Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

cloud computing

The Best Laid Plans Fly Awry

June 1, 2013
By Max Cacas

The U.S. Air Force’s migration to a new enterprise network known as AFNET will be at least two years late in completion because the project turned out to be more complicated than planners anticipated.

DISA to Spend Summer Exploring Security in the Cloud

May 24, 2013
By Max Cacas

A hand-picked group of Defense Department’s top information technology experts will work with a giant in the cloud computing industry to determine how security will play a part on the military’s migration to the cloud.

Intelligence Taps Industry for Essential Technologies

May 22, 2013
By Robert K. Ackerman

James Bond’s U.S. counterpart may be equipped more with commercial technologies than with systems developed in intelligence community laboratories. The private sector will be called upon to provide even more capabilities to help keep the intelligence community ahead of adversaries and budget cuts.

Big Data and Cloud Computing Present Opportunities, Challenges

May 22, 2013
By Max Cacas

The term “big data” means different things to different people. To a bank, big data represents the ability to gain business intelligence from financial transactions. To the United States intelligence community, big data’s challenge comes in trying to sift through information from multiple environments in support of the warfighter.

John Marshall, senior information systems technologist for the Joint Staff Intelligence Directorate (J-2), Joint Chiefs of Staff, said big data includes information being captured constantly by more than 50 million mobile devices, and “the question is, how do we successfully mine through that data for those nuggets that my colleagues and I need?” He appeared on a panel, “Big Data and the Evolving Enterprise,” at the the AFCEA SOLUTIONS Series – George Mason University Symposium, “Critical Issues in C4I."

The second panel of the day focused on an examination of cloud computing. Frank Konieczny, chief technology officer, Office of Information Dominance, and chief information officer, Office of the Secretary of the Air Force, reminded attendees that in his office, the promise of cloud computing is an empty one if it does not fulfill Air Force mission requirements and help airmen to meet the mission.

Fellow panelist Geoffrey Raines, a cloud infrastructure engineer for the MITRE Corporation's National Security Engineering Center, noted that significant challenges remain on the road to cloud computing in the Defense Department; among them, portability and interoperability; risks associated with data center consolidation; and managing cost expectations, which have been widely touted as a benefit of cloud computing.

NIST Releases Latest Catalog of Security and Privacy Controls for Federal Systems

May 3, 2013
by Max Cacas

A government-wide task force led by NIST is out with the latest catalog of security and privacy controls for federal information systems, including some new thinking when it comes to addressing insider threats that go beyond technology.

NIST Revises Federal Computer Security Guide

May 1, 2013

The National Institute of Standards and Technology (NIST) has released the most comprehensive update to the government’s computer security guide since 2005. The fourth revision of “Security and Privacy Controls for Federal information Systems and Organizations” (SP 800-53) addresses issues such as mobile and cloud computing, applications security, supply chain risks and privacy concerns. It also calls for maintaining routine best practices to reduce information security risks while applying state-of-the-practice architecture and engineering principles to minimize the impact of threats such as cyber attacks.

The U.S. Defense Department, the intelligence community and the Committee on National Security Systems developed SP 800-53 as part of the Joint Task Force.

Advanced Capabilities Required for Future Navy Warfighting

April 4, 2013
By Robert K. Ackerman

Future conflicts likely will be fought in degraded information technology environments, which will require the U.S. Navy to develop and exploit new capabilities to continue to operate in contested cyberspace. Technologies such as a flexible information grid, assured timing services and directed energy weapons must be part of the naval information system arsenal if the sea service is to maintain information dominance through the year 2028.

These were just a few of the findings presented in the Navy’s Information Dominance Roadmap 2013-2028, which was released in late March. Presented by Rear Adm. William E. Leigher, USN, the Navy’s director of warfighter integration, the report outlines the growing challenges facing the fleet and how the Navy must meet them.

The report divides information dominance challenges into three areas: assured command and control (C2), battlespace awareness and integrated fires. While the United States will continue to maintain supremacy in those areas, that supremacy is shrinking as more nations are closing the gap between U.S. capabilities and the ability to disrupt them.

Among the advanced capabilities the Navy will require toward the end of the next decade is assured electromagnetic spectrum access. Achieving this will entail fielding greater numbers of advanced line-of-sight communication systems; being able to monitor combat system operational status and adjust it using automated services; having a real-time spectrum operations capability that enables dynamic monitoring and control of spectrum emissions; and generating a common operational picture of the spectrum that is linked to electronic navigation charts and displays operational restrictions.

Corps
 Blazes 
Ahead With Cloud Computing

April 1, 2013
By Rita Boland

As they put the necessary pieces in place, Marines are mindful of tight resources and are seeking help from industry.

For the past year, U.S. Marine Corps technical personnel have been implementing a strategy to develop a private cloud. The initiative supports the vision of the commandant while seeking to offer better services to troops in disadvantaged areas of the battlefield.

As part of this effort, members of the Headquarters Marine Corps (HQMC) Command, Control, Communications and Computers (C4) Department are working on enterprise licensing agreements with multiple vendors to achieve economies of scale. They also are examining thinning the environment as an element of infrastructure as a service, and they are exploring how an enterprise services support desk would support a cloud environment during the transition from a continuity of services contract to a government-owned, government-operated scenario. In place is a 600-day transition plan to help move from the former to the latter. Robert Anderson, chief, Vision and Strategy Division, HQMC C4, explains that the May 2012 “Marine Corps Private Cloud Computing Environment Strategy” serves as the driving document for the transition, and now Marines are trying to reach the point where they execute the requirements outlined in the paper. “There are multiple pieces that have to occur for this to happen,” he states. Personnel are working on follow-up documents now, including a mobility strategy and a five-year transition plan scheduled for release in June. The latter lays out the next steps for the cloud environment.

DISA Lays Groundwork for Commercial Cloud Computing Contract

March 26, 2013
By Max Cacas

One of the U.S. Defense Department’s top information technology officials says work is beginning on a multiaward contract for commercial cloud computing services, but the official says he has no timeline or total value for the business.

Nuclear Agency's Cloud Computing Plan Comes Together

March 20, 2013
By George I. Seffers

The U.S. National Nuclear Security Administration (NNSA) began working on its Yourcloud solution about two years ago and expects to have the cloud computing solution in place by year's end. You can read more about this in "U.S. Nuclear Agency Enhances Cybersecurity With Cloud Computing
." 

One of the surprises along the way to cloud was that NNSA is not alone in the problems it needs to solve, according to Travis Howerton, NNSA chief technology officer. "When we first started putting this together, I would have thought that we were more unique than we are, but when I traveled around talking to other chief information officers and other leaders in government agencies, or even in the commercial sector, everybody's struggling with the same set of issues," Howerton observes. "In general, what surprised me is how much synergy there is in trying to solve this problem government-wide. We're happy to be part of that overall ecosystem and to share with others what we're doing that may be helpful."

Agency officials spent about a year developing a strategic plan for transformation, which includes three pillars: the NNSA Network Vision (2NV), which modernizes the current computing environment by providing a secure, mobile, agile and adaptive IT infrastructure that will allow the NNSA workforce to perform their duties from any device, anywhere, any time; the Joint Cybersecurity Coordination Center (JC3), which provides the agency a capability for understanding the health of the systems, data and network; and the Cyber Sciences Laboratory (CSL), which establishes a process through which theoretical research in IT and cybersecurity can be rapidly applied to operational computing environments.

 

 

Pages

Subscribe to RSS - cloud computing