Guest Blog: Sequestration and the Cloud

DISA Chief Technologist States Plan for Cloud

By G C Network | September 23, 2008

In an interview reported on in this month’s Military Information Technology magazine, David Mihelcic, DISA Chief Technology Officer, has laid out his goal for the agency’s cloud computing initiative. As…

Google, GeoEye, Twitter. What a Combination!

By G C Network | September 23, 2008

On September 9th, Bob Lozano posted his kudos to GeoEye for a successful launch of GeoEye-1. (Hey Bob! Where’s that post on your “cloud failure” last week?) According to their…

RightScale goes Transcloud

By G C Network | September 22, 2008

Over the weekend, Maureen O’Gara of SYS-CON media reported that RightScale is now offering a “first in industry” capability to provide application management across multiple cloud infrastructures. It now offers…

A Bill to Outlaw Cloud Computing…..

By G C Network | September 19, 2008

… is what we may see if we don’t educate our lawmakers now! That seemed to be one of the main point at last week’s Google workshop in DC. Berin…

NCOIC and Cloud Computing

By G C Network | September 18, 2008

Yesterday the Network Centric Operations Industry Consortium (NCOIC) had a very good session on cloud computing during their plenary session in Falls Church, VA. Led by NCOIC’s Bob Marcus, speakers…

Military Information Technology Cloud Computing Collaboration

By G C Network | September 17, 2008

Today, we’re happy to announce what we believe to be an industry first. “Military Information Technology Magazine“, as the publication of record for the defense information technology community, is collaborating…

Is 99.999% reliability good enough?

By G C Network | September 16, 2008

According to Reuven Cohen in his recent post, Cloud Failure: The Myth of Nines , the whole concept of reliability may be meaningless. “In the case of a physical failure…

You Probably Use Cloud Computing Already.

By G C Network | September 15, 2008

56% of internet users use webmail services such as Hotmail, Gmail, or Yahoo! Mail. 34% store personal photos online. 29% use online applications such as Google Documents or Adobe Photoshop…

20 Real-Life Challenges of Cloud Computing

By G C Network | September 12, 2008

Nikita Ivanov of GridGain offers some excellent insight into the nuts and bolts of getting the cloud to work. Definitely worth a read. To summarize: Most likely you do NOT…

3Tera Announces Global Cloud Services

By G C Network | September 11, 2008

Last week, 3Tera has announced the availability of global cloud services, based on their AppLogic grid operating system. 3Tera is currently running data centers in seven countries (United States, Japan,…

(This post was provided by Praveen Asthana, Chief Marketing Office of Gravitant, a cloud service brokerage and management company)

Sequestration burst out of obscurity and entered our household vocabulary in 2013.  It got our attention because the impact of it is $1.2 trillion in automatic spending cuts from the Federal budget over the next ten years.  About $85B of these cuts will occur by September of 2013 – and these cuts are being disproportionately applied:  Once you exempt the sacred programs, what’s less sacred (like Federal I.T. spending) is going to get hit hard.  Forrester Research analyst Andrew Bartels expects that the Federal budget cuts will shave at least $12B out of 2013 U.S. tech spending (https://www.computerworld.com/s/article/9237240/The_sequester_will_hurt_tech_nationally).
So what’s to be done? Computerworld points out that “Dale Luddeke, chair of the Industry Advisory Council (IAC), an IT industry group expects to see a shift in government to things with cost savings attributes, such as open source, and agile development and cloud technology.”
Federal agency CIOs are already there:  At this year’s Cloud Computing for DoD and Government Summit held in Washington D.C. on Feb 26, Richard Spires, then CIO of the Dept of Homeland Security, said in a keynote that he was looking to take out $500M of IT spend from his $5B IT budget and was looking to cloud computing as a primary vehicle to accomplish this.
There you have it:  Cloud to the rescue.
This is not surprising, given that public cloud computing has been shown to reduce IT infrastructure spending by 37% (https://arxiv.org/pdf/1002.3492.pdf) or more.  And Cloud spending has the additional benefit of converting the capex model (“pay up-front”) to an opex model (“pay-as-you-go”) which gives much more flexibility.
This is not new news.  Cloud computing’s promise has been well known to the government which has had a ‘Cloud First’ mandate for two years now.  But implementation progress towards this goal has been tepid according to the GAO (https://www.gao.gov/assets/600/592249.pdf), due in part to lack of skills, guidance, tools, security and the need for new processes (such as cloud procurement).
However, there is one stand out government entity that has overcome these barriers and seen great success using cloud computing to reduce costs and improve agility:  this is the Dept of Information Resources of the State of Texas.
Nearly two years ago, the State of Texas implemented the Texas Cloud Self-Service Portal (https://www.dir.texas.gov/SiteCollectionDocuments/Texas.gov/ptco.pdf).
State Agencies who used the portal were able to reduce IT infrastructure costs by up to 30% and, more importantly, were able to significantly reduce deployment times for new IT resources from months to days.  This portal was so successful that it is now being extended to all 200 agencies in the State.
The key technology behind the Texas Cloud Self-service Portal was a Cloud Brokerage and Management platform that allowed for the easy onboarding and management of cloud computing resources.  The platform streamlined the assessment, design, procurement, provisioning, and real-time governance of solutions across hybrid cloud environments.
Sequestration is driving a new sense of urgency towards using cloud computing to save costs.  Fortunately, Government agencies now have a roadmap and a tool set to enable them to easier onboard to and use cloud computing using the State of Texas example.  Seeing this, Agency CIOs have now recognized the power of a Cloud Brokerage platform and it is no wonder that every agency CIO that presented at the DoD and Government Cloud Computing summit this year stood up and said they would be implementing a Cloud Brokerage platform.
This leads us to believe that 2013 will be the year Cloud First gets real.


Praveen Asthana is Chief Marketing Officer of Gravitant, a cloud services brokerage and management company. Prior to joining Gravitant, Praveen was Vice President of Marketing and Strategy for Dell’s $13B Enterprise Solutions Division.


Bookmark and Share

Cloud Musings on Forbes
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2012)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network

5 Comments

  1. james atel on June 1, 2013 at 4:29 pm

    it,s such a nice and awesum blog about cloud computing info for more plz visit us
    it company in Ireland



  2. Westport Fishing Charter on June 6, 2013 at 3:24 pm

    The game is since you aren't in executive power, hurt the economy all you can so that you can use it as a campaign slogan next time (see? his polices failed, even though we disingenuously did everything we could to make the economy fail).



  3. Carla Dillon on June 12, 2013 at 1:11 pm

    These blogs are valuable because these are providing such informative information for all the people. guest blogged



  4. Russel adword on July 16, 2013 at 11:34 am

    Cloud Computing has various flavors, each purposely aimed at aligning with the varying business modules prevalent today. Managed Cloud Hosting is ideal for businesses that give precedence to factors like impregnable security and high availability instead of costs being incurred.

    Cloud Computing



  5. pramodinidr on October 16, 2013 at 6:23 am

    The post is having edible information , Cloud computing is quite easy to setup and maintain the service as it binds a range of technologies that allow the email security and protection from the virus , spam and other threatens .