The JEDI Project Updating the IT Infrastructure

Topic: Business Analysis
Words: 605 Pages: 2

Introduction

In the contemporary world, the information system plays an integral role in any organization. It ensures that appropriate data is collected from various sources to improve decision-making. For example, the US Department of Defense intends to upgrade its information system through the JEDI project. The purpose is to introduce cloud computing and eliminate the existing IT infrastructure that hinders decision-making. Therefore, although the JEDI project benefits the department, it should be given to multiple vendors to enhance its efficiency.

JEDI Project, Importance, and Problems Solved

The JEDI project is a US Department of Defense strategy to update its IT infrastructure. The intention is to ensure that its front-line employees, officers, and soldiers may access and modify data at the pace of modern corporations. Its goal is to develop a huge cloud computing contract that would allow the country’s military to increase combat communications, fighting skills, and war planning by utilizing artificial intelligence. The JEDI project is important because it helps manage sensitive information regarding troops and US army services. Its proposal includes developing a cloud system that supports Unclassified, Secret, and Top-Secret information.

The JEDI project was meant to find solutions to the problems that the DOD are facing in the area of information system. One of the challenges that the project was supposed to solve was slow decision-making. Using an outdated computer system and operations makes it hard to make appropriate decisions (Pieterse et al., 2019). The other problem that the project is expected to address is the mismanagement of information. The current system cannot speed up the data flow for analysis and decision-making. JEDI project assists the military in replacing its branch-specific systems with an enterprise architecture that is more efficient and manageable.

Management, Organization, and Technology Issues

There are some management, organization, and technology issues brought by the adoption of this project. One of the management challenges is that with the DOD’s new cloud-based IT infrastructure, they will need to hold more training sessions with their teams and troops. These training sessions will enable everyone to use the new technology more efficiently and access the troops and staff easier. In addition, there is a need to prepare the employees through the change process (Boldosova, 2019). Technologically, the change could result in numerous files being misplaced and a large amount of data having to be reentered manually rather than through an automatic change. Thus, the organization must upgrade its system to manage the new system effectively.

JEDI Contract Being Awarded to A Single Vendor

The DOD should work with multiple vendors to ensure that the sensitive information it stores can be backed up and safeguarded by many servers. When there are multiple vendors, there is an increased danger of security breaches (Bhathal & Singh, 2019). This indicates that the department might be vulnerable to cyber-attacks and loss of information if they use a single vendor to handle the project. Due to its budget, the US Army can easily negotiate terms with a greater number of vendors. It makes no sense for them to have a single provider who provides inferior security. In addition, the JEDI project is vitally crucial for the US and other countries with which it is associated.

Conclusion

For the JEDI project to be beneficial to DoD, it should be given to multiple vendors instead of a single vendor. The US DoD has sensitive information that should be stored in systems that cannot be breached. Different vendors working on this project will enhance collaboration to develop a viable system to promote efficiency and guarantee information security. Therefore, the organization should have two or more organizations working on the project.

References

Bhathal, G. S., & Singh, A. (2019). Big data: Hadoop framework vulnerabilities, security issues, and attacks. Array, 1, 100002. Web.

Boldosova, V. (2019). Deliberate storytelling in big data analytics adoption. Information Systems Journal, 29(6), 1126-1152.

Pieterse, A. H., Stiggelbout, A. M., & Montori, V. M. (2019). Shared decision-making and the importance of time. Jama, 322(1), 25-26. Web.