Defense Department information technology systems are economically unsustainable, but the department only now is catching the revolutionary spirit of the cloud, and adoption is slow and not in line with advances in the commercial sector.
General Dynamics Information Technology, Fairfax, Virginia, will provide strategic support for the design and development of a "Cloud-of-Clouds" information technology (IT) transformation initiative at Sandia National Laboratories, a federally funded research and development center for the National Nuclear Security Administration. General Dynamics will assist in modernizing Sandia’s IT environment by developing the foundation for sustainable, cost-effective cloud computing capabilities for the lab.
Much has been said and written about the U.S. Defense Department’s move to the cloud. This migration could provide enhanced security and better information access, say many experts. But it could provide another huge benefit, helping the Defense Department finally curb information infrastructure costs and apply badly needed funds where they would be most useful.
Moving to a cloud environment will save government agencies money, but those savings may not be great, especially in the short term. The cloud environment will, however, provide a range of valuable capabilities, according to three government chief technology officers.
With the National Geospatial-Intelligence Agency's interactive Map of the World now residing in the cloud, the intelligence agency plans to expand the tools and content.
The Defense Department is expected very soon to release a new policy revising the role DISA plays in brokering cloud services. The changes are designed to speed cloud service acquisitions. DISA no longer will be the sole acquisition agency, but it will continue to ensure network access to cloud service providers is secure and reliable, agency officials say.
The National Institute of Standards and Technology (NIST) has published the final version of the "U.S. Government Cloud Computing Technology Roadmap, Volumes I and II," which focuses on strategic and tactical objectives to support the federal government’s accelerated adoption of cloud computing.
There are no do-overs when it comes to safeguarding the U.S. military’s sensitive data. With that key, concise and blunt notion in mind, defense leaders say they are taking a slow, methodical, multipronged approach as the Defense Information Systems Agency develops a cloud security model for the whole of the Defense Department.
The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges.
DISA had been identified as the Defense Department’s cloud broker, but that was rescinded just last week, reported Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff.
As organizations migrate more data into public clouds, demands for a different type of security are emerging. A specialized option is available now for Amazon Web Services that aims to mitigate threats more quickly by finding them faster and suggesting methods of remediation.
When cloud computing revolutionized the way businesses stored, processed and transmitted data, the rapid transformation—as with a lot of technological advances—left U.S. government agencies behind the times.
The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.
Explosive amounts of data and the strains on limited financial resources have prompted corporations and governmental agencies alike to explore joint tenancy in the cloud for storing, processing and transmitting data. But while good fences—or in this case isolation mechanisms—make good neighbors, in the virtual world of cloud security the idiom might not ring entirely true. In the public cloud arena, risks arise when organizations place their data in a cloud system but cannot control who their neighbors might be.
The National Science Foundation (NSF) has initiated two $10 million projects to create separate cloud computing testbeds called Chameleon and CloudLab. Through the efforts, the academic research community will develop and experiment with novel architectures and architecturally enabled applications of cloud computing.
The U.S. Army’s current tactical network delivers a wide range of capabilities for warfighters, including unprecedented communications on the move. But the complexity can overwhelm commanders who have countless critical tasks to complete and soldiers’ lives in their hands. Future tactical networks will automate many processes and may be smart enough to advise commanders, similar to JARVIS, Iron Man’s computerized assistant.
Virtualization and cloud implementation are critical components of information technology planning, acquisition and management going forward. Cloud implementations are important to security, efficiency, effectiveness, cost savings and more pervasive information sharing, particularly among enterprises.
The military’s evolving environment stands on the strong shoulders of the past to reach for the clouds.
Researchers working on multiple projects in Europe and the United States are using cloud computing to teach robotic systems to perform a multitude of tasks ranging from household chores to serving hospital patients and flipping pancakes. The research, which one day could be applied to robotic systems used for national defense, homeland security or medical uses, lowers costs while allowing robots to learn more quickly, share information and better cooperate with one another.
The global market for cloud-based architecture and related services and applications is expected to surge through 2017, analysts say. Demand for a variety of virtualized “as a service” capabilities such as infrastructure, software and security also will increase.