Cloud Computing for Government Efficiency and Transparency

Government Cloud Computing

Subscribe to Government Cloud Computing: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cloud Computing: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

As cloud computing becomes the information technology mainstream, data center technology is accelerating at a breakneck speed. Concepts like software define infrastructure, data center analytics and Nonvolatile Memory Express (NVMe) over Fabrics are changing the very nature of data center management.  According to industry research firm IDC, organizations will spend an additional $142.8 billion oninfrastructure for both public and private cloud environments in the next three years (2016-2018) to boost efficiency and business agility. To support this rapid evolving space, Intel announced a “Cloud for All” initiative last year in order to help businesses get the most out of their cloud infrastructure. Specific goals for this initiative include: Investing in the ecosystem to accelerate enterprise-ready, easy-to-deploy software defined infrastructure (SDI) solutions; Op... (more)

Government Can Influence Cloud Interoperability | @CloudExpo #API #SaaS #Cloud #FedRAMP

The next BriefingsDirect thought leadership panel discussion explores how public-sector organizations can gain economic benefits from cloud interoperability and standardization. Our panel comes to you in conjunction with The Open Group Paris Event and Member Meeting October 24 through 27, 2016 in France, with a focus on the latest developments in eGovernment. As government agencies move to the public cloud computing model, the use of more than one public cloud provider can offer economic benefits by a competition and choice. But are the public clouds standardized efficiently for true interoperability, and can the large government contracts in the offing for cloud providers have an impact on the level of maturity around standardization? To learn how to best procure multiple cloud services as eGovernment services at low risk and high reward, we're joined by our panel... (more)

[slides] Regulatory Compliance | @CloudExpo @EmeSec #IoT #DevOps #InfoSec

Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Can Developers Benefit from Regulatory Compliance? Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. Download Slide Deck: ▸ Here In her session at 19th Cloud Expo, Maria C. Horton, Founder and CEO of EmeSec Incorporated, discussed how addressing the new liabilities of Sensitive Data Tracking for GDPR and CUI via code design can reap huge benefits for organizations and f... (more)

[slides] Compliance in the Cloud | @CloudExpo @IBMcloud #InfoSec #FedRAMP

Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Regulatory Compliance in the Cloud Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task. CSPs need a foundation that provides a uniform, non-repetitive view across all the requirements. Download Slide Deck: ▸ Here In his session at 19th Cloud Expo, David Jenkins, an Executive Architect at IBM working in the Office of the US Federal CTO, discussed an approach that can... (more)

Smart Manufacturing Is Cloud Computing | @CloudExpo #IoT #Cloud #DigitalTransformation

As cloud computing simultaneously transforms multiple industries many have wondered about how this trend will affect manufacturing. Often characterized as "staid," this vertical is not often cited when leading edge technological change is the topic. This view, however, fails to address the revolutionary nexus of cloud computing and the manufacturing industry. Referred to as Digital Thread and Digital Twin; these cloud driven concepts are now driving this vertical's future. Digital Thread is a communication framework that connects traditionally siloed elements in manufacturing processes in order to provide an integrated view of an asset throughout the manufacturing lifecycle. Digital thread implementation also requires business processes that help weave data-driven decision management into the manufacturing culture. A Digital Twin is a virtual representation of a man... (more)

When Cloud and Cognitive Computing Merge | @CloudExpo #ML #Cloud #CognitiveComputing

Cognitive Business: When Cloud and Cognitive Computing Merge Cloud computing has taken over the business world! With almost maniacal focus, single proprietors and Board Directors of the world's largest conglomerates see this new model as a "must do". This rapid shift is, in fact, accelerating. As Jeff Bertolucci observes in "The Shift to Cloud Services Is Happening Faster Than Expected": "According to the sixth annual Uptime Institute Data Center Industry Survey, which examines the big-picture trends shaping IT infrastructure delivery and strategy, the move to cloud services is accelerating. The Uptime Institute's February 2016 poll of more than 1,000 data center and IT professionals predicts that an even faster shift to the cloud will occur over the next four years, reports ZDNet." Figure 1: ComputerWins on ‘Jeopardy!': Trivial, It's Not Another maybe even more im... (more)

System Integration Morphs to Cloud Service Integration | @CloudExpo #API #Cloud #BigData

System Integration Morphs to Cloud Service Integration Cloud Service Brokerage is changing from an industry footnote toward becoming a major system integration play. This role has now become a crucial component of a cloud computing transition because they help organizations aggregate multiple cloud services, integrate services with in-house applications, and customize these services to better meet customer needs. CSBs also help by consulting and recommending the best fit cloud services according to business requirements and goals. Cloud brokers may also be granted rights to negotiate with different service providers on behalf of their customers. This transformation is driven by the rapid rise of cloud computing, which has risen from under $6B in 2008 to a point where the market is expected to almost reach $160B in 2020. The global Cloud Service Brokerage Market itsel... (more)

[session] #FedRAMP Accelerated | @CloudExpo @CoalfireSys #Cybersecurity

FedRAMP Accelerated and the New High Standards In his session at 19th Cloud Expo, Nick Son, Vice President of Cyber Risk & Public Sector at Coalfire, will discuss the latest information on the FedRAMP Program. Topics will cover: FedRAMP Readiness Assessment Report (RAR). This new process is designed to streamline and accelerate the FedRAMP process from the traditional timeline by initially focusing on technical capability instead of documentation preparedness. FedRAMP for High-impact level systems. Early in 2016 FedRAMP officially published requirements for CSPs that want to pursue FedRAMP High authorization. Department of Defense Security Requirements Guide (DOD SRG) Impact Level 6. CSPs can leverage their work in pursuing a FedRAMP-Moderate authorization, and with a little more effort attain certification for DoD authorization. Speaker Bio Nick Son is VP of Cyber... (more)

For Top Cyber Threats, Look in the Mirror | @CloudExpo #Cloud #Analytics #Cybersecurity

A recent report by Praetorian, a cybersecurity company headquartered in Austin, TX, focused on threats that resulted in data compromise or access to sensitive information. Based on a review of 100 separate internal penetration test engagements the study identified the five most prevalent threats to corporate data.  The amazing thing about these weaknesses is that the top four are all based on utilizing stolen credentials and the last one helps an attacker be more effective in using those stolen credentials.  In other words, the enemy is right there in the mirror!  The study spanned 75 unique organizations and only focused on security weaknesses that were used to obtain a full network compromise. Where are your pain points? The most prevalent threat is something we've all heard of before - Weak Domain User Passwords. Since most corporate environments use Microsoft's... (more)

Your Choice: Cloud Technician or Digital Transformer | @CloudExpo #Cloud #DigitalTransformation

The CompTIA Cloud+certification validates the skills and expertise of IT practitioners in implementing and maintaining cloud technologies.  This is exactly what it takes to become a good cloud technician.  In the past few years, however, the National Cloud Technologists Association (NCTA) has recognized that evolving market demands have changed cloud computing technology in at least 13 ways: Variable pricing Cloud service providers charge different prices at different times based on  demand Pre-emptable machines - Providers are offering a lower price for machines that could be shut down and restarted at a later time without aborting the assigned task Shift from hardware to algorithms where the hardware is bundled into the software price Use of reserve instances where the user buys compute power in advance Buying in bulk where pricing is based on aggregated use even... (more)

Military Tips on Business Resiliency | @CloudExpo #API #Cloud #BusinessIntelligence

A steel bar is resistant to stress and is capable of maintaining its form while bearing large loads. While steel is also known as one of the world's strongest metal's (Titanium, Tungsten and Iconel round out the top four), it is also susceptible to shearing and completely breaking. A rubber brick, on the other hand, will bend easily under even small loads, but it's extremely difficult to snap or break. Moreover, once the load is removed from the rubber, its flexibility returns it to its original form. This is how the rubber brick displays resiliency. Photo credit: Shutterstock Business resiliency enables organizations that have suffered a damaging incident to bounce back to their former form. This is especially important for small and medium sized businesses because according to Tim Francis, enterprise leader for cyber insurance for Travelers, 60% of all cyberattack... (more)