Cloud Computing for the Government

Kevin Jackson

Subscribe to Kevin Jackson: eMailAlertsEmail Alerts
Get Kevin Jackson: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Kevin Jackson

A recent report by Praetorian, a cybersecurity company headquartered in Austin, TX, focused on threats that resulted in data compromise or access to sensitive information. Based on a review of 100 separate internal penetration test engagements the study identified the five most prevalent threats to corporate data.  The amazing thing about these weaknesses is that the top four are all based on utilizing stolen credentials and the last one helps an attacker be more effective in using those stolen credentials.  In other words, the enemy is right there in the mirror!  The study spanned 75 unique organizations and only focused on security weaknesses that were used to obtain a full network compromise. Where are your pain points? The most prevalent threat is something we've all heard of before - Weak Domain User Passwords. Since most corporate environments use Microsoft's... (more)

Is Cloud Interoperability a Myth? | @CloudExpo #API #Cloud #OpenStack

As the industry matures, cloud computing will increasingly rely on interoperability in order to grow and deliver more value to industry. Assuming this is a fact, what does it mean when eighteen major OpenStack vendors come together to work through the challenges involved with achieving enterprise interoperability? Events at the OpenStack Summit in Barcelona helped provide a window into the promise of tomorrow's interoperable environment. In cloud computing, interoperability generally refers to the ability of service models from different cloud service providers to work together.... (more)

Military Tips on Business Resiliency | @CloudExpo #API #Cloud #BusinessIntelligence

A steel bar is resistant to stress and is capable of maintaining its form while bearing large loads. While steel is also known as one of the world's strongest metal's (Titanium, Tungsten and Iconel round out the top four), it is also susceptible to shearing and completely breaking. A rubber brick, on the other hand, will bend easily under even small loads, but it's extremely difficult to snap or break. Moreover, once the load is removed from the rubber, its flexibility returns it to its original form. This is how the rubber brick displays resiliency. Photo credit: Shutterstock ... (more)

Your Choice: Cloud Technician or Digital Transformer | @CloudExpo #Cloud #DigitalTransformation

The CompTIA Cloud+certification validates the skills and expertise of IT practitioners in implementing and maintaining cloud technologies.  This is exactly what it takes to become a good cloud technician.  In the past few years, however, the National Cloud Technologists Association (NCTA) has recognized that evolving market demands have changed cloud computing technology in at least 13 ways: Variable pricing Cloud service providers charge different prices at different times based on  demand Pre-emptable machines - Providers are offering a lower price for machines that could be s... (more)

System Integration Morphs to Cloud Service Integration | @CloudExpo #API #Cloud #BigData

System Integration Morphs to Cloud Service Integration Cloud Service Brokerage is changing from an industry footnote toward becoming a major system integration play. This role has now become a crucial component of a cloud computing transition because they help organizations aggregate multiple cloud services, integrate services with in-house applications, and customize these services to better meet customer needs. CSBs also help by consulting and recommending the best fit cloud services according to business requirements and goals. Cloud brokers may also be granted rights to negoti... (more)