Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

cloud computing

NIST Releases Final Cloud Road Map Documents

October 22, 2014

The National Institute of Standards and Technology (NIST) has published the final version of the "U.S. Government Cloud Computing Technology Roadmap, Volumes I and II," which focuses on strategic and tactical objectives to support the federal government’s accelerated adoption of cloud computing.

What Does the Intelligence Community Really Want?

September 18, 2014
By Rita Boland

The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges.

DISA Cloud Brokering Up in Smoke

September 11, 2014
By George I. Seffers

DISA had been identified as the Defense Department’s cloud broker, but that was rescinded just last week, reported Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff.

Advanced Protection 
in a Public Cloud

October 1, 2014
By Rita Boland

As organizations migrate more data into public clouds, demands for a different type of security are emerging. A specialized option is available now for Amazon Web Services that aims to mitigate threats more quickly by finding them faster and suggesting methods of remediation.

Federal IG Access to Data Overcast by Rush to the Cloud

October 1, 2014
By Sandra Jontz

When cloud computing revolutionized the way businesses stored, processed and transmitted data, the rapid transformation—as with a lot of technological advances—left U.S. government agencies behind the times.

Ramping Up the
 Federal Cloud Against the Insider Threat

October 1, 2014
By George I. Seffers

The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.

Isolation
 Mechanisms 
Help Protect Data in Public Cloud

October 1, 2014
By Sandra Jontz

Explosive amounts of data and the strains on limited financial resources have prompted corporations and governmental agencies alike to explore joint tenancy in the cloud for storing, processing and transmitting data. But while good fences—or in this case isolation mechanisms—make good neighbors, in the virtual world of cloud security the idiom might not ring entirely true. In the public cloud arena, risks arise when organizations place their data in a cloud system but cannot control who their neighbors might be.

NSF Invests Millions in Academic Cloud Computing Testbeds

August 21, 2014
By Rita Boland

The National Science Foundation (NSF) has initiated two $10 million projects to create separate cloud computing testbeds called Chameleon and CloudLab. Through the efforts, the academic research community will develop and experiment with novel architectures and architecturally enabled applications of cloud computing.

U.S. Army Explores Push-Button Networking

August 1, 2014
By George I. Seffers

The U.S. Army’s current tactical network delivers a wide range of capabilities for warfighters, including unprecedented communications on the move. But the complexity can overwhelm commanders who have countless critical tasks to complete and soldiers’ lives in their hands. Future tactical networks will automate many processes and may be smart enough to advise commanders, similar to JARVIS, Iron Man’s computerized assistant.

The Army’s current networking technology includes Capability Set 13, a package of network components, associated equipment and software that provides an integrated capability from the tactical operations center to the dismounted soldier. It supports Army warfighters in Afghanistan and provides a host of capabilities not offered by the wide area network in use as recently as 2012. The Army has fielded the capability set down to the company commander level with a package known as the Soldier Network Extension, which delivers some challenges along with the added capabilities. “The company commander is trying to maneuver around the battlefield, and he’s trying to command a company, and he has these new pieces of kit that he has to learn how to use, and it’s complicated. That’s part of the problem,” says Jennifer Zbozny, chief engineer for the Army Program Executive Office for Command, Control and Communications-Tactical. “If you had an iPhone with an interface you didn’t understand, and you had to do a million things and log on a million different ways, you’d probably get tired of it and decide it’s not worth the effort.”

Start Thinking About Cloud and Spectrum Together

July 1, 2014
By Kent R. Schneider

Virtualization and cloud implementation are critical components of information technology planning, acquisition and management going forward. Cloud implementations are important to security, efficiency, effectiveness, cost savings and more pervasive information sharing, particularly among enterprises.

Pages

Subscribe to RSS - cloud computing