cloud computing

January 20, 2015
By George I. Seffers

Moving to a cloud environment will save government agencies money, but those savings may not be great, especially in the short term. The cloud environment will, however, provide a range of valuable capabilities, according to three government chief technology officers.

December 12, 2014
By George I. Seffers

With the National Geospatial-Intelligence Agency's interactive Map of the World now residing in the cloud, the intelligence agency plans to expand the tools and content.

October 29, 2014
George I. Seffers

The Defense Department is expected very soon to release a new policy revising the role DISA plays in brokering cloud services. The changes are designed to speed cloud service acquisitions. DISA no longer will be the sole acquisition agency, but it will continue to ensure network access to cloud service providers is secure and reliable, agency officials say.

October 22, 2014

The National Institute of Standards and Technology (NIST) has published the final version of the "U.S. Government Cloud Computing Technology Roadmap, Volumes I and II," which focuses on strategic and tactical objectives to support the federal government’s accelerated adoption of cloud computing.

November 1, 2014
By Sandra Jontz
The Defense Information Systems Agency command center at Fort Meade, Maryland, in 2013.

There are no do-overs when it comes to safeguarding the U.S. military’s sensitive data. With that key, concise and blunt notion in mind, defense leaders say they are taking a slow, methodical, multipronged approach as the Defense Information Systems Agency develops a cloud security model for the whole of the Defense Department.

September 18, 2014
By Rita Boland

The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges.

September 11, 2014
By George I. Seffers

DISA had been identified as the Defense Department’s cloud broker, but that was rescinded just last week, reported Lt. Gen. Mark Bowman, USA, director, command, control, communications and computers/cyber and chief information officer, Joint Chiefs of Staff.

October 1, 2014
By Rita Boland

As organizations migrate more data into public clouds, demands for a different type of security are emerging. A specialized option is available now for Amazon Web Services that aims to mitigate threats more quickly by finding them faster and suggesting methods of remediation.

October 1, 2014
By Sandra Jontz

When cloud computing revolutionized the way businesses stored, processed and transmitted data, the rapid transformation—as with a lot of technological advances—left U.S. government agencies behind the times.

October 1, 2014
By George I. Seffers

The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.

October 1, 2014
By Sandra Jontz

Explosive amounts of data and the strains on limited financial resources have prompted corporations and governmental agencies alike to explore joint tenancy in the cloud for storing, processing and transmitting data. But while good fences—or in this case isolation mechanisms—make good neighbors, in the virtual world of cloud security the idiom might not ring entirely true. In the public cloud arena, risks arise when organizations place their data in a cloud system but cannot control who their neighbors might be.

August 21, 2014
By Rita Boland

The National Science Foundation (NSF) has initiated two $10 million projects to create separate cloud computing testbeds called Chameleon and CloudLab. Through the efforts, the academic research community will develop and experiment with novel architectures and architecturally enabled applications of cloud computing.

August 1, 2014
By George I. Seffers

The U.S. Army’s current tactical network delivers a wide range of capabilities for warfighters, including unprecedented communications on the move. But the complexity can overwhelm commanders who have countless critical tasks to complete and soldiers’ lives in their hands. Future tactical networks will automate many processes and may be smart enough to advise commanders, similar to JARVIS, Iron Man’s computerized assistant.

July 1, 2014
By Kent R. Schneider

Virtualization and cloud implementation are critical components of information technology planning, acquisition and management going forward. Cloud implementations are important to security, efficiency, effectiveness, cost savings and more pervasive information sharing, particularly among enterprises.

May 15, 2014
By Maryann Lawlor

The military’s evolving environment stands on the strong shoulders of the past to reach for the clouds.

May 1, 2014
By George I. Seffers
Researchers working on the RoboEarth project demonstrate a robot’s ability to learn and cooperate with other robotic systems to serve medical patients. The project uses cloud computing to teach robots to perform tasks that seem intuitive for humans but are a challenge for robots.

Researchers working on multiple projects in Europe and the United States are using cloud computing to teach robotic systems to perform a multitude of tasks ranging from household chores to serving hospital patients and flipping pancakes. The research, which one day could be applied to robotic systems used for national defense, homeland security or medical uses, lowers costs while allowing robots to learn more quickly, share information and better cooperate with one another.

May 1, 2014
BY Henry S. Kenyon

The global market for cloud-based architecture and related services and applications is expected to surge through 2017, analysts say. Demand for a variety of virtualized “as a service” capabilities such as infrastructure, software and security also will increase.

April 4, 2014
By George I. Seffers

The Federal Risk and Authorization Management Program (FedRAMP) may ultimately eliminate the need for an information security classification process specific to the U.S. Defense Department, according to Teri Takai, Defense Department chief information officer. FedRAMP seeks to provide a governmentwide, standardized approach to security assessment, authorization and continuous monitoring for cloud products and services.

March 18, 2014
By Henry S. Kenyon

The U.S. Air Force Space Command is helping the service put its joint modernization plans into place. As the command responsible for handling cyberspace, communications and information missions, it is the Air Force’s instrument in meeting major Defense Department technology goals, such as establishing the Joint Information Environment.

March 1, 2014
By George I. Seffers
Providing a reliable cloud computing infrastructure is critical for completing missions on the modern-day battlefield.

Software developed by university researchers accurately predicts cloud computing issues before they occur, enhancing reliability; cutting costs; potentially improving cybersecurity; and saving lives on the battlefield.

Pages