Cloud Computing for Government Efficiency and Transparency

Government Cloud Computing

Subscribe to Government Cloud Computing: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cloud Computing: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Government Cloud Computing
Enterprise storage is trending away from traditional, enterprise managed network-attached storage (NAS) and storage area networks (SAN) towards a more complex environment that includes software-defined and cloud-based solutions. Spinning disks are also being replaced with flash arrays ...
Enterprises must rethink network management in the cloud computing world. This new reality is driven by the rise of software defined networking, the virtualization of everything and a business imperative to create and deploy even newer information delivery models. With the entire infra...
In the mythical, medieval land of AWS, a civil war brews between the several noble Cloud Services over rulership. Meanwhile, across the sea, the former controlling dynasty, Traditional IT, attempts to make its way back home and reclaim the throne with the help of the "Do It Yourself" o...
Not to long ago I was honored to be included as a storage expert in the Dell ebook, "10 Ways to Flash Forward: Future-Ready Storage Insights from the Experts." This publication provided insight into some of the most recent advances in enterprise storage and gave some excellent recomend...
A few weeks ago I had the pleasure of doing a Blab on advanced storage with Daniel Newman and Eric Vanderburg. We covered some pretty interesting points on enterprise storage challenges, advanced storage trends and flash. If you didn't catch it, a replay is now available.
The use of Electronic Medical Records (EMR) by medical professionals has increased dramatically. According to HealthIT.gov, 2015 statistics show that 56 percent of all U.S. office-based physicians (MD/DO) have demonstrated meaningful use of electronic health records. The downside of th...
The definition of DevOps emphasizes collaboration and communication between software developers and other IT professionals while automating the software delivery and infrastructure change process. While agile software development and the use of automated infrastructure configuration to...
Hybrid cloud is rapidly becoming essential to today’s information technology processes. This is why hybrid cloud risk management has become the keystone to many modern corporate strategies. To effectively manage this shift, leading enterprises are reorganizing how the business side of ...
Last year I read an article in the Federal technology publication FCW that talked about the President’s 2016 spending plan and how much of the focus is on the improvement of digital services. Overall, the IT spending budget is $86.4 billion and $105 million of that is slated to expand ...
According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a st...
The world of business is software. No matter the industry vertical or business model, effective software is the key to business success. An even more important aspect of this reality is the application programming interface (API). If you are unfamiliar with this kind of geeky term, A...
The Dell Fellows program recognizes engineers for their outstanding and sustained technical achievements, engineering contributions and advancement of the industry. They are also seen as top innovators that have distinguished themselves through ingenuity, intellectual curiosity and inv...
Platform-as-a-Service (PaaS) has always been the unappreciated sibling of the cloud computing service model trio. Existing in the dark shadow of the most widely adopted Software-as-a-Service (SaaS) and foundationally powerful Infrastructure-as-a-Service (IaaS), the third service model ...
One cloud does not fit all organizations. That's true whether it is a public or private cloud. A hybrid cloud option allows your business to create a custom solution that fits your organizational needs. However, there are always questions with new solutions. We reached out to indust...
As cloud computing continues to grow in importance, enterprises are now facing a new realization. In their almost rampant embrace of cost savings associated with public cloud, many are just now understanding the information technology governance challenge posed by vastly different trad...
The traditional, on-premise computing model has established processes, accreditations, certifications, governance and compliance rules - FISMA, NERC CIP, HIPAA, PCI-DSS, IRS 1075. While the security industry is aggressively addressing the technical security gaps in cloud-driven service...
“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management.” While thi...
Cybersecurity is top of mind for corporations around the world. The quantity of recent data breaches and the dollar loss associated with some of them indicates either an underinvestment in cybersecurity or a failure to properly invest in people, security training or technology. While b...
As a business communications tool, email is the dominant option, and many corporations have policies that allow the use of personal email on corporate computers. In a recent Adobe Systems commissioned online survey of 400 U.S. white-collar, adult workers, more than 90 percent of them a...
Where is your data right now? The explosion of cloud computing and consumer IT means that your data, as well as data about you, can be virtually anywhere. Having your data and the data about you virtually everywhere is, in fact, key to the cloud computing business model. This means th...
Is your company struggling with the idea of using “cloud hosting” in order to save money? Truth be known, using cost savings as the primary reason for moving to cloud will almost guarantee failure. Some reasons that typically lead to cloud computing costing more include: Building and...
On February 8, 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy[1]. In the executive summary he laid out the inefficient state of affairs that was the US Federal Government's IT environment: The Federal Government's current Information Techn...
In 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy [1]. In the executive summary he pointed to cloud computing as a key component of the US Federal Government’s information technology modernization efforts: “Cloud computing has the potential ...
In 2011 the US Federal Government issued a Cloud First policy mandating that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. Cloud computing is a design style that allows for effici...
Recent unauthorized access to a U.S. government database led to thecompromise of information on at least 21.5 million individuals. This massive background investigation data breach also compromised usernames, passwords, mental health records and financial information. Although a securi...
The Federal Government’s “Cloud First” policy mandates that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. The Federal Risk and Authorization Management Program (FedRAMP) is a mand...
Yes, you read that right. The price/performance of your cloud computing infrastructure could vary as much as 1000 percent depending on time and location. High levels of variability have actually been seen within the same cloud service provider (CSP) processing the exact same job. This ...
Data security breaches and hacker attacks on private businesses, health organizations and government agencies in the U.S. have grabbed headlines with increasing frequency, it seems. There is zero doubt about the damage these events cause. Cybercriminals and hackers walk away with custo...
Today I am especially proud and honored to publicly announce my appointment to the IEEE Cloud Computing Magazine Editorial Board! I am truly appreciative to Dr. Alan Sill and Dr. Masin Yousif for their trust and confidence in nominating me to this position. As the world's largest pro...
Cloud computing CAD is now a business requirement. Cloud solution architects are integral to the ideation, creation and deployment of new business models and CAD is the right tool for optimizing their solutions. This is why the use of cloud computing solution computer aided design toda...
ViON solves complex enterprise problems by combining passion and agility to deliver the most effective, innovative solutions because commitment to mission success is in their DNA. One of the ways they deliver success is through ViON on Demand™, which delivers highly secure compute, net...
Security has long been the No. 1 cloud computing business concern. Although the apprehension is absolutely valid, cloud computing business decision and strategies are all too often driven by the many broadly shared misconceptions and misunderstandings. Although every one of these sta...
Business leadership is both science and art. The scientific aspects revolve around finance, organization, products and service. Artistic aspects include relationships, market trajectories and business strategies. While many focus on the science through books and training, the art of bu...
Cloud computing seems destined to be the way enterprises will use information technology. The drastic cost reductions and impressive operational improvements make the transition an unstoppable trend. The “What is cloud computing?” question now, however, seems to be morphing into “Where...
While SAP is globally renowned as a provider of enterprise management software, the name is hardly ever associated with the spooky world of intelligence. That is one reason why I jumped at the opportunity to talk with SAP executives responsible for the company’s work in that clandestin...
There is almost a deafening discussion going on about the self-centeredness of today’s young adults. Weather you call them Generation Y, millennials or twenty-somethings, the general refrain seems to be a perception that the entire lot of them only care about themselves. Patricia Gree...
Prague is a beautiful city! My last time was in June 2010 when Jeremy Geelan invited me to speak at Cloud Expo Europe (see my blog post and video from that trip at "CloudExpo Europe 2010: Not Your Father's Prague"). And yes, that is the same Jeremy Geelan that is currently enduring the...
"The Federal government today is in the midst of a revolution. The revolution is challenging the norms of government by introducing new ways of serving the people. New models for creating services and delivering information; new policies and procedures that are redefining federal acqui...
The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days, according to Gregory Touhill, deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. ...
I woke up this morning to the devastating news about the earthquake in Nepal. Sitting here in California that destruction is literally on the other side of the world but my mind immediately went to thinking about my good friend Jeremy Geelan. See Jeremy and his family have been l...