Cloud Computing Wargames !!

Cloud Acquisition Strategy, Customized to the Right Cloud Model

By G C Network | March 17, 2015

by Melvin Greer Managing Director, Greer Institute  This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing…

Women leading us to the cloud

By G C Network | March 14, 2015

By Jodi Kohut Government Cloud Computing Professional   By Jodi Kohut Government Cloud Computing Professional March is Women’s History Month. As we celebrate women and their role in our history, our…

CSCC Cloud Privacy Summit – Reston, VA March 26th

By G C Network | March 12, 2015

Please join the Cloud Standards Customer Council in Reston, Virginia on Thursday, March 26th for the Cloud Privacy Summit. This all day symposium will stimulate lively, interactive discussion and deliver…

Bangladesh: A country transforms with IT

By G C Network | March 9, 2015

Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of…

Introducing CloudTek University

By G C Network | March 5, 2015

Visit us at https://www.CloudTekU.com Cloud Computing Basics https://sqz.co/Fs34AaX Cloud Technologies https://sqz.co/s2ACt68 Cloud Security https://sqz.co/Mp7m3TE Business Innovation https://sqz.co/j4NZb37 Cloud Computing Pilots https://sqz.co/e5HFy24 Cloud Operations https://sqz.co/p5CJo24 CloudTek Overview https://sqz.co/k9S4Ewt ( This content…

The Emerging Science of Digital Forensics

By G C Network | February 24, 2015

By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains…

African-Americans and STEM careers: Getting a foot in the door

By G C Network | February 16, 2015

By Sandra K. Johnson Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the…

U.S. Department of Defense sets its cloud security guidelines

By G C Network | February 12, 2015

By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines…

Circles are good for the economy

By G C Network | February 9, 2015

Contrary to what your mother may have told you, going in circles is sometimes a good thing. When it comes to our economy, it is actually a great thing. Throughout…

2015 National Chief Information Security Officer Survey

By G C Network | February 4, 2015

Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information.  The…

Wikipedia


 “A wargame is a game that represents a military operation.”
 “Military simulations, also known informally as war games, are simulations in which theories of warfare can be tested and refined without the need for actual hostilities”
———————————————————————————————
For ages, simulations and wargames have been used by the military to prepare for eventual future operations. During the Cold War, countless battles between the red and blue forces were set-up, run and reset in preparation for the conflict that thankfully never came. Some contend that these wargames, in fact, were instrumental in preventing a global nuclear holocaust.

As an outgrowth of this apparent success, business war games also came in vogue as a tool to help managers develop and execute business strategies more successfully. In 2005 there was actually an all-day “Battle for Clicks” war game between students from MIT Sloan School of Management and Harvard Business School. This game, run by Fuld & Co., a Cambridge-based strategic intelligence consulting firm, was the first such competition involving students from these two world-class business schools.
In a unique take on this concept, in 2006, Booz Allen Hamilton took business wargaming one step further. As reported by Government Computing News, the CIO Wargame, a BAH creation, combines the basics of craps and Monopoly to simulate how CIOs, chief architects and other program managers make decisions. The game’s stated goal is to bring projects into the operation and maintenance phase and earn as many mission value points as possible, while taking steps to reduce the risk of failures and setbacks. The team with the most points after five rounds won. Like in Monopoly, players had to make strategic investment decisions on which projects and IT capabilities to bet on; like in craps, the roll of the dice often determined how well a project paid off.

I’m happy to report that the CIO Wargame is now being updated! The new Cloud Computing Wargame (CCW) represents a major evolution of the original concept and will be unveiled at FOSE 2009. I am looking forward to working with the BAH Cloud Computing Team on this exciting project.
More than a game, CCW applies simulation techniques to model “Traditional IT” and “Cloud Computing” environments and dynamically maps them against internal, community, and Cloud-based resources. The simulation represent real-life situations facing IT management daily, especially in an environment of rapid technological and mission change against a backdrop of resource variability. The CCW is designed for both mission “owners” and senior IT staff who are engaged in the strategic planning and use of information technologies to meeting organization mission and basic business requirements. The game puts the “players” in real-life situations that you can win … and you can loose.
By actively applying modeling and simulation to IT decision making The Cloud Computing Wargame helps players and organizations understand:

  • The inter-relationships between cloud computing technology and mission requirements
  • How long-term cloud computing strategy can develop, evolve, and change.
  • The interaction between different activities that occur within an IT organization in order to implement and support IT capabilities in different capabilities matrices.
  • How different strategies maximize mission impact and value
  • How different roles work with business and IT partners throughout the organization and value chain.

You comments and suggestions are welcome. I look forward to seeing you at FOSE for this exciting unveiling.

Follow me at https://Twitter.com/Kevin_Jackson

G C Network