Stenbit details Defense's plans for a metadata registry

SALT LAKE CITY'The Defense Department can't achieve net-centricity without a policy for managing the millions of lines of code in use throughout the department, CIO John Stenbit says.

As DOD does more business over the Internet, applying metadata tags is a critical first step in controlling data while ensuring ease of access, Stenbit said at the Software Technology Conference.

The use of metadata will promote interoperability and software reuse in the secure, networked environment planned for DOD's Global Information Grid.

'The effective management of metadata is essential to implementing the department's net-centric vision,' Stenbit said.

To begin this effort, Stenbit early this month sent a memo to service secretaries and Defense agency chiefs outlining a phased approach for creating a DOD Metadata Registry as required in Defense Management Initiative Decision 905.

To satisfy the requirements, Defense agencies must report by May 30 to the Defense Information Systems Agency about the types and quantity of Extensible Markup Language metadata they plan to include in the registry. Then, by July 30, agencies must notify DISA of any metadata holdings not written in XML.

Agencies have until Sept. 30 to register all supported XML information resources, such as schema documents. For a list of XML information resources supported by the DOD Metadata Registry, go to

'Metadata answers the question: What do we expect to see?' Stenbit said yesterday at the conference.

Added Diann L. McCoy, principal director for applications engineering at DISA, 'It's the glue that allows us to take advantage of bandwidth, to tackle the issue of data and how to make it available.'


  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.