Guest Blog: Sequestration and the Cloud

Virtual Machines in Virtual Networks

By G C Network | August 4, 2008

One of the key value propositions in cloud computing is built around increase efficiencies. These eficiencies are diven by the use of virtual machines (VMware, XEN, etc.) and the automated…

SOA-R Interest Grows

By G C Network | August 1, 2008

Interest continue to grow in the use of cloud computing concepts for national security missions. Although some view the idea of a “private cloud” as an oxymoron, I personally see…

Microsoft: “Cloud Computing is the Plan”

By G C Network | July 31, 2008

From the Wireless Business & Technology Cloud Computing News Desk : “Ballmer highlighted software-plus-service, associating it with a ‘platform in the cloud and delivering applications across PCs, phones, TVs, and…

CC Tidbits

By G C Network | July 31, 2008

Interesting tidbits from Maureen O’Gara in Apple, Google, Yahoo & Cloud Computing: Industry gadfly John Dvorak is advancing a theory culled from the blogosphere that Microsoft wants Yahoo for some…

Correlative Analytics: Cloud Computing Google Mindshare

By G C Network | July 30, 2008

Correlative Analytics (A.K.A. “The Google Way of Science“) postulates that extremely large databases of information, starting in the petabyte level, may be sufficient to skip the theory part of the…

What is Cloud Computing? — Another view

By G C Network | July 29, 2008

Irving Wladasky-Berger, chairman emeritus of IBM’s Academy of Technology, recently wrote and article on cloud computing titled “What is Cloud Computing, Anyway?”. The following is my interpretation of a few…

Dark Cloud Computing

By G C Network | July 28, 2008

In his blog article “The Rise of The Dark Cloud” Reuven Cohen wonders about a growing interest in covert computing. Although he briefly mentions malevolent uses of the net, the…

July Military Information Technology magazine

By G C Network | July 25, 2008

This month’s issue of Military Information Technology magazine has the Army’s Chief Information Officer, Lieutenant General Jeffrey A. Sorenson, on the cover. The enclosed special report, titled LANDWARNET Transformation, has…

“The Big Switch” and Intellipedia Highlighted

By G C Network | July 24, 2008

During last week’s SOA-R session, Steven Armentrout referenced “The Big Switch” by Nicholas Carr as a very enlightened view of our changing world. On July 17th, Information Week’s Richard Martin…

Does anybody really know what cloud computing is?

By G C Network | July 23, 2008

Less than 2% of the CIOs in an Infoworld survey said that cloud computing was a priority. The surveyed indicated that server virtualization and server consolidation are their No. 1…

(This post was provided by Praveen Asthana, Chief Marketing Office of Gravitant, a cloud service brokerage and management company)

Sequestration burst out of obscurity and entered our household vocabulary in 2013.  It got our attention because the impact of it is $1.2 trillion in automatic spending cuts from the Federal budget over the next ten years.  About $85B of these cuts will occur by September of 2013 – and these cuts are being disproportionately applied:  Once you exempt the sacred programs, what’s less sacred (like Federal I.T. spending) is going to get hit hard.  Forrester Research analyst Andrew Bartels expects that the Federal budget cuts will shave at least $12B out of 2013 U.S. tech spending (https://www.computerworld.com/s/article/9237240/The_sequester_will_hurt_tech_nationally).
So what’s to be done? Computerworld points out that “Dale Luddeke, chair of the Industry Advisory Council (IAC), an IT industry group expects to see a shift in government to things with cost savings attributes, such as open source, and agile development and cloud technology.”
Federal agency CIOs are already there:  At this year’s Cloud Computing for DoD and Government Summit held in Washington D.C. on Feb 26, Richard Spires, then CIO of the Dept of Homeland Security, said in a keynote that he was looking to take out $500M of IT spend from his $5B IT budget and was looking to cloud computing as a primary vehicle to accomplish this.
There you have it:  Cloud to the rescue.
This is not surprising, given that public cloud computing has been shown to reduce IT infrastructure spending by 37% (https://arxiv.org/pdf/1002.3492.pdf) or more.  And Cloud spending has the additional benefit of converting the capex model (“pay up-front”) to an opex model (“pay-as-you-go”) which gives much more flexibility.
This is not new news.  Cloud computing’s promise has been well known to the government which has had a ‘Cloud First’ mandate for two years now.  But implementation progress towards this goal has been tepid according to the GAO (https://www.gao.gov/assets/600/592249.pdf), due in part to lack of skills, guidance, tools, security and the need for new processes (such as cloud procurement).
However, there is one stand out government entity that has overcome these barriers and seen great success using cloud computing to reduce costs and improve agility:  this is the Dept of Information Resources of the State of Texas.
Nearly two years ago, the State of Texas implemented the Texas Cloud Self-Service Portal (https://www.dir.texas.gov/SiteCollectionDocuments/Texas.gov/ptco.pdf).
State Agencies who used the portal were able to reduce IT infrastructure costs by up to 30% and, more importantly, were able to significantly reduce deployment times for new IT resources from months to days.  This portal was so successful that it is now being extended to all 200 agencies in the State.
The key technology behind the Texas Cloud Self-service Portal was a Cloud Brokerage and Management platform that allowed for the easy onboarding and management of cloud computing resources.  The platform streamlined the assessment, design, procurement, provisioning, and real-time governance of solutions across hybrid cloud environments.
Sequestration is driving a new sense of urgency towards using cloud computing to save costs.  Fortunately, Government agencies now have a roadmap and a tool set to enable them to easier onboard to and use cloud computing using the State of Texas example.  Seeing this, Agency CIOs have now recognized the power of a Cloud Brokerage platform and it is no wonder that every agency CIO that presented at the DoD and Government Cloud Computing summit this year stood up and said they would be implementing a Cloud Brokerage platform.
This leads us to believe that 2013 will be the year Cloud First gets real.


Praveen Asthana is Chief Marketing Officer of Gravitant, a cloud services brokerage and management company. Prior to joining Gravitant, Praveen was Vice President of Marketing and Strategy for Dell’s $13B Enterprise Solutions Division.


Bookmark and Share

Cloud Musings on Forbes
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2012)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network

5 Comments

  1. james atel on June 1, 2013 at 4:29 pm

    it,s such a nice and awesum blog about cloud computing info for more plz visit us
    it company in Ireland



  2. Westport Fishing Charter on June 6, 2013 at 3:24 pm

    The game is since you aren't in executive power, hurt the economy all you can so that you can use it as a campaign slogan next time (see? his polices failed, even though we disingenuously did everything we could to make the economy fail).



  3. Carla Dillon on June 12, 2013 at 1:11 pm

    These blogs are valuable because these are providing such informative information for all the people. guest blogged



  4. Russel adword on July 16, 2013 at 11:34 am

    Cloud Computing has various flavors, each purposely aimed at aligning with the varying business modules prevalent today. Managed Cloud Hosting is ideal for businesses that give precedence to factors like impregnable security and high availability instead of costs being incurred.

    Cloud Computing



  5. pramodinidr on October 16, 2013 at 6:23 am

    The post is having edible information , Cloud computing is quite easy to setup and maintain the service as it binds a range of technologies that allow the email security and protection from the virus , spam and other threatens .