Navy reviews IT readiness

The Navy is in the early stages of launching an effort to systematically check the readiness of its information technology systems.

The Navy's Information Technology Readiness Review will be used to check all of the Navy's IT hardware and software to ensure that it is working properly and correctly configured, according to David Weddel, assistant deputy to the Navy's Deputy Chief of Naval Operations for Communications Networks.

The Navy's IT Readiness Review is modeled after its Combat Systems Readiness Review, a process which it uses to check the capabilities of its weapons systems, Weddel said Jan. 23 at the Network Centric Warfare 2008 conference in Washington sponsored by the Institute for Defense and Government Advancement.

The review will also cover less tangible but not less vital factors such as workforce and training to ensure that the Navy has enough staff members at the appropriate personnel grade to run its IT systems, and that they have the proper training for the systems they will operate, Weddel said.

In a separate effort, the Navy is also consolidating its network and IT assets by reducing the number of legacy networks and servers it operates. One of the biggest challenges the Navy has is the number of legacy networks' within its infrastructure, Weddel said.

At the outset of the network consolidation program, the Navy had 1,200 separate legacy networks and has set a 51 percent reduction in that number by 2010 as its goal, Weddel said. As of December, the Navy had successfully reduced the number of its networks by 40 percent and is on track to achieve its 51 percent reduction within the time allotted, he said.


  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.