Cloud Computing for the Government

Kevin Jackson

Subscribe to Kevin Jackson: eMailAlertsEmail Alerts
Get Kevin Jackson: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Kevin Jackson
Organizations around the world are struggling to cope with the current data explosion. A vital characteristic of this data is that it is unstructured and represents things like email, images, and videos. Storage of this form of data is typically in an object format which differs signi...
Cloud computing innovation will power enterprise transformation in 2018. Cloud growth is also driving a rapid rise in the storage market, exacerbating the enterprise challenge around storage cost and complexity. The business reason behind this marketplace reality is the proliferation o...
Digital Transformation is the No 1 priority for organizations large and small. It’s imperative that IT remove any obstacles to digital transformation success – including outdated PCs and mobile devices. Intel’s Kaitlin Murphy has some pointers to assure that your PC fleet and mobile de...
In a recent post, titled “10 Surprising Facts About Cloud Computing and What It Really Is”, Zac Johnson highlighted some interesting facts about cloud computing in the SMB marketplace: Cloud Computing is up to 40 times more cost-effective for an SMB, compared to running its own IT sys...
Digital Transformation is amplifying mainframe as mission critical to business growth more than ever before. With 70% of the world's corporate data and over half of the world's enterprise applications running on mainframe computers, they are at the core of just about every transaction....
Cloud, mobility and the Internet of Things have obliterated the traditional perimeter that protected organizations. The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management.This episode of the “The Endpoint Imperative” podcast s...
China has its Cybersecurity Law. Next May, the General Data Protection Regulation – or GDPR –goes into effect for the European Union. Research shows most organizations just aren’t ready for these and other measures.Tune into this episode of “The End Point Imperative: A Podcast Series f...
Fast-evolving trends are changing the way IT thinks about security. To stay secure and productive, IT operations must excel at the fundamentals: PC refreshes for security, and optimizing end-user computers with Microsoft Windows 10. In “The Endpoint Imperative,” a podcast series from I...
The Rise "Top 1000 Tech Bloggers" leaderboard recognizes the most inspiring Tech journalists and bloggers active on social media. They use Klout scores (50%) and the blogger's twitter conversations on "tech" (50%) to rank these leaders on their social media influence. The first 100+ te...
Hybrid cloud adoption is now mainstream and you are making decisions every day about how to transform application and infrastructure architectures, service delivery, DevOps, production operations and governance. With Cloud and Systems Services you rethink how technology can be used to ...
Today’s businesses run in the virtual world. From virtual machines to chatbots to Bitcoin, physical has become last century’s modus operandi. Dealing with this type of change in business even has its own buzzword – Digital Transformation. From an information technology operations poi...
That world of homogenous IT technology managed entirely by the internal IT organization has long disappeared. Operations today require efficient and global management of technologically heterogeneous environments. The challenges and mistakes organizations make when tackling this import...
Did you know that the reservations systems of the biggest carriers mostly run on a specialized IBM operating system known as Transaction Processing Facility (TPF). Designed by IBM in the 1960’s it was designed to process a large numbers of transactions quickly. Although IBM is still up...
Runaway cloud computing cost may be causing an information technology industry crisis. Expanding requirements, extended transition schedules and misleading marketplace hype have made “Transformation” a dirty word. Questions about how to manage cost variances and deviations with asset...
The AWS Marketplace is growing at breakneck speed, with 40% more listings than last year! This and more insights were revealed when CloudEndure used their custom tool to quickly scan the over 6,000 products available on AWS Marketplace. The top offerings are highlighted in the image be...
Cloud computing is more than servers and storage. In a crisis situation it can actually be a lifesaver. BlackBerry, in fact, has just become the first cloud-based crisis communication service to receive a Federal Risk and Authorization Management Program (FedRAMP) authorization from th...
There's a lot to gain from cloud computing, but success requires a thoughtful and enterprise focused approach. Cloud computing decouples data and information from the infrastructure on which it lies. A process that is a LOT more involved than dragging some folders from your desktop to ...
Moore's Law, which states that processing speeds will double every two years as we cram more and more silicon transistors onto chips, has been faltering since the early 2000s when the law started to run up against fundamental limitations presented by the laws of thermodynamics. While t...
Everyone wants their device of choice right there next to them 24/7. To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on ...
A couple of weeks ago while attending IBM Interconnect 2017 I had the awesome opportunity to participate in the IBM Interconnect 2017 Podcast Series with Dez Blanchfield. I not only got to pontificate on all things tech, but also had the honor of collaborating with some of the best min...
Enterprise mobility has become table stakes in the world of business. The ability to access current information at any time, from anywhere, on any device has really become a cliché. The familiarity we all have with smartphones and wireless access, actually obscures the true difficulty...
In today’s globally connected world, data security breaches are bound to occur. This, in turn, increases the importance of digital forensic readiness, or the ability to access and trust computer log data in the identification of a breach and the determination of what datasets may have ...
As cloud computing becomes the information technology mainstream, data center technology is accelerating at a breakneck speed. Concepts like software define infrastructure, data center analytics and Nonvolatile Memory Express (NVMe) over Fabrics are changing the very nature of data cen...
In 2016, cloud computing started to dominate many IT market segments. As a business, Synergy Research Group reported that industry revenue for the four quarters ended Sept. 30 grew 25%. Operator and vendor revenue for six segments of cloud computing reached $148 billion during that per...
From the rise of increasingly capable nation-states—like Iran and North Korea—conducting destructive attacks against American private sector companies, to the continuing pace of IP theft by China striking at the very heart of our innovation economy, the new team at the White House will...
The City of Beaverton is located seven miles west of Portland, Oregon, in the Tualatin River Valley, It encompasses 19.6 square miles, and is home to more than 95,000 residents. The city is Oregon’s sixth largest and the second-largest incorporated city in Washington County. Located in...
End of year predictions in December are as predictable as tomorrow’s sunrise, but a recent video on 2017 Technology Trends helped me really understand how important a digital transformation strategy is to just about any business executive. The CSC Town Hall conversation actually identi...
Olisipo Learning in Portugal has a culture that is based on the constant search for new challenges. Recognized by their clients as the “Best HR Supplier”, they have placed more than 450 specialists into some of the country's most attractive and innovative IT projects. As a leading Port...
Firebrand, the leader in Accelerated Learning, has recently announced it's 2017 delivery schedule for their accelerated CloudMASTER® training course. Delivered in partnership with Logical Operations and the NCTA, this unique opportunity to immerse yourself in cloud computing will be of...
As cloud computing simultaneously transforms multiple industries many have wondered about how this trend will affect manufacturing. Often characterized as “staid”, this vertical is not often cited when leading edge technological change is the topic. This view, however, fails to address...
The ongoing digital transformation continues to generate a steady demand for workers with increasingly sophisticated digital skills. This process is multi-dimensional and workers with these highly specialized skills are very much sought after. The European Union Commissionestimates tha...
A recent report by Praetorian, a cybersecurity company headquartered in Austin, TX, focused on threats that resulted in data compromise or access to sensitive information. Based on a review of 100 separate internal penetration test engagements the study identified the five most prevale...
So how could a NCTA Certified CloudMASTER accelerate his career in the fashion industry?To answer that question, you would need to catch up with George Youmans, Jr. He has been with fashion giant Ralph Lauren since October 2012. That was around the time he decided to complete the NCTA ...
The CompTIA Cloud+certification validates the skills and expertise of IT practitioners in implementing and maintaining cloud technologies. This is exactly what it takes to become a good cloud technician. In the past few years, however, the National Cloud Technologists Association (NC...
Recently I've been doing quite a bit of analysis work using the IBM Watson cognitive business platform. The really exciting thing about this opportunity is the way data can seem to have a conversation with you. This got me wondering if social media data could carry on a conversation a...
A steel bar is resistant to stress and is capable of maintaining its form while bearing large loads. While steel is also known as one of the world's strongest metal's (Titanium, Tungsten and Iconel round out the top four), it is also susceptible to shearing and completely breaking. A r...
For over 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer courses and certifications. They are the world’s largest independent IT training company, with over 300 computer tr...
I learned quite a bit about the Trusted Analytics Platform (TAP). TAP is an open source project that Intel developed to make it easier for developers and data scientists to deploy custom big data analytics solutions in the cloud as well as reduce development costs and time-to-market. A...
JUST ANNOUNCED!!I am personally excited to be delivering the (ISC)² CCSP Two-Day Crash Course at RSA Conference 2017!"The current state of cybersecurity means there are many opportunities for the industry as a whole to collaborate on new innovations. Discovering the next great opp...
Since May 2010, “Cloud Musings” has demonstrated, educated and celebrated the use of advanced technology in business. Specific subjects are sometimes varied, but cloud computing and cybersecurity seem to have become our sweet-spot. Over this period, information technology has transform...