Secure Cloud Computing on Federal News Radio

Microsoft vs Google in Cloud Computing

By G C Network | May 22, 2008

Many took note of the Randall Stross essay in the New York Times last weekend. In it he succintly described why Microsoft is failing in it’s attempt to bridge the…

IBM at Forrester IT Forum

By G C Network | May 22, 2008

At the Forrester IT Forum yesterday in Las Vegas, Rick Lechner, VP Enterprise Systems at IBM, made the following comments The changing face of globalization (transformation from exporting to multi-nationals…

HP & EDS

By G C Network | May 21, 2008

In an interesting take on his Enterprise Architecture blog, Chris Pearson sees the HP acquisition of EDS as a ploy by HP to remain relevant in a cloud computing world.…

The Library of National Intelligence (LNI) – A Possible Cloud Application

By G C Network | May 20, 2008

In the MAZZ-INT Blog a couple of weeks ago, Joe Mazzafro artile on “Intelliigence and the Concept of Customer” stated that a “realistic business model for the IC to assume…

Net-Centric Enterprise Services – An Update

By G C Network | May 19, 2008

Net-Centric Enterprise Services (NCES) is about to enter the initial operational test and evaluation phase. NCES are a set of capabilities that support network-centric warfare operations and information sharing. It…

Microsoft Renews Yahoo Bid

By G C Network | May 19, 2008

Microsoft renews Yahoo bid and is now offering to buy a piece of Yahoo. I believe this is just the opening of the second round. Follow me at https://Twitter.com/Kevin_Jackson

Cloud Computing Risk

By G C Network | May 18, 2008

CIO.com reviewed the top three concerns that the IT executives have regarding the adoption of cloud computing – security, latency, and SLA. These concerns seem similar to those previously assigned…

Grid vs. Cloud – May 17, 2008

By G C Network | May 18, 2008

From Geva Perry’s April 25th blog Cloud Computing overtaking the term Grid Computing With the term “cloud computing” rapidly being hyped everywhere, I did this little exercise on Google Trends…

Blogsphere Clouds – May 16, 2008

By G C Network | May 18, 2008

The cloud is billowing in the blogsphere !! Virtual Computing in the Cloud — How a Universal Dialtone Will …Virtual Cloud Computing represents the next wave of virtualization and offers…

Gartner on Cloud Computing / Yahoo vs. Icahn- May 15, 2008

By G C Network | May 18, 2008

Gartner thinks that cloud computing may be the next big thing: By 2012, 80 percent of Fortune 1000 enterprises will pay for some cloud computing service and 30 percent of…

Last week the Trezza Media Group, Flyzik Group and Federal News Radio combined to produce an outstanding Federal Executive Forum on Secure Cloud Computing. Moderated by Jim Flyzik, panelist included:
  • Henry Sienkiewcz-Technical Program Director, Computer Services, Defense Information Systems Agency 
  • Mr. Ronald Bechtold-Army Architecture Integration Center, at Headquarters, Department of the Army, Chief Information Office/G6 
  • Curt Aubley-Technology Officer CTO Operations & Next Generation Solutions, Lockheed Martin Information Systems & Global Services
  • Dale Wickizer-Chief Technology Officer-Public Sector, NetApp, Inc.
  • Aileen Black- Vice President of Public Sector, VMware Inc.
Key points I gleaned from the discussion include:
  • Cloud Computing has provided an inflection point in government information technology that is changing the paradigm for delivering services
  • The biggest challenge to adopting cloud computing is in re-educating the workplace. 
  • The reduction is cost and increase in efficiency have proven to be key to the success of cloud computing
  • DISA has shown that a STIG’ed or Non-STIG’ed, Windows or LAMPs, test and evaluation  environment can be provisioned in the DoD in 24 hours. Unfortunately, 23 of those hours involves moving the money.
  • A new DISA project, DISA Extended Edge Presence (DEEP), has been launched in order to quickly deliver applications and content to “dis-enfranchised” DoD users
  • Cloud computing allows for end-to-end infrastructure visibility, providing an ability to fight through a cyber attack.
  • DISA is developing a host-tenant model for applications and application certifications.  Using this model, tenant application in “DISA decks” will inherit the infrastructure certification. Using this model, the application developer will only be responsible for accrediting the application stack.

Video and audio of the entire discussion is available online at:

Follow me on https://Twitter.com/Kevin_Jackson
Follow me at https://Twitter.com/Kevin_Jackson

G C Network