Why the Cloud? Processing, Exploitation and Dissemination

From PC Break/Fix to CloudMASTER®

By G C Network | August 29, 2016

https://www.linkedin.com/in/stevendonovan It was late 2011 and Steven Donovan was comfortable working at SHI International Corporation, a growing information technology firm, as a personal computer break/fix technician. His company had been…

Is Data Classification a Bridge Too Far?

By G C Network | August 17, 2016

Today data has replaced money as the global currency for trade. “McKinsey estimates that about 75 percent of the value added by data flows on the Internet accrues to “traditional”…

Vendor Neutral Training: Proven Protection Against Cloud Horror Stories

By G C Network | August 10, 2016

Cloud computing is now entering adolescence.  With all the early adopters now swimming in the cloud pool with that “I told you so” smug, fast followers are just barely beating…

Cognitive Business: When Cloud and Cognitive Computing Merge

By G C Network | July 21, 2016

Cloud computing has taken over the business world! With almost maniacal focus, single proprietors and Board Directors of the world’s largest conglomerates see this new model as a “must do”.…

Government Cloud Achilles Heel: The Network

By G C Network | July 9, 2016

Cloud computing is rewriting the books on information technology (IT) but inter-cloud networking remains a key operational issue. Layering inherently global cloud services on top of a globally fractured networking…

System Integration Morphs To Cloud Service Integration

By G C Network | June 19, 2016

Cloud Service Brokerage is changing from an industry footnote toward becoming a major system integration play.  This role has now become a crucial component of a cloud computing transition because…

Networking the Cloud for IoT – Pt 3 Cloud Network Systems Engineering

By G C Network | June 17, 2016

Dwight Bues & Kevin Jackson (This is Part 3 of a three part series that addresses the need for a systems engineering approach to IoT and cloud network design.  Networking the Cloud for IoT –…

Networking the Cloud for IoT – Pt. 2 Stressing the Cloud

By G C Network | June 12, 2016

Dwight Bues & Kevin Jackson This is Part 2 of a three part series that addresses the need for a systems engineering approach to IoT and cloud network design. Part…

Networking the Cloud for IoT – Pt. 1: IoT and the Government

By G C Network | June 7, 2016

  Dwight Bues & Kevin Jackson This is Part 1 of a three part series that addresses the need for a systems engineering approach to IoT and cloud network design:…

Parallel Processing and Unstructured Data Transforms Storage

By G C Network | May 31, 2016

(This post originally appeared on Direct2Dell, The Official Dell Corporate Blog) Enterprise storage is trending away from traditional, enterprise managed network-attached storage (NAS) and storage area networks (SAN) towards a…

So why is the intelligence community so interested in cloud computing? Three letters: PED (Processing, Exploitation, Dissemination). Take these two real life examples from the publishing industry.

Jim Staten of Forrester Research provided an example of how the New York Times leverage the cloud. The Times wanted to makes its historic archives available for online access. They needed to process 11 million articles and turn them into .pdf files. Initial estimates outlined that hundreds of servers and about 4 Tb of storage would be necessary. The IT organization at the Times estimated a months-long delay before beginning, the need for a significant budget and highlighted the difficulty of locating the computing resources. The project manager give Amazon Web Services a try and kicked off 100 EC2 instances and 4 terabytes of S3 storage. The job was finished the next day with a total cost of $240.

Another hard example comes from the Washington Post. Peter Harkins, a Senior Engineer at The Washington Post, used the Amazon Elastic Compute Cloud (Amazon EC2) to launch 200 server instances to process 17,481 pages of non-searchable PDF images into a searchable online library. With a processing speed of approximately 60 seconds per page, job was completed within nine hours and provided web portal access to the public 26 hours later. Harkins ruminates, “EC2 made it possible for this project to happen at the speed of breaking news. I used 1,407 hours of virtual machine time for a final expense of $144.62. The database of Hillary Clinton’s 1993-2001 Schedule is publicly available at: https://projects.washingtonpost.com/2008/clinton-schedule/.

Examples like this show how cloud computing techniques can be used to revolutionize PED processes. By increasing the use of automation and focusing our analyst on higher level exploitation tasks, near-real time exploitation and dissemination of critical intelligence products may be enabled in the very near term with cloud computing.

Follow me at https://Twitter.com/Kevin_Jackson

G C Network