December 2011: GovCloud Moves From Policy to Law

An image of a light shining through a tunnel.

Transformation Network

By pwsadmin | May 15, 2021

The Achilles heel of every transformative business model is their reliance on ever increasing amounts of data that need to be transported quickly across wide area networks and processed at…

A person holding up three frames in front of their face.

Essential Characteristics of Cloud Computing as Digital Transformation

By pwsadmin | May 15, 2021

Hybrid IT blends traditional datacenters, managed service providers, and cloud service providers to deliver the necessary mix of information technology services. This IT consumption model enables a composable infrastructure which…

A mosaic of hands and flowers on the wall.

Transformation Innovation

By pwsadmin | May 15, 2021

4 Factors Driving Digital Transformation ROI The critical assessment factors for cloud ROI risk probability are the following:      Infrastructure utilization Speed of migration to cloud Ability to scale business/mission processes…

A neon sign with a handshake on it.

Transformation Frameworks

By pwsadmin | May 15, 2021

Digital transformation necessitates changes in an organization’s operational processes. According to Harvard, a focus on operations can lead to business process optimization and entirely new revenue streams. Three common routes…

A group of people standing in a room with wires hanging from the ceiling.

Transformation Infrastructure

By pwsadmin | September 26, 2020

Hybrid IT enables a composable infrastructure which describes a framework whose physical compute, storage, and network fabric resources are treated as services. Resources are logically pooled so that administrators need…

A close up of the pattern on a solar panel.

Essential Characteristics of Cloud Computing as Digital Transformation

By pwsadmin | September 25, 2020

A survey of 2,000 executives conducted by Cognizant in 2016 identified the top five ways digital transformations generate value:      Accelerating speed to market      Strengthening competitive positioning      Boosting revenue growth      Raising…

A close up of the trees in the sky

Embrace Transformation

By pwsadmin | September 22, 2020

From a business perspective, differentiating business processes and quality customer service are central to overall success. Business leaders must therefore clearly identify and measure how information technology contributes to the…

An image of a person's eye in a computer screen.

Computer Vision Advances Zero-Defect Manufacturing

By pwsadmin | July 25, 2020

by Kevin L. Jackson Electronics manufacturers operate in a challenging environment. It’s hard enough to keep up with the ever-accelerating rate of change in the industry. Now customers want increasingly…

A blue bus driving down the street with people crossing it.

Real-Time Analytics Power the Roadway of the Future

By pwsadmin | July 25, 2020

By Kevin L. Jackson The complexities of citywide traffic are pushing the limits of existing transportation management systems. Outdated infrastructure is based on proprietary, single-purpose subsystems, making it costly to…

A businessman standing on top of a cliff with his arms raised.

Thriving on the Edge: Developing CSP Edge Computing Strategy

By pwsadmin | March 6, 2020

Communications Service Providers (CSPs) are facing significant business model challenges. Referred to generally as edge computing, the possibilities introduced by the blending of 5G networks and distributed cloud computing technologies are…

Over the past years, government cloud computing has steadily moved forward from it’s early beginnings as an interesting curiosity:

Since Sunday’s broadcast, I’ve been asked numerous times about my real answer to the question “Will ‘Cloud Computing’ Work In White House“. Although I would never assume to be in a position to advise the President-elect, I’m more than happy, however, to add my voice to the Center for Strategic and International Studies (CSIS) and the distinguished list of contributors that recently released the CSIS Commission on Cybersecurity for the 44th Presidency.

I truly believe that cloud computing technology can be used to implement some of their recommendations. One in particular is their recommendation for a National Office for Cyberspace (NOC) and a new National Security Council Cybersecurity Directorate (NSCCD). Along with the relevant agencies, these organizations would:

“Assume expanded authorities, including revised Federal Information Security management Act (FISMA) authorities, oversight of the Trusted Internet Connections (TIC) initiative, responsibility for the Federal Desktop Core Configuration (FDCC) and acquisition reform, and the ability to require agencies to submit budget proposals relating to cyberspace to receive its approval prior to submission to OMB.”

2009 was truly a watershed year for Federal information technology professionals. After inaugurating the first Cyber-President we saw the appointment of our first Federal CIO and the rapid adoption of cloud computing as the way forward for improved efficiencies at reduced cost. The theme continued throughout the year with the Federal Cloud Computing Initiative, the Open Government Directive and finally, as if to put an exclamation point on the rising importance of IT to national security the appointment of the nation’s first Cybersecurity Coordinator.

Government cloud computing is a reality and as Peter Mell of NIST succinctly put it, “2010 will be the year of the cloud computing pilot.” I look forward to continuing this exciting conversation with you all!

2011 will be the breakout year for GovCloud! Pressure to reduce budget, pressure to manage I resources better and the political pressure of the next presidential election will combine to accelerate adoption. The GSA IaaS groundwork has been laid and new policies are just about ready to be released !!

December 2011: And what did Santa bring this year!!

Each Executive department or agency shall:

i. Use FedRAMP when conducting risk assessments, security authorizations, and granting ATOs for all Executive department or agency use of cloud services;

ii. Use the FedRAMP PMO process and the JAB-approved FedRAMP security authorization requirements as a baseline when initiating, reviewing, granting and revoking security authorizations for cloud services;

iii. Ensure applicable contracts appropriately require CSPs to comply with FedRAMP
security authorization requirements;

“PERFORMANCE PLAN FOR REDUCTION OF RESOURCES
REQUIRED FOR DATA SERVERS AND CENTERS.— …

(2) DEFENSE-WIDE PLAN.—

(A) IN GENERAL.—Not later than April 1, 2012, the Chief Information Officer of the Department shall submit to the congressional defense committees a performance plan for a reduction in the resources required for data centers and information systems technologies Department-wide. The plan shall be based upon and incorporate appropriate elements of the plans submitted under paragraph (1).

(B) ELEMENTS.—The performance plan required under this paragraph shall include the following:

(ii) A Department-wide strategy for each of the following: ….

(II) Transitioning to cloud computing.

(III) Migration of Defense data and government-provided services from Department-owned and operated data centers to cloud computing services generally available within the private sector that provide a better capability at a lower cost with the same or greater degree of security.

(IV) Utilization of private sector-managed security services for data centers and cloud computing services.”

Yes, Virginia, there is a GovCloud!!

Happy Holidays to All !!!

Bookmark and Share

Cloud Musings on Forbes
( Thank you. If you enjoyed this article, get free updates by email or RSS – KLJ )

Follow me at https://Twitter.com/Kevin_Jackson

G C Network