Army hits some bumps in the road

Army officials' efforts to implement and fund an initiative to consolidate information technology management hit some snags this year because of the war on terrorism and the service's transformation to a more mobile force, according to Army IT officials.

For example, an enterprise license agreement with Microsoft Corp. will likely be a casualty of the war and transformation initiatives. The agreement would help the Army save money by forming a single contract from the software licenses that each major command pays.

Senior IT officials promised last year that Army officials at the Pentagon would allocate $78 million starting in fiscal 2004 for the agencywide enterprise software initiative, but Army officials canceled funding for the license last summer. Army

IT budget officials and network administrators at major commands are upset that they must pay for licenses for Microsoft software.

Army officials likely canceled the license funding to pay for transformation efforts and warfighting needs in Iraq and Afghanistan, sources said. Those responsible for IT operations said they want properly trained soldiers who are equipped to win wars. However, they said, senior IT leaders did not give them adequate warning of the funding cancellation, which forced IT administrators to radically shift money in their fiscal 2004 and 2005 budgets.

"There was poor communication and execution," said an IT official at an Army installation in Virginia who declined to be identified. "They need to get their acts

together."

Senior IT leaders explained why the initiative will get funded at the major command level rather than centrally for the first two years of the agreement. "The Microsoft money is going to rebuilding these brigades," said Lt. Gen. Steve Boutelle, the Army's chief information officer, speaking last week at the 2004 Army IT Conference in Hershey, Pa.

He referred to the Army's new modularity effort. As part of its transformation, the Army will organize soldiers in smaller units that are similar in structure, staff and equipment to current units. The goal is to be better prepared to fight enemies who are organized in small units and located in trecherous terrain.

To clarify the Microsoft enterprise

license agreement, officials at the Network Enterprise Technology Command at Fort Huachuca, Ariz., issued an implementation plan last month that explains how service IT budget and contracting officials and network administrators should inventory, order and pay for the software licenses.

The implementation plan and an automated ordering system will facilitate the Microsoft enterprise software license agreement process, said Dee Wardle, product leader who manages enterprise projects in the Army Small Computer Program. "I know we've had some hiccups but we're getting there," Wardle said.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group