Cloud Computing for the Government

Kevin Jackson

Subscribe to Kevin Jackson: eMailAlertsEmail Alerts
Get Kevin Jackson: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Kevin Jackson

When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment. This represents a shift from buying parts for self-assembly to composing services through self-serve consumption and pay-per-use models.  Quite often this transition also leads to the adoption of software defined environments across the enterprise infrastructure. Software defined infrastructures do, however, bring with them some very unique challenges. Many of the most prevalent issues are centered around the relatively immature state of the technology itself. The most significant aspect of this challenge is the lack of industry standards for device control. Control software must know the status of all network devices and trunks, no matter what vendor equipment is being used. While OpenFlow stands today as the d... (more)

NATO ACT 'Art of the Possible' Interoperability Demonstration

NATO ACT 'Art of the Possible' Interoperability Demonstration GovCloud Network is proud to have served as the Program Manager for the NATO Allied Command Transformation, "Art of the Possible" Interoperability Demonstration on December 16, 2016. supporting the The Network Centric Operations Industry Consortium (NCOIC), this effort featured an important demonstration for military, government and business leaders by its member-companies to underscore the benefits of collaborating via an interoperable network environment. The demonstration used a secure, federated-cloud infrastructu... (more)

The BYOD Problem | @CloudExpo #Cloud #Mobile #Security

Everyone wants their device of choice right there next to them 24/7.  To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on "Bring Your Own Device" (BYOD). The key trends influencing enterprise BYOD and mobile security line up as follows: Increased employee mobility (63%), satisfaction (56%) and productivity (55%) dominate as the top drivers of BYOD. These employee related d... (more)

Surviving the Coming 'Hackerpocalypse' | @CloudExpo #API #Cloud #Security

With all the excellent training available on television today, we are all now well prepared to deal with the coming Zombie Apocalypse.  Our failure as a society lies, however, in our misunderstanding of the nature of the cybersecurity challenge. This failure threatens us all and our survival will depend on society’s ability to deal with the evolution and maturation of the changing enterprise cybersecurity challenge. If you’re completely oblivious to the living dead threat, a zombie apocalypse refers to a widespread (usually global) rise of zombies hostile to human life.  The zom... (more)

Should Data Centers Think? | @CloudExpo #Cloud #Agile #Analytics #DataCenter

As cloud computing becomes the information technology mainstream, data center technology is accelerating at a breakneck speed. Concepts like software define infrastructure, data center analytics and Nonvolatile Memory Express (NVMe) over Fabrics are changing the very nature of data center management.  According to industry research firm IDC, organizations will spend an additional $142.8 billion oninfrastructure for both public and private cloud environments in the next three years (2016-2018) to boost efficiency and business agility. To support this rapid evolving space, Intel a... (more)