SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Cloud Computing for DoD

             Kevin L. Jackson
             Founder & Editor
Cloud Musings | Government Cloud Computing
DISCLAIMER
The comments contained in this
presentation are the personal views of Kevin
L. Jackson and do not represent the views
or policy of NJVC or the United States
Government.
Agenda
   DoD Cloud Computing 2009
   DoD Policy and Direction
   DoD Use of Cloud Computing
   What does this mean?
DoD Cloud Computing 2009
DoD DISA RACE
 •Garing, CIO of the Defense Information Systems Agency (DISA), believes cloud
 computing will be a driving force in the Department of Defense (DoD). In fact, Garing
 says that although he shares some of the concerns espoused by the IT media (such
 as the danger of hosting multiple applications on a single platform), he, personally, is
 more than optimistic, calling cloud computing „something we absolutely have to do.‟”
 •CollabNet, Appistry, Apptis


DoD JFCOM Valiant Angel
 •Dr. James Heath (Senior Science Advisor to DIRNSA) intends to integrate Valiant
 Angel capabilityy into NSA‟s “Cloud Architecture” and subsequent buildout of P23 at
 Camp Slayer.
 •SAIC, LGS


Intelligence Community
 •“Develop a common “cloud” based on a single backbone network and clusters of
 servers in scalable, distributed centers where data is stored, processed and managed
 •NGA using Appistry with Geoeye for imagery processing
 • Appistry, L-3
MR. ROBERT F. LENTZ DEPUTY ASSISTANT SECRETARY OF DEFENSE,
FOR CYBER, IDENTITY AND INFORMATION ASSURANCE BEFORE THE
 U.S. HOUSE OF REPRESENTATIVES ARMED SERVICES COMMITTEE
  SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS &
                        CAPABILITIES
                         May 5, 2009
                     Cloud computing builds on these ideas to offer a virtual
                     computing fabric with almost limitless and infinitely definable
                     processing and storage capacity. In the future, many enterprises
                     will choose not to invest in their own IT departments, but will pay
                     as they go, relying on ability to access commercial computing
                     services in the cloud. For many DoD applications, the
                     commercial cloud will be too risky, but a private cloud could
                     bring us many benefits. Besides the obvious economic benefits
                     of scalable, on-demand computing, a private cloud also gives us
                     the ideal platform with which to provide the virtual monitoring
                     and provisioning described earlier. A cloud is also an ideal place
                     from which to make capabilities available to the whole
                     enterprise. While, in the DoD, we have encountered challenges
                     moving towards a service-oriented architecture (SOA), in the
                     private sector, companies like Google and Salesforce are
                     basing their business models on an insatiable public hunger for
                     software and applications as a service. Emulating their delivery
                     mechanisms within our own private cloud may be key to how we
                     realize the true potential of net-centricity.
Deputy Assistant Secretary of Defense for
Cyber, Identity, and Information Assurance
                  Strategy
 Capability 7. Mission-based Architecture
 Networks, services, and data organized and optimized for
 mission availability
 Current GIG network segmentation (e.g., NIPRNet, SIPRNet) is
 driven by information confidentiality needs, not by mission
 needs. The primary mission drivers are availability and integrity.
 As reliance on network segmentation for confidentiality
 diminishes through realization of the strategic capabilities
 described above, missions and information enterprise need to
 be co-designed to reduce the mission consequences of adverse
 cyber events. This includes the ability to:
 •Securely realize the promise of platforms, software, and
 infrastructure as services (i.e., “cloud computing”) and evolving
 software development and design methods (i.e. “Web 2.0/3.0”)
 •…
National Security Agency

– National Security Agency is taking a cloud computing approach in
  developing a new collaborative intelligence gathering system that will
  link disparate The intelligence agency is using the Hadoop file
  system, an implementation of Google‟s MapReduce parallel
  processing system, to make it easier to “rapidly reconfigure data” and
  for Hadoop‟s ability to scale.MapReduce to address enterprise large
  data problems
– http://www.darkgovernment.com/news/nsa-embraces-cloud-computing/
US Transportation
            Command
– Amazon.com as a model for implementation of Distribution Process
  Owner (DPO) mission
– http://www.transcom.mil/pa/body.cfm?relnumber=090218-1
US Army
– Through a simulated deployment of the 18th Fires Brigade out of Fort
  Bragg, N.C., the NSC seamlessly transferred all of the 18th's data,
  information and services from their home station into a virtual deployed
  environment. Once they hit the ground and plugged into the network,
  they were able to immediately enter the fight with the same systems and
  information that they had trained on at their home base. In the past, units
  would enter a deployed environment and have to operate on a different
  network with different applications, which caused a learning curve and
  delay in that unit's effectiveness.
– fcw.com/Articles/2009/07/08/Army-PEO-EIS-Gary-Winkler.aspx


                                Austere Challenge - Global Network Enterprise
                                Construct (GNEC)
National Geospatial
        Intelligence Agency
– The National Geospatial-Intelligence Agency envisions establishing a
  GEOINT distributed computing cloud, contained within a larger, high-
  performance cloud, to achieve many of the architectural objectives in
  the Department of Defense and intelligence community missions.
– http://www.geospatial-intelligence-forum.com/mgt-archives/94-mgt-
  2009-volume-7-issue-1/716-computing-clouds-cast-geospatial-
  vision.html
US Air Force
– The 10-month project will introduce cybersecurity and analytics
  technologies developed by IBM Research into a cloud computing
  architecture. "Our goal is to demonstrate how cloud computing can be a
  tool to enable our Air Force to manage, monitor and secure the
  information flowing through our network," said Lt. Gen. William Lord, chief
  information officer and chief of warfighting integration for the Air Force.
– http://www.defensesystems.com/Articles/2010/02/04/Air-Force-IBM-
  Cloud-Computing.aspx
US Navy


– INrelief is a US Navy effort that is managed by San Diego State University
  (Registered NGO) to promote better interactions and results when disasters
  strike. INrelief is a based primarily on Google technologies.
– https://sites.google.com/a/inrelief.org/about/Home
– http://www.inrelief.org/
What Does This All Mean?

 Cloud computing in the DoD and the Intelligence
  Community is REAL !!
 Applicable use cases extend to the operational
  domain.
 System integrator are rapidly building their skills and
  offerings in the area.
 Benefits appear to outweigh security concerns so
  adoption has been rapid.
Thank You !!




http://kevinljackson.blogspot.com           http://govcloud.ulitzer.com
                             Kevin L. Jackson
                           kvjacksn@gmail.com
                              (703) 335-0830

Weitere ähnliche Inhalte

Was ist angesagt?

Secure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of controlSecure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of control
Capgemini
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
IAEME Publication
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour
 

Was ist angesagt? (20)

Asyma E3 2014 The Impact of Cloud Computing on SME's
Asyma E3 2014   The Impact of Cloud Computing on SME'sAsyma E3 2014   The Impact of Cloud Computing on SME's
Asyma E3 2014 The Impact of Cloud Computing on SME's
 
Secure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of controlSecure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of control
 
Top Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart InfrastructureTop Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart Infrastructure
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Servizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta Maggiore
Servizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta MaggioreServizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta Maggiore
Servizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta Maggiore
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot Spot
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked in
 
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENTA REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
B018211016
B018211016B018211016
B018211016
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
The Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameThe Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the Game
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
SIIA & INPUT Webinar: Federal Cloud Computing Initiative Update
SIIA & INPUT Webinar: Federal Cloud Computing Initiative UpdateSIIA & INPUT Webinar: Federal Cloud Computing Initiative Update
SIIA & INPUT Webinar: Federal Cloud Computing Initiative Update
 
Cloud computing in 2020: Predictions about security, AI, Kubernetes, more
Cloud computing in 2020: Predictions about security, AI, Kubernetes, moreCloud computing in 2020: Predictions about security, AI, Kubernetes, more
Cloud computing in 2020: Predictions about security, AI, Kubernetes, more
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
Virtual Instruments Presentation
Virtual Instruments PresentationVirtual Instruments Presentation
Virtual Instruments Presentation
 

Ähnlich wie Cloud Computing In DoD, IDGA Presentation

Cloud computing
Cloud computingCloud computing
Cloud computing
RS P
 
Cloud computing
Cloud computingCloud computing
Cloud computing
RS P
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 

Ähnlich wie Cloud Computing In DoD, IDGA Presentation (20)

Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Privacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal SectorPrivacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal Sector
 
cloudcomputing(bashu).ppt
cloudcomputing(bashu).pptcloudcomputing(bashu).ppt
cloudcomputing(bashu).ppt
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 
Oracle America, Inc. - GAO Protest - DOD JEDI - Network Segmentation - Cybers...
Oracle America, Inc. - GAO Protest - DOD JEDI - Network Segmentation - Cybers...Oracle America, Inc. - GAO Protest - DOD JEDI - Network Segmentation - Cybers...
Oracle America, Inc. - GAO Protest - DOD JEDI - Network Segmentation - Cybers...
 
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
 
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdfUNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
shivam gupta(48).pptx
shivam gupta(48).pptxshivam gupta(48).pptx
shivam gupta(48).pptx
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Science international journal
Science international journalScience international journal
Science international journal
 

Mehr von GovCloud Network

Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
GovCloud Network
 

Mehr von GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Cloud Computing In DoD, IDGA Presentation

  • 1. Cloud Computing for DoD Kevin L. Jackson Founder & Editor Cloud Musings | Government Cloud Computing
  • 2. DISCLAIMER The comments contained in this presentation are the personal views of Kevin L. Jackson and do not represent the views or policy of NJVC or the United States Government.
  • 3. Agenda  DoD Cloud Computing 2009  DoD Policy and Direction  DoD Use of Cloud Computing  What does this mean?
  • 4. DoD Cloud Computing 2009 DoD DISA RACE •Garing, CIO of the Defense Information Systems Agency (DISA), believes cloud computing will be a driving force in the Department of Defense (DoD). In fact, Garing says that although he shares some of the concerns espoused by the IT media (such as the danger of hosting multiple applications on a single platform), he, personally, is more than optimistic, calling cloud computing „something we absolutely have to do.‟” •CollabNet, Appistry, Apptis DoD JFCOM Valiant Angel •Dr. James Heath (Senior Science Advisor to DIRNSA) intends to integrate Valiant Angel capabilityy into NSA‟s “Cloud Architecture” and subsequent buildout of P23 at Camp Slayer. •SAIC, LGS Intelligence Community •“Develop a common “cloud” based on a single backbone network and clusters of servers in scalable, distributed centers where data is stored, processed and managed •NGA using Appistry with Geoeye for imagery processing • Appistry, L-3
  • 5. MR. ROBERT F. LENTZ DEPUTY ASSISTANT SECRETARY OF DEFENSE, FOR CYBER, IDENTITY AND INFORMATION ASSURANCE BEFORE THE U.S. HOUSE OF REPRESENTATIVES ARMED SERVICES COMMITTEE SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS & CAPABILITIES May 5, 2009 Cloud computing builds on these ideas to offer a virtual computing fabric with almost limitless and infinitely definable processing and storage capacity. In the future, many enterprises will choose not to invest in their own IT departments, but will pay as they go, relying on ability to access commercial computing services in the cloud. For many DoD applications, the commercial cloud will be too risky, but a private cloud could bring us many benefits. Besides the obvious economic benefits of scalable, on-demand computing, a private cloud also gives us the ideal platform with which to provide the virtual monitoring and provisioning described earlier. A cloud is also an ideal place from which to make capabilities available to the whole enterprise. While, in the DoD, we have encountered challenges moving towards a service-oriented architecture (SOA), in the private sector, companies like Google and Salesforce are basing their business models on an insatiable public hunger for software and applications as a service. Emulating their delivery mechanisms within our own private cloud may be key to how we realize the true potential of net-centricity.
  • 6. Deputy Assistant Secretary of Defense for Cyber, Identity, and Information Assurance Strategy Capability 7. Mission-based Architecture Networks, services, and data organized and optimized for mission availability Current GIG network segmentation (e.g., NIPRNet, SIPRNet) is driven by information confidentiality needs, not by mission needs. The primary mission drivers are availability and integrity. As reliance on network segmentation for confidentiality diminishes through realization of the strategic capabilities described above, missions and information enterprise need to be co-designed to reduce the mission consequences of adverse cyber events. This includes the ability to: •Securely realize the promise of platforms, software, and infrastructure as services (i.e., “cloud computing”) and evolving software development and design methods (i.e. “Web 2.0/3.0”) •…
  • 7. National Security Agency – National Security Agency is taking a cloud computing approach in developing a new collaborative intelligence gathering system that will link disparate The intelligence agency is using the Hadoop file system, an implementation of Google‟s MapReduce parallel processing system, to make it easier to “rapidly reconfigure data” and for Hadoop‟s ability to scale.MapReduce to address enterprise large data problems – http://www.darkgovernment.com/news/nsa-embraces-cloud-computing/
  • 8. US Transportation Command – Amazon.com as a model for implementation of Distribution Process Owner (DPO) mission – http://www.transcom.mil/pa/body.cfm?relnumber=090218-1
  • 9. US Army – Through a simulated deployment of the 18th Fires Brigade out of Fort Bragg, N.C., the NSC seamlessly transferred all of the 18th's data, information and services from their home station into a virtual deployed environment. Once they hit the ground and plugged into the network, they were able to immediately enter the fight with the same systems and information that they had trained on at their home base. In the past, units would enter a deployed environment and have to operate on a different network with different applications, which caused a learning curve and delay in that unit's effectiveness. – fcw.com/Articles/2009/07/08/Army-PEO-EIS-Gary-Winkler.aspx Austere Challenge - Global Network Enterprise Construct (GNEC)
  • 10. National Geospatial Intelligence Agency – The National Geospatial-Intelligence Agency envisions establishing a GEOINT distributed computing cloud, contained within a larger, high- performance cloud, to achieve many of the architectural objectives in the Department of Defense and intelligence community missions. – http://www.geospatial-intelligence-forum.com/mgt-archives/94-mgt- 2009-volume-7-issue-1/716-computing-clouds-cast-geospatial- vision.html
  • 11. US Air Force – The 10-month project will introduce cybersecurity and analytics technologies developed by IBM Research into a cloud computing architecture. "Our goal is to demonstrate how cloud computing can be a tool to enable our Air Force to manage, monitor and secure the information flowing through our network," said Lt. Gen. William Lord, chief information officer and chief of warfighting integration for the Air Force. – http://www.defensesystems.com/Articles/2010/02/04/Air-Force-IBM- Cloud-Computing.aspx
  • 12. US Navy – INrelief is a US Navy effort that is managed by San Diego State University (Registered NGO) to promote better interactions and results when disasters strike. INrelief is a based primarily on Google technologies. – https://sites.google.com/a/inrelief.org/about/Home – http://www.inrelief.org/
  • 13. What Does This All Mean?  Cloud computing in the DoD and the Intelligence Community is REAL !!  Applicable use cases extend to the operational domain.  System integrator are rapidly building their skills and offerings in the area.  Benefits appear to outweigh security concerns so adoption has been rapid.
  • 14. Thank You !! http://kevinljackson.blogspot.com http://govcloud.ulitzer.com Kevin L. Jackson kvjacksn@gmail.com (703) 335-0830