Cloud Computing Wargames !!

Mobile device security: A new frontier for hackers

By G C Network | February 1, 2015

Recent security breaches have heightened our awareness of cybersecurity issues. The hack and other security breaches have resulted in unprecedented damages. However, the majority of mobile device users have yet to be sensitized…

Learn How To Buy Cloud From GovLoop & ViON

By G C Network | January 28, 2015

“Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since…

A VETS 360 BENEFIT – LATINO FILM INDUSTRY POST OSCAR PARTY

By G C Network | January 21, 2015

   GUESS WHO SUPPORTS VETS 360? You can support them too at the: THE OFFICIAL LATINO FILM INDUSTRY POST OSCAR PARTY The Veterans 360 mission is to support our young combat…

South Asia’s Biggest Tech Event – “Digital World 2015”

By G C Network | January 19, 2015

 I am proud and honored to announce that I have been added as a speaker at SouthAsia’s biggest tech event “Digital World 2015” , 9th – 12th February, 2015 at…

Fear Hackers? First invest in an IT security culture change

By G C Network | January 14, 2015

by Kevin L.Jackson  With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew…

CloudCamp Bangladesh In Dhaka! – February 11, 2015

By G C Network | January 13, 2015

Did you know that….. Goldman Sachs recognized Bangladesh as one of the Next Eleven (N-11) – a list of eleven countries having strong potential for becoming the world’s largest economies…

Agile is not the absence of ITIL!

By G C Network | January 12, 2015

 by Jodi Kohut ITIL (formerlyknown as the Information Technology Infrastructure Library) has been the best management practices framework of choice for world class IT Operations organizations.  The 5 stage framework:…

Cloud Security: Understanding the Cloud Computing Threat Landscape

By G C Network | January 10, 2015

In the last two years, IT security breaches have hit the White House, the State Department, the top federal intelligence agency, the largest American bank, the top hospital operator, energy…

Federal Cloud Computing Summit on January 14-15, Washington, DC

By G C Network | January 9, 2015

The Federal Cloud Computing Summit will be held on January 14-15, 2015 at the Marriott Metro Center in Washington, D.C. (Complimentary government and academic registration) This educational symposium will feature cloud computing…

CONGRATULATIONS! Inaugural Cloud Computing Class at Mira Costa College Graduates!!

By G C Network | January 8, 2015

Anthony Dorrah, Jose Chapman, Mike Chatelain,  Lisa Heiden, Ginelle Johnson, Robert Minson, Alfredo Morales  We are so proud of the success of out first cloud computing training class.  This group…

Wikipedia


 “A wargame is a game that represents a military operation.”
 “Military simulations, also known informally as war games, are simulations in which theories of warfare can be tested and refined without the need for actual hostilities”
———————————————————————————————
For ages, simulations and wargames have been used by the military to prepare for eventual future operations. During the Cold War, countless battles between the red and blue forces were set-up, run and reset in preparation for the conflict that thankfully never came. Some contend that these wargames, in fact, were instrumental in preventing a global nuclear holocaust.

As an outgrowth of this apparent success, business war games also came in vogue as a tool to help managers develop and execute business strategies more successfully. In 2005 there was actually an all-day “Battle for Clicks” war game between students from MIT Sloan School of Management and Harvard Business School. This game, run by Fuld & Co., a Cambridge-based strategic intelligence consulting firm, was the first such competition involving students from these two world-class business schools.
In a unique take on this concept, in 2006, Booz Allen Hamilton took business wargaming one step further. As reported by Government Computing News, the CIO Wargame, a BAH creation, combines the basics of craps and Monopoly to simulate how CIOs, chief architects and other program managers make decisions. The game’s stated goal is to bring projects into the operation and maintenance phase and earn as many mission value points as possible, while taking steps to reduce the risk of failures and setbacks. The team with the most points after five rounds won. Like in Monopoly, players had to make strategic investment decisions on which projects and IT capabilities to bet on; like in craps, the roll of the dice often determined how well a project paid off.

I’m happy to report that the CIO Wargame is now being updated! The new Cloud Computing Wargame (CCW) represents a major evolution of the original concept and will be unveiled at FOSE 2009. I am looking forward to working with the BAH Cloud Computing Team on this exciting project.
More than a game, CCW applies simulation techniques to model “Traditional IT” and “Cloud Computing” environments and dynamically maps them against internal, community, and Cloud-based resources. The simulation represent real-life situations facing IT management daily, especially in an environment of rapid technological and mission change against a backdrop of resource variability. The CCW is designed for both mission “owners” and senior IT staff who are engaged in the strategic planning and use of information technologies to meeting organization mission and basic business requirements. The game puts the “players” in real-life situations that you can win … and you can loose.
By actively applying modeling and simulation to IT decision making The Cloud Computing Wargame helps players and organizations understand:

  • The inter-relationships between cloud computing technology and mission requirements
  • How long-term cloud computing strategy can develop, evolve, and change.
  • The interaction between different activities that occur within an IT organization in order to implement and support IT capabilities in different capabilities matrices.
  • How different strategies maximize mission impact and value
  • How different roles work with business and IT partners throughout the organization and value chain.

You comments and suggestions are welcome. I look forward to seeing you at FOSE for this exciting unveiling.

Follow me at https://Twitter.com/Kevin_Jackson

G C Network