Twitter Feed
The Endpoint Imperative: Global Security Compliance. Are you ready?
China has its Cybersecurity Law. Next May, the General Data Protection Regulation – or GDPR –goes into effect for the European Union. Research shows most organizations just aren’t…
The Endpoint Imperative: IT Spending: Setting Priorities in a Volatile World
Fast-evolving trends are changing the way IT thinks about security. To stay secure and productive, IT operations must excel at the fundamentals: PC refreshes for security, and optimizing end-user…
Top 1000 Tech Bloggers
The Rise “Top 1000 Tech Bloggers” leaderboard recognizes the most inspiring Tech journalists and bloggers active on social media. They use Klout scores (50%) and the blogger’s twitter conversations on…
IBM – The Power of Cloud Brokerage
Hybrid cloud adoption is now mainstream and you are making decisions every day about how to transform application and infrastructure architectures, service delivery, DevOps, production operations and governance. With Cloud…
More SMB Love Needed
In a recent post, titled “10 Surprising Facts About Cloud Computing and What It Really Is”, Zac Johnson highlighted some interesting facts about cloud computing in the SMB…
ATMs Are IT Too!
That world of homogenous IT technology managed entirely by the internal IT organization has long disappeared. Operations today require efficient and global management of technologically heterogeneous environments. The challenges and…
Digital Transformation Asset Management
Today’s businesses run in the virtual world. From virtual machines to chatbots to Bitcoin, physical has become last century’s modus operandi. Dealing with this type of change in business even…
The Game of Clouds 2017
The AWS Marketplace is growing at breakneck speed, with 40% more listings than last year! This and more insights were revealed when CloudEndure used their custom tool to quickly scan the…
Managing Your Hybrid Cloud
Photo credit: Shutterstock Runaway cloud computing cost may be causing an information technology industry crisis. Expanding requirements, extended transition schedules and misleading marketplace hype have made “Transformation” a dirty word. …
American Airlines Adopts Public Cloud Computing
Did you know that the reservations systems of the biggest carriers mostly run on a specialized IBM operating system known as Transaction Processing Facility (TPF). Designed by IBM in the…
Over the last couple of weeks, I’ve had the distinct pleasure to listen to both Mr. Robert Carey, CIO, Department of the Navy, and General George W. Casey, Jr., Chief of Staff US Army. Some of my observations are summarized below:
Mr. Robert Carey
- IT connectivity brings stability to the world. The world’s hotspots coincide with places that lack IT connectivity
- The US is currently in a cyberwar. Cybersecurity is our #1 issue.
- DON CIO major focus areas include encryption of data at rest, increased information security and increased information reliability
- The Navy’s next generation network will be responsive to the operational commander, unleash the collaborative nature of the Millennium Generation and empower our future warriors.
- The Navy’s next generation network will build on the lessons learned in developing the world’s largest intranet, allowing the control and cost visibility necessary to migrate off expensive vulnerable legacy networks.
- Industry needs to provide Net-Centric Licensing
- Information sharing initiatives require we move in a direction that allows us to share National Security information with whomever requires access
- “I’m passionate about Web 2.0 technologies!”
General George W. Casey
- The US Army is transforming to be able to conduct offensive, defensive and stability operation simultaneously within a sustained conflict environment
- Advances in technology exacerbate the problem
- The force will operate abroad
- Our force will need to work with indigenous forces
- Military power will need to work closely with all other elements of national power
- A 21st Century transformed force and its people must be versatile
- A 21st Century transformed force must be intellectually and institutionally agile
- The network is central to building the 21st Century force
- Soldiers will have handheld devices from which they will be able to access the Army’s information
- The network must be protected
- A network that collaborates is critical to institutional agility
- The Army must have the ability to generate world class information technology capabilities in a garrisoned environment and an enhanced ability for people to collaborate
- Common IT standards must be accepted
1 Comments
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes
I agree with both Mr. Robert Carey and General George W. Casey.