Cloud Computing for the Government

Kevin Jackson

Subscribe to Kevin Jackson: eMailAlertsEmail Alerts
Get Kevin Jackson: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Kevin Jackson
Yes, you read that right. The price/performance of your cloud computing infrastructure could vary as much as 1000 percent depending on time and location. High levels of variability have actually been seen within the same cloud service provider (CSP) processing the exact same job. This ...
Data security breaches and hacker attacks on private businesses, health organizations and government agencies in the U.S. have grabbed headlines with increasing frequency, it seems. There is zero doubt about the damage these events cause. Cybercriminals and hackers walk away with custo...
Today I am especially proud and honored to publicly announce my appointment to the IEEE Cloud Computing Magazine Editorial Board! I am truly appreciative to Dr. Alan Sill and Dr. Masin Yousif for their trust and confidence in nominating me to this position. As the world's largest pro...
Cloud computing CAD is now a business requirement. Cloud solution architects are integral to the ideation, creation and deployment of new business models and CAD is the right tool for optimizing their solutions. This is why the use of cloud computing solution computer aided design toda...
ViON solves complex enterprise problems by combining passion and agility to deliver the most effective, innovative solutions because commitment to mission success is in their DNA. One of the ways they deliver success is through ViON on Demand™, which delivers highly secure compute, net...
Security has long been the No. 1 cloud computing business concern. Although the apprehension is absolutely valid, cloud computing business decision and strategies are all too often driven by the many broadly shared misconceptions and misunderstandings. Although every one of these sta...
Business leadership is both science and art. The scientific aspects revolve around finance, organization, products and service. Artistic aspects include relationships, market trajectories and business strategies. While many focus on the science through books and training, the art of bu...
Cloud computing seems destined to be the way enterprises will use information technology. The drastic cost reductions and impressive operational improvements make the transition an unstoppable trend. The “What is cloud computing?” question now, however, seems to be morphing into “Where...
While SAP is globally renowned as a provider of enterprise management software, the name is hardly ever associated with the spooky world of intelligence. That is one reason why I jumped at the opportunity to talk with SAP executives responsible for the company’s work in that clandestin...
There is almost a deafening discussion going on about the self-centeredness of today’s young adults. Weather you call them Generation Y, millennials or twenty-somethings, the general refrain seems to be a perception that the entire lot of them only care about themselves. Patricia Gree...
Prague is a beautiful city! My last time was in June 2010 when Jeremy Geelan invited me to speak at Cloud Expo Europe (see my blog post and video from that trip at "CloudExpo Europe 2010: Not Your Father's Prague"). And yes, that is the same Jeremy Geelan that is currently enduring the...
"The Federal government today is in the midst of a revolution. The revolution is challenging the norms of government by introducing new ways of serving the people. New models for creating services and delivering information; new policies and procedures that are redefining federal acqui...
The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days, according to Gregory Touhill, deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. ...
I woke up this morning to the devastating news about the earthquake in Nepal. Sitting here in California that destruction is literally on the other side of the world but my mind immediately went to thinking about my good friend Jeremy Geelan. See Jeremy and his family have been l...
OmniTI, a provider of web infrastructures and applications for companies that require scalable, high-performance, mission critical solutions, has announced that it has partnered with GovCloud Network, LLC to help clients develop and execute mission and business strategies for cloud-bas...
The adoption of Internet of Things (IoT) appears to be unquestioned. Advances in wearables and sensors are strategic to tech companies, telecoms and manufacturers across multiple domains. Everyone from millennials to boomers is incorporating IoT technologies into the daily flow of life...
Science, technology, engineering and mathematics (STEM) professionals are drivers of innovation,creativity and invention. STEM disciplines are significant drivers of economies worldwide, and STEM careers are rewarding and fulfilling. The promise of STEM is therefore important for econo...
This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing may be the biggest and most overhyped term in Government information technology today. It is also the most discussed topic in agency s...
Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of 180 million is now on a mission to become a regional information technology powerhouse...
Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal responsibilities associated with cybersecurity. The consumerization of IT and the adop...
Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines the security requirements that Department of Defense (DOD) mission owners must adhere to w...
ITIL (formerly known as the Information Technology Infrastructure Library) has been the best management practices framework of choice for world class IT Operations organizations. The 5 stage framework: Service Strategy, Design, Transition, Operation, and Continual Service improvement ...
Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realization of such promises has not ...
Contrary to what your mother may have told you, going in circles is sometimes a good thing. When it comes to our economy, it is actually a great thing. Throughout history, society has built itself up by transforming raw materials into finished, usable products. This manufacturing proc...
Recent security breaches have heightened our awareness of cybersecurity issues. The hack and other security breaches have resulted in unprecedented damages. However, the majority of mobile device users have yet to be sensitized to their personal and corporate security risks. For examp...
Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chi...
"Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since the transaction doesn't involve any physical entity, procedures and processes a...
With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increase. Some 61% of over 1600 security expert respondents to a recent...
I am proud and honored to announce that I have been added as a speaker at SouthAsia's biggest tech event "Digital World 2015" , 9th - 12th February, 2015 at the Bangabandhu International Conference Center Dhaka, Bangladesh. The event will also be attended by the Honorable Prime Ministe...
According to a Greer Institute Workforce and Talent study, the 2020 workforce is both "the most educated and culturally diverse of any generation" and "notorious job-hoppers who dislike bureaucracy and distrust traditional hierarchies." Given this, it is crucial for leaders to understa...
A new transformative research approach is gaining global attention and adoption. The scientific opportunities enabled by convergence-the coming together of insights and approaches from originally distinct fields-will make fundamental contributions in our drive to provide creative solut...
Cyber security is rapidly becoming a significant issue in the C-suite as well as the population at large. The results of Dell's Global Technology Adoption Index(GTAI) [1] show that security is a top concern for most of the 2000 global small and medium businesses surveyed. The outcomes ...
Did you know that..... Goldman Sachs recognized Bangladesh as one of the Next Eleven (N-11) - a list of eleven countries having strong potential for becoming the world's largest economies along with BRIC (Brazil, Russia, India and China)?JP Morgan named Bangladesh as one of the `Fronti...
The worlds of cloud, mobile, social and cyber will continue expanding, permuting and recombining. Their individual effect on society and commerce will become moot as these technological capabilities merge to deliver products and services straight out of Star Trek! Traditional system i...
In the last two years, IT security breaches have hit the White House, the State Department, the top federal intelligence agency, the largest American bank, the top hospital operator, energy companies, retailers and even the Postal Service. Melvin Greer, Senior Fellow and Chief Strategi...
The Federal Cloud Computing Summit will be held on January 14-15, 2015 at the Marriott Metro Center in Washington, D.C. (Complimentary government and academic registration) This educational symposium will feature cloud computing thought leaders from government and academia di...
We are so proud of the success of out first cloud computing training class. This group took the challenge of changing their careers, studying hard and focusing their efforts in order to reap the rewards! We are ecstatic over there accomplishment of :' 100% PASS RATE ON COMPTIA CLOUD ...
Cloud computing is currently making information technology headlines, and vendors are aggressively promoting the many benefits it can provide organizations. This White Paper addresses the claims and questions that are often raised in relation to cloud computing and provides a clear ...
A few days ago I received a call from a small business owner asking if I would meet him for coffee. He wanted to run some ideas past me on how he could enhance his current business with cloud computing. This is the sort of request that I can never turn down so we quickly made an appo...
One of the questions I've been asked from the beginning of the Federal Cloud First initiative, is, "If my data is in The answer is not as clear-cut as the question. In theory, most cloud services offer extremely resilient platforms and a modicum of disaster recovery is built in. In ...