Cloud Computing for Government Efficiency and Transparency

Government Cloud Computing

Subscribe to Government Cloud Computing: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cloud Computing: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

(Originally posted on the Engility Corporation Blog) There's a lot to gain from cloud computing, but success requires a thoughtful and enterprise focused approach. Cloud computing decouples data and information from the infrastructure on which it lies. A process that is a LOT more involved than dragging some folders from your desktop to a shared drive. Cloud computing as a mission transformation activity, not a technological one. As an organization moves from local information hosting to the cloud, one of the most important challenges is addressing cloud computing as a mission transformation activity, not a technological one. Cloud computing isn't a new technology. It's a new way of consuming and provisioning information technology services. Adopting cloud computing means paralleling your mission processes, rethinking the economic models and abstracting your applicati... (more)

Blockchain Business Innovation | @CloudExpo #Cloud #FinTech #Blockchain

Is there more than bitcoin to blockchain? Absolutely, because today's blockchain is opening up a pathtowards the delivery of trusted online services. To understand this statement, you need to see blockchain as more that it's more famous bitcoin use case. As a fundamental digital tool, blockchain is a shared, immutable ledger for recording the history of transactions. If used in this fashion, it can enable transactional applications that can have embedded trust, accountability and transparency attributes. Instead of having a Bitcoin blockchain that is reliant on the exchange of cryptocurrencies with anonymous users on a public network, a Business blockchain can provide a permissioned network with known and verified identities. With this kind of transactional visibility, all activities within that network are observable and auditable by every network user. This end-to... (more)

TAP Accelerates #ArtificialIntelligence | @CloudExpo #AI #BigData #Hadoop

Over the past few years, the use of artificial intelligence has expanded more rapidly than many of us could have imagined. While this may invoke fear and dread in some, these relatively new technology applications are clearly delivering real value to our global society.  This value is generally seen in four distinct areas: Efficiency - Delivering consistent and low-cost performance by characterizing routine activities with well-defined rules, procedures and criteria Expertise - augment human sensing and decision makingwith advice and implementation support based on historical analysis Effectiveness - improve the overall ability of workers and companies by improving coordination and communication across interconnected activities Innovation - enhance human creativity and ideation by identifying alternatives and optimizing recommendations. Photo credit: Shutterstock ... (more)

[slides] Compliance in the Cloud | @CloudExpo @IBMcloud #InfoSec #FedRAMP

Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Regulatory Compliance in the Cloud Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task. CSPs need a foundation that provides a uniform, non-repetitive view across all the requirements. Download Slide Deck: ▸ Here In his session at 19th Cloud Expo, David Jenkins, an Executive Architect at IBM working in the Office of the US Federal CTO, discussed an approach that can... (more)

Digital Transformation Driven by ITaaS | @CloudExpo #Cloud #ITaaS #DigitalTransformation

When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment. This represents a shift from buying parts for self-assembly to composing services through self-serve consumption and pay-per-use models.  Quite often this transition also leads to the adoption of software defined environments across the enterprise infrastructure. Software defined infrastructures do, however, bring with them some very unique challenges. Many of the most prevalent issues are centered around the relatively immature state of the technology itself. The most significant aspect of this challenge is the lack of industry standards for device control. Control software must know the status of all network devices and trunks, no matter what vendor equipment is being used. While OpenFlow stands today as the d... (more)

[slides] Regulatory Compliance | @CloudExpo @EmeSec #IoT #DevOps #InfoSec

Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Can Developers Benefit from Regulatory Compliance? Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. Download Slide Deck: ▸ Here In her session at 19th Cloud Expo, Maria C. Horton, Founder and CEO of EmeSec Incorporated, discussed how addressing the new liabilities of Sensitive Data Tracking for GDPR and CUI via code design can reap huge benefits for organizations and f... (more)

For Top Cyber Threats, Look in the Mirror | @CloudExpo #Cloud #Analytics #Cybersecurity

A recent report by Praetorian, a cybersecurity company headquartered in Austin, TX, focused on threats that resulted in data compromise or access to sensitive information. Based on a review of 100 separate internal penetration test engagements the study identified the five most prevalent threats to corporate data.  The amazing thing about these weaknesses is that the top four are all based on utilizing stolen credentials and the last one helps an attacker be more effective in using those stolen credentials.  In other words, the enemy is right there in the mirror!  The study spanned 75 unique organizations and only focused on security weaknesses that were used to obtain a full network compromise. Where are your pain points? The most prevalent threat is something we've all heard of before - Weak Domain User Passwords. Since most corporate environments use Microsoft's... (more)

The BYOD Problem | @CloudExpo #Cloud #Mobile #Security

Everyone wants their device of choice right there next to them 24/7.  To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on "Bring Your Own Device" (BYOD). The key trends influencing enterprise BYOD and mobile security line up as follows: Increased employee mobility (63%), satisfaction (56%) and productivity (55%) dominate as the top drivers of BYOD. These employee related drivers are considered more important than reduced costs (47%). Security (39%) and employee privacy (12%) are the biggest inhibitors of BYOD adoption. 20% of surveyed organizations have suffered a mobile security breach, primarily driven by malware and malicious WiFi. Security threats to BYOD... (more)

Quantum Computing Delivered from the Cloud | @CloudExpo #AI #ML #DL

IBM Cloud is now providing developers with the infrastructure and portal to a 5 qubit quantum computer. This equips them with the ability to build interfaces between classic computers and IBM's quantum platform. Quantum computers make direct use of quantum-mechanical phenomena, such as superposition and entanglement to perform operations on data. Quantum computers are different from binary digital electronic computers based on transistors. Whereas common digital computing requires that the data be encoded into binary digits (bits), each of which is always in one of two definite states (0 or 1), quantum computation uses quantum bits, which can be in superpositions of states. IBM also announced today: The release of a new API (Application Program Interface) for the IBM Quantum Experience that enables developers and programmers to begin building interfaces between it... (more)

Should Data Centers Think? | @CloudExpo #Cloud #Agile #Analytics #DataCenter

As cloud computing becomes the information technology mainstream, data center technology is accelerating at a breakneck speed. Concepts like software define infrastructure, data center analytics and Nonvolatile Memory Express (NVMe) over Fabrics are changing the very nature of data center management.  According to industry research firm IDC, organizations will spend an additional $142.8 billion oninfrastructure for both public and private cloud environments in the next three years (2016-2018) to boost efficiency and business agility. To support this rapid evolving space, Intel announced a “Cloud for All” initiative last year in order to help businesses get the most out of their cloud infrastructure. Specific goals for this initiative include: Investing in the ecosystem to accelerate enterprise-ready, easy-to-deploy software defined infrastructure (SDI) solutions; Op... (more)

Surviving the Coming 'Hackerpocalypse' | @CloudExpo #API #Cloud #Security

With all the excellent training available on television today, we are all now well prepared to deal with the coming Zombie Apocalypse.  Our failure as a society lies, however, in our misunderstanding of the nature of the cybersecurity challenge. This failure threatens us all and our survival will depend on society’s ability to deal with the evolution and maturation of the changing enterprise cybersecurity challenge. If you’re completely oblivious to the living dead threat, a zombie apocalypse refers to a widespread (usually global) rise of zombies hostile to human life.  The zombies will engage in a general assault on civilization where victims may become zombies themselves. This causes the outbreak to become an exponentially growing crisis. The spreading phenomenon swamps normal military and law enforcement organizations, leading to the panicked collapse of civili... (more)