense Policy Directive 3000.18, issued in December 2011. That directive directed the secretary to develop specific strategies for securing cyberspace. Its purpose was to provide direction to the department while Congress developed legislation to implement those strategies. In particular, the directive sought to establish clear processes and procedures for managing risk associated with cyberspace operations.
The strategy roadmap lays out overarching principles for implementing policy directives to improve IT security. Among these are the need for effective threat management; the use of information sharing across organizations and departments; and the creation of shared standards.
That same month, Secretary Mattis established DDS and the Army’s program office (APO), which works closely with the service’s respective combatant commands. DDS provides civilian expertise and technical capabilities to address gaps in DOD’s IT security posture, including developing tools, training, and conducting assessments. APO is responsible for ensuring interoperability between DOD’s various networks and platforms, integrating enterprise data, and leveraging cloud computing.
Another key component of the strategy roadmap is the establishment of a unified architecture. One goal is to streamline information flows among agencies and defense components, as well as integrate network connectivity. To achieve this, DOD officials are working to create a unified operational command structure. The Unified Operational Picture system will combine legacy applications and systems with newer technologies, while using a single interface to access them.
In addition to the strategy roadmap, the department released a cyber strategy implementation plan (CSIP). The CSIP details how DOD intends to apply the roadmap’s concepts to its existing systems. It serves as a guide for establishing best practices and identifying potential improvements.
DOD has already taken some steps toward addressing the weaknesses identified in its cyber posture. For example, the department is making changes to its computer operating systems, replacing Windows XP with Windows 10. The change represents a significant upgrade in capability and functionality. Other improvements have included enhancements to the department’s patching system and increased cybersecurity awareness training. More broadly, DOD is focusing on building greater collaboration between its own personnel and commercial industry partners.
The initiatives reflected in the strategy roadmap and the CSIP are designed to help DOD operate more securely in a changing environment. These efforts build upon previous efforts to enhance cybersecurity, including a 2015 executive order from the president directing the administration to make it easier for individuals and businesses to protect their networks. The order directs Executive Branch agencies to take appropriate measures to encourage the adoption of commercially reasonable standards, guidelines, practices, and products to secure sensitive information and strengthen Federal Governmentwide cybersecurity.
►HEY, we’ve got more valuable information here: ►CLICK HERE LOANS FOR STUDENTS◄
►Cloud of related items ▼
bloque4x

Related Links ▼
- Studentaid.gov/understand-aid/types/loans
- Salliemae.com/student-loans/
- Discover.com/student-loans/
- Nerdwallet.com/best/loans/student-loans/private-student-loans
- Money.usnews.com/loans/personal-loans/personal-loans-for-students
- Credible.com/blog/student-loans/personal-loans-for-students/
- Govloans.gov/categories/education-loans/
- Forbes.com/advisor/student-loans/best-private-student-loans/
- Navyfederal.org/loans-cards/student-loans.html
- Wellsfargo.com/goals-going-to-college/loan-options/
- Whitehouse.gov/briefing-room/statements-releases/2022/08/24/fact-sheet-president-biden-announces-student-loan-relief-for-borrowers-who-need-it-most/
- Ed.gov/category/keyword/federal-student-loans
- Myfedloan.org/
- Navient.com/
- Usa.gov/student-loans