Cloud Computing for Government Efficiency and Transparency

Government Cloud Computing

Subscribe to Government Cloud Computing: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cloud Computing: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Government Cloud Computing
Our world is driven by data. It may speak in whispers, but it can also scream insight and information to those that understand it’s language. This is why I’ll be attending Strata+Hadoop World, Sept 26th to 29th, in New York City. Even though data can also speak many different languag...
JUST ANNOUNCED!!I am personally excited to be delivering the (ISC)² CCSP Two-Day Crash Course at RSA Conference 2017!"The current state of cybersecurity means there are many opportunities for the industry as a whole to collaborate on new innovations. Discovering the next great opp...
Powered by Singapore-based Big Data start-up Crayon Data, BigData-MadeSimple.com tapped the insurance industry as being at the forefront of integrating cloud technology into their digital eco system. As stated in one of their recent articles "Cloud based platforms, storage and applica...
In a recent CloudTech article multi-cloud, or hybrid cloud, strategy was heralded as “… transformative for businesses, allowing them flexibility to scale offerings, save on hosting solutions, and ultimately offer better solutions to their customers. The article goes on to cite: A 201...
It was late 2011 and Steven Donovan was comfortable working at SHI International Corporation, a growing information technology firm, as a personal computer break/fix technician. His company had been growing quickly from a $1 million "software-only" regional re-seller into eventually be...
DoubleHorn is now offering its feature-rich and cost effective Evidence Management System for Law enforcement agencies interested in developing body-worn camera programs across Texas. DoubleHorn's Evidence Management System (DEMS) is a unified system suitable for capturing any digital...
Cloud computing is now entering adolescent. With all the early adopters now swimming in the cloud pool with that “I told you so” smug, fast followers are just barely beating the early majority. The gold rush to cloud is also driving the IT herd to get cloud computing training. Traini...
Cloud computing is rewriting the books on information technology (IT) but inter-cloud networking remains a key operational issue. Layering inherently global cloud services on top of a globally fractured networking infrastructure just doesn’t work. Incompatibilities abound and enterpris...
Karen Field, Penton Communications' IoT Institute director, in her article "Start Small to Gain Big," postulated an oil drilling platform with 30,000 sensors would generate about 1 Terabyte of data per day. She also stressed that only 1% of that data would likely be used. From a system...
IoT networking requirements are vastly different from those supported by today's cloud network. The processing and transport levels are multiple orders of magnitude higher than ever seen before. More importantly though, societal economic and the safety ramifications of making mistakes ...
The "Internet of Things" depends on the "Cloud" for the processing and storage of data. The Cloud's backbone, however, is the network. This logic train reveals the importance of professional rigor and solid System Engineering (SE) of the network. Imagine a sea of sensors, put out in...
Enterprise storage is trending away from traditional, enterprise managed network-attached storage (NAS) and storage area networks (SAN) towards a more complex environment that includes software-defined and cloud-based solutions. Spinning disks are also being replaced with flash arrays ...
Enterprises must rethink network management in the cloud computing world. This new reality is driven by the rise of software defined networking, the virtualization of everything and a business imperative to create and deploy even newer information delivery models. With the entire infra...
In the mythical, medieval land of AWS, a civil war brews between the several noble Cloud Services over rulership. Meanwhile, across the sea, the former controlling dynasty, Traditional IT, attempts to make its way back home and reclaim the throne with the help of the "Do It Yourself" o...
Not to long ago I was honored to be included as a storage expert in the Dell ebook, "10 Ways to Flash Forward: Future-Ready Storage Insights from the Experts." This publication provided insight into some of the most recent advances in enterprise storage and gave some excellent recomend...
A few weeks ago I had the pleasure of doing a Blab on advanced storage with Daniel Newman and Eric Vanderburg. We covered some pretty interesting points on enterprise storage challenges, advanced storage trends and flash. If you didn't catch it, a replay is now available.
The use of Electronic Medical Records (EMR) by medical professionals has increased dramatically. According to HealthIT.gov, 2015 statistics show that 56 percent of all U.S. office-based physicians (MD/DO) have demonstrated meaningful use of electronic health records. The downside of th...
The definition of DevOps emphasizes collaboration and communication between software developers and other IT professionals while automating the software delivery and infrastructure change process. While agile software development and the use of automated infrastructure configuration to...
Hybrid cloud is rapidly becoming essential to today’s information technology processes. This is why hybrid cloud risk management has become the keystone to many modern corporate strategies. To effectively manage this shift, leading enterprises are reorganizing how the business side of ...
Last year I read an article in the Federal technology publication FCW that talked about the President’s 2016 spending plan and how much of the focus is on the improvement of digital services. Overall, the IT spending budget is $86.4 billion and $105 million of that is slated to expand ...
According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a st...
The world of business is software. No matter the industry vertical or business model, effective software is the key to business success. An even more important aspect of this reality is the application programming interface (API). If you are unfamiliar with this kind of geeky term, A...
The Dell Fellows program recognizes engineers for their outstanding and sustained technical achievements, engineering contributions and advancement of the industry. They are also seen as top innovators that have distinguished themselves through ingenuity, intellectual curiosity and inv...
Platform-as-a-Service (PaaS) has always been the unappreciated sibling of the cloud computing service model trio. Existing in the dark shadow of the most widely adopted Software-as-a-Service (SaaS) and foundationally powerful Infrastructure-as-a-Service (IaaS), the third service model ...
One cloud does not fit all organizations. That's true whether it is a public or private cloud. A hybrid cloud option allows your business to create a custom solution that fits your organizational needs. However, there are always questions with new solutions. We reached out to indust...
As cloud computing continues to grow in importance, enterprises are now facing a new realization. In their almost rampant embrace of cost savings associated with public cloud, many are just now understanding the information technology governance challenge posed by vastly different trad...
The traditional, on-premise computing model has established processes, accreditations, certifications, governance and compliance rules - FISMA, NERC CIP, HIPAA, PCI-DSS, IRS 1075. While the security industry is aggressively addressing the technical security gaps in cloud-driven service...
“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management.” While thi...
Cybersecurity is top of mind for corporations around the world. The quantity of recent data breaches and the dollar loss associated with some of them indicates either an underinvestment in cybersecurity or a failure to properly invest in people, security training or technology. While b...
As a business communications tool, email is the dominant option, and many corporations have policies that allow the use of personal email on corporate computers. In a recent Adobe Systems commissioned online survey of 400 U.S. white-collar, adult workers, more than 90 percent of them a...
Where is your data right now? The explosion of cloud computing and consumer IT means that your data, as well as data about you, can be virtually anywhere. Having your data and the data about you virtually everywhere is, in fact, key to the cloud computing business model. This means th...
Is your company struggling with the idea of using “cloud hosting” in order to save money? Truth be known, using cost savings as the primary reason for moving to cloud will almost guarantee failure. Some reasons that typically lead to cloud computing costing more include: Building and...
On February 8, 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy[1]. In the executive summary he laid out the inefficient state of affairs that was the US Federal Government's IT environment: The Federal Government's current Information Techn...
In 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy [1]. In the executive summary he pointed to cloud computing as a key component of the US Federal Government’s information technology modernization efforts: “Cloud computing has the potential ...
In 2011 the US Federal Government issued a Cloud First policy mandating that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. Cloud computing is a design style that allows for effici...
Recent unauthorized access to a U.S. government database led to thecompromise of information on at least 21.5 million individuals. This massive background investigation data breach also compromised usernames, passwords, mental health records and financial information. Although a securi...
The Federal Government’s “Cloud First” policy mandates that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. The Federal Risk and Authorization Management Program (FedRAMP) is a mand...
Yes, you read that right. The price/performance of your cloud computing infrastructure could vary as much as 1000 percent depending on time and location. High levels of variability have actually been seen within the same cloud service provider (CSP) processing the exact same job. This ...
Data security breaches and hacker attacks on private businesses, health organizations and government agencies in the U.S. have grabbed headlines with increasing frequency, it seems. There is zero doubt about the damage these events cause. Cybercriminals and hackers walk away with custo...
Today I am especially proud and honored to publicly announce my appointment to the IEEE Cloud Computing Magazine Editorial Board! I am truly appreciative to Dr. Alan Sill and Dr. Masin Yousif for their trust and confidence in nominating me to this position. As the world's largest pro...