DISA feeds warfighters bandwidth

The Defense Information Systems Agency plans to meet its customers' needs by providing more bandwidth to warfighters and military decision-makers, the agency's director said today.

Air Force Lt. Gen. Harry D. Raduege spoke at the Information Processing Interagency Conference, in Orlando, Fla.

"We're taking bandwidth and putting it in the hands of the warfighter in an assured way," he said. "Information has to be there, and it has to be there in abundance."

DISA is working to purchase bandwidth to keep up with the information needs of the commands and defense agencies that form its customer base, Raduege said.

"It has to be power to the edge," he said. "We want to create Web-smart, wisdom-rich users. Power to the edge can also mean providing information to the secretary of Defense so he can make the right decision."

Frequently, bandwidth must be deployed to remote zones where "there isn't a rich communications infrastructure," Raduege said.

He said DISA is taking steps to keep track of day-to-day tasks while managing transformation of the agency in response to changing customer needs. Raduege has created two "500-day" plans to guide change at DISA, based on his discussions with commanders and defense agency leaders.

Another of Raduege's goals is envisioning applications for emerging technology. "Today in DOD we are looking to pierce the fog of war with the light of information," he said. DISA also seeks to foster intercommunication across the Defense Department, Raduege said, and prevent stovepipes by using systems that have been approved by Pentagon command and control authorities.


  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/Shutterstock.com)

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.