Browse Definitions :
Definition

Joint Enterprise Defense Infrastructure (JEDI cloud)

Joint Enterprise Defense Infrastructure (JEDI) is the proposed United States Department of Defense (DoD) cloud infrastructure network.

The preliminary initiative for the JEDI project began in March 2018, as a request for proposal (RFP) so providers could bid on the contract. The $10 billion contract was originally set to close in May 2018 and was later extended to October 2018. The awarding of the contract subsequently came under dispute, causing additional delays. Amazon, Microsoft, Oracle, IBM and Google were among the companies contending for the contract. Google later dropped out after employee complaints that the project did not fit their culture.

Although some critics commented that $10 billion for the ten-year contract seems like a lot, the reality is that the cloud market’s current value is $60 billion annually and forecasted to increase to $100 billion.

After reports that Amazon is expected to win the contract, IBM filed a complaint with the government accountability office. Oracle has taken the issue to court. Both companies are alleging that the contract was unfairly written to favor Amazon. As of this writing, there has been no updates on the the progress of the project.

This was last updated in December 2018

Continue Reading About Joint Enterprise Defense Infrastructure (JEDI cloud)

SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • data compliance

    Data compliance is a process that identifies the applicable governance for data protection, security, storage and other ...

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close