The Library of National Intelligence (LNI) – A Possible Cloud Application

Cloud Acquisition Strategy, Customized to the Right Cloud Model

By G C Network | March 17, 2015

by Melvin Greer Managing Director, Greer Institute  This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing…

Women leading us to the cloud

By G C Network | March 14, 2015

By Jodi Kohut Government Cloud Computing Professional   By Jodi Kohut Government Cloud Computing Professional March is Women’s History Month. As we celebrate women and their role in our history, our…

CSCC Cloud Privacy Summit – Reston, VA March 26th

By G C Network | March 12, 2015

Please join the Cloud Standards Customer Council in Reston, Virginia on Thursday, March 26th for the Cloud Privacy Summit. This all day symposium will stimulate lively, interactive discussion and deliver…

Bangladesh: A country transforms with IT

By G C Network | March 9, 2015

Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of…

Introducing CloudTek University

By G C Network | March 5, 2015

Visit us at https://www.CloudTekU.com Cloud Computing Basics https://sqz.co/Fs34AaX Cloud Technologies https://sqz.co/s2ACt68 Cloud Security https://sqz.co/Mp7m3TE Business Innovation https://sqz.co/j4NZb37 Cloud Computing Pilots https://sqz.co/e5HFy24 Cloud Operations https://sqz.co/p5CJo24 CloudTek Overview https://sqz.co/k9S4Ewt ( This content…

The Emerging Science of Digital Forensics

By G C Network | February 24, 2015

By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains…

African-Americans and STEM careers: Getting a foot in the door

By G C Network | February 16, 2015

By Sandra K. Johnson Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the…

U.S. Department of Defense sets its cloud security guidelines

By G C Network | February 12, 2015

By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines…

Circles are good for the economy

By G C Network | February 9, 2015

Contrary to what your mother may have told you, going in circles is sometimes a good thing. When it comes to our economy, it is actually a great thing. Throughout…

2015 National Chief Information Security Officer Survey

By G C Network | February 4, 2015

Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information.  The…

In the MAZZ-INT Blog a couple of weeks ago, Joe Mazzafro artile on “Intelliigence and the Concept of Customer” stated that a “realistic business model for the IC to assume is that of the modern IT enabled and accessed publicly funded library — but with its own content provisioning capability”

In his description customers would submit “Requests for Information (RFIs)” that would be either produced or procured by the IC and organized for effective use. He saw this as akin to the the Library of National Intelligence (LNI) concept that is part of the DNI’s Analytic Transformation Initiative.

I saw it as a perfect application for cloud computing.

“Like any IT enabled virtual library, the LNI will allow not just for reuse of intelligence, but for simultaneous use of its products and services. More importantly with existing Business Intelligence (BI) analytics and Customer Relations Management (CRM) software, the LNI can provide the IC’s management with both the quantitative and qualitative metrics for what is being used where why as well as what intelligence needs are going under or unmet. Moreover, BI and CRM capabilities in an LNI context would allow the IC to segment it offerings so the IC can align what it produces with the detail, timeliness, and classification needs of the spectrum of intelligence users from the President, to an ambassador on station, to a military squad on patrol, or a customs agent in the port of Long Beach.”

With appropriate security and access control, this seems to also be a needed function in the net-centric warfare world.

Follow me at https://Twitter.com/Kevin_Jackson

G C Network