Twitter Feed
Lynn DeCourcey Showcased in ExecutiveBiz
Kudos to my colleague Lynn DeCourcey for her recent interview on ExecutiveBiz.com! Lynn is NJVC vice president and general manager, cyber security. She oversees all aspects of the company’s cyber…
BISNOW Data Center Event Highlight’s Cloud
A big thank you to BISNOW and my fellow panel members for an outstanding discussion and very informative event, last week’s Data Center Investment Conference and Expo. The federal marketplace…
GSA Seeks Cloud Brokerage Information
GSA is using the RFI process to collect information about alternative models and/or solutions for future cloud acquisition vehicles and processes that further these goals. One emerging concept in cloud…
DoD Cloud Computing Strategy
The DoD recently released the department’s formal cloud computing strategy. DoD Cloud Computing Strategy View more documents from Kevin Jackson. In the forward, DoD CIO Teresa Takai said that: “The…
FedRAMP PMO Releases First Set of 3PAOs
Late today the FedRAMP Program Management Office released the first list of certified Third Party Assessment Organizations (3PAOs). These companies are accredited to perform initial and periodic assessment of cloud…
FedRAMP Releases Updated Security Assessment Plan Templates
Last week the GSA FedRAMP Program Office released the latest version of the cloud computing Security Assessment Plan (SAR) template. This document is the most recent step toward the Federal…
NJVC® and Gravitant® Announce New Strategic Alliance: Partnership to Benefit Federal Agencies with Powerful Provision and Management of Cloud Services that Unify Multiple Providers
Vienna, Va., April 4, 2012 — NJVC®, one of the largest information technology solutions providers supporting the U.S. Department of Defense, and Gravitant®, a provider of cloud brokerage and management…
NJVC® VP and GM, Cloud Services, Kevin L. Jackson to Speak on Cloud Security at 2012 Emerging Threats and Cyber Defense Symposium
Vienna, Va., March 15, 2012 — NJVC®, one of the largest information technology solutions (IT) providers supporting the U.S. Department of Defense, is pleased to announce that Kevin L. Jackson,…
NJVC’s Kevin L. Jackson Co-Authors INSA White Paper on Cloud Computing for the Intelligence Community
Findings Reflect Insight from More than 50 Cloud Thought Leaders VIENNA, Va.–(BUSINESS WIRE)–NJVC®, one of the largest information technology solutions (IT) providers supporting the U.S. Department of Defense, announces…
INSA Study on Cloud Computing in the Intelligence Community: Rollout 13 March 2012 | SYS-CON MEDIA
(Originally posted by Bob Gourley at CTOvision) Over the last year I’ve had the pleasure of serving with a team of volunteers from the Intelligence and National Security Alliance…
This month’s issue of Military Information Technology magazine has the Army’s Chief Information Officer, Lieutenant General Jeffrey A. Sorenson, on the cover. The enclosed special report, titled LANDWARNET Transformation, has a major article on net-centric operations by Bill Gerety, Dataline CEO and Major General US Army Reserve (and co-authored by yours truly). “Net-centricity: Adjusting the Focus” (MS Word version) discusses requirements for a successfully force transition to net-centricity and how cloud computing concepts can be used to support the effort. In view of DISA’s foray into cloud computing, it makes interesting reading.
To quote from the article:
“In meeting these significant challenges, DISA has actively leveraged the fact that these requirements have parallels in the general information technology industry. This fact has led to the rapid adoption and implementation of many commercial solutions. Service oriented architecture (SOA), hardware virtualization, and grid computing are just a few of these. The latest of these adoptions seems to be Cloud Computing.
First coined by Sun Microsystems’s John Gage over twenty years ago Cloud Computing is now taken hold as the “next step in the Internet’s evolution. [1] This concept, however, is more than just the provisioning of computing resources (i.e. hardware, software, storage, services, etc.). The basic provisioning of infrastructure is the typical description of grid computing. Cloud computing is more in that it relates to the underlying architecture in which the application services are designed. The application not only runs in the cloud, but the cloud allows for the development, deployment, capacity growth, performance and reliability of the application as well.
When fully employed, cloud computing infrastructures, the middleware and the application platforms, should have the following characteristics:
- Self-healing: In case of failure, there will be a hot backup instance of the application ready to take over without disruption (known as failover). It also means that if a failure causes the backup to become primary, the system will automatically launch a new backup to maintain required reliability policies.
- SLA-driven: The system is dynamically managed by service-level agreements so that if the system is experiencing peaks in load, it will create additional instances of the application on more servers in order to comply with the committed service levels — even at the expense of a low-priority application.
- Multi-tenancy: The system is built to allow the sharing of infrastructure, without the customers being aware of it and without compromising the privacy and security of each customer’s data.
- Service-oriented: The system allows for the composing of applications out of discrete services that are loosely coupled and independent of each other (mash-ups). It also provides for reuse of services and prevents the changes or failure of one service to disrupt others.
- Virtualized: Applications are decoupled from the underlying hardware. Multiple applications can run on one computer (i.e. VMware) or multiple computers can be used to run one application (grid computing).
- Linearly Scalable: The system will be predictable and efficient in growing the application.
- Data Management: The distribution, partitioning, security and synchronization of the system’s underlying data is actively managed”
2 Comments
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes
Kevin:
I was involved in a project proving the concept of cloud computing solutions for Battle field logistics applications. This removed the Hardened trucks with databases on the battlefield and moved them back to the homeland where they could not be captured or destroyed…. It was 7 years ago… I am sure they have made much progress beyond that now.
It would be good to learn from those earlier cloud computing efforts. I’m not personally familiar with the battlefield logistics work, but since the community is now taking a second look at these concepts, I’m sure it would welcome any available information. I would be happy to follow-up on this with you. It could, in fact, help the NCOIC in it’s current cloud computing education efforts.