July Military Information Technology magazine

The Endpoint Imperative: In a Software World, Hardware Does Matter

By G C Network | January 9, 2018

Hardware matters. From productivity to security to innovation, make sure your machines can keep up. Intel’s Sarah Wieskus joins The End Point Imperative: A Podcast series from Intel to discuss…

IT Transformation with Watson

By G C Network | January 5, 2018

Credit: Shutterstock by Kevin Jackson & Dez Blanchfield   IBM recently launched an exciting new project in the form of a podcast series produced and hosted Dez Blanchfield, appropriately titled the…

The Endpoint Imperative: A Form Factor Renaissance

By G C Network | December 22, 2017

Workplace expectations are changing, and along with them, the devices we use to do our jobs. In this episode of “The End Point Imperative”, Intel’s Sarah Wieskus tells us about…

Cloud Storage 2.0 Set To Dominate Market

By G C Network | December 19, 2017

The enterprise data storage marketplace is poised to become a battlefield. No longer the quiet backwater of cloud computing services, the focus of this global transition is now going from…

Top “Cloud Musings” Posts For 2017

By G C Network | December 17, 2017

    ( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud…

The Endpoint Imperative: ID’ing and Overcoming the Stumbling Blocks to Digital Transformation

By G C Network | December 6, 2017

Digital Transformation is the No 1 priority for organizations large and small. It’s imperative that IT remove any obstacles to digital transformation success – including outdated PCs and mobile devices.…

Industry Verticals Tackle Unstructured Data

By G C Network | December 1, 2017

  Organizations around the world are struggling to cope with the current data explosion. A vital characteristic of this data is that it is unstructured and represents things like email,…

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

By G C Network | November 27, 2017

Cloud, mobility and the Internet of Things have obliterated the traditional perimeter that protected organizations. The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management.…

The Data Storage Explosion

By G C Network | November 25, 2017

Cloud computing innovation will power enterprise transformation in 2018.  Cloud growth is also driving a rapid rise in the storage market, exacerbating the enterprise challenge around storage cost and complexity.…

Digital Transformation Drives Mainframe’s Future

By G C Network | November 15, 2017

  Digital Transformation is amplifying mainframe as mission critical to business growth more than ever before. With 70% of the world’s corporate data and over half of the world’s enterprise…

This month’s issue of Military Information Technology magazine has the Army’s Chief Information Officer, Lieutenant General Jeffrey A. Sorenson, on the cover. The enclosed special report, titled LANDWARNET Transformation, has a major article on net-centric operations by Bill Gerety, Dataline CEO and Major General US Army Reserve (and co-authored by yours truly). “Net-centricity: Adjusting the Focus” (MS Word version) discusses requirements for a successfully force transition to net-centricity and how cloud computing concepts can be used to support the effort. In view of DISA’s foray into cloud computing, it makes interesting reading.

To quote from the article:

“In meeting these significant challenges, DISA has actively leveraged the fact that these requirements have parallels in the general information technology industry. This fact has led to the rapid adoption and implementation of many commercial solutions. Service oriented architecture (SOA), hardware virtualization, and grid computing are just a few of these. The latest of these adoptions seems to be Cloud Computing.

First coined by Sun Microsystems’s John Gage over twenty years ago Cloud Computing is now taken hold as the “next step in the Internet’s evolution. [1] This concept, however, is more than just the provisioning of computing resources (i.e. hardware, software, storage, services, etc.). The basic provisioning of infrastructure is the typical description of grid computing. Cloud computing is more in that it relates to the underlying architecture in which the application services are designed. The application not only runs in the cloud, but the cloud allows for the development, deployment, capacity growth, performance and reliability of the application as well.

When fully employed, cloud computing infrastructures, the middleware and the application platforms, should have the following characteristics:

  • Self-healing: In case of failure, there will be a hot backup instance of the application ready to take over without disruption (known as failover). It also means that if a failure causes the backup to become primary, the system will automatically launch a new backup to maintain required reliability policies.
  • SLA-driven: The system is dynamically managed by service-level agreements so that if the system is experiencing peaks in load, it will create additional instances of the application on more servers in order to comply with the committed service levels — even at the expense of a low-priority application.
  • Multi-tenancy: The system is built to allow the sharing of infrastructure, without the customers being aware of it and without compromising the privacy and security of each customer’s data.
  • Service-oriented: The system allows for the composing of applications out of discrete services that are loosely coupled and independent of each other (mash-ups). It also provides for reuse of services and prevents the changes or failure of one service to disrupt others.
  • Virtualized: Applications are decoupled from the underlying hardware. Multiple applications can run on one computer (i.e. VMware) or multiple computers can be used to run one application (grid computing).
  • Linearly Scalable: The system will be predictable and efficient in growing the application.
  • Data Management: The distribution, partitioning, security and synchronization of the system’s underlying data is actively managed”
Follow me at https://Twitter.com/Kevin_Jackson

G C Network

2 Comments

  1. Anonymous on July 25, 2008 at 6:58 pm

    Kevin:
    I was involved in a project proving the concept of cloud computing solutions for Battle field logistics applications. This removed the Hardened trucks with databases on the battlefield and moved them back to the homeland where they could not be captured or destroyed…. It was 7 years ago… I am sure they have made much progress beyond that now.



  2. Kevin Jackson on August 9, 2008 at 11:21 pm

    It would be good to learn from those earlier cloud computing efforts. I’m not personally familiar with the battlefield logistics work, but since the community is now taking a second look at these concepts, I’m sure it would welcome any available information. I would be happy to follow-up on this with you. It could, in fact, help the NCOIC in it’s current cloud computing education efforts.