cloud computing

October 30, 2019
By George I. Seffers
DISA’s Cloud Based Internet Isolation prototyping initiative eliminates potential threats from unclassified networks by showing Internet browsers a movie-like representation of the the websites they view. The agency plans to select one of two prototypes in the spring. Credit: Alexander Supertramp/Shutterstock

The Defense Information Systems Agency (DISA) Cloud Based Internet Isolation prototyping effort is already eliminating cyber threats every day, says Angela Landress, who manages the program commonly known as CBII.

The program uses a little technological sleight of hand to keep non-secure Internet browsing in the secure Amazon Web Services (AWS) cloud rather than on the Department of Defense Information Network (DODIN). “What comes back from the cloud is actually just a video-like representation of the webpage. There’s nothing executable in it,” Landress explains.

September 26, 2019
 

The U.S. Cyber Command selected Applied Insight's subsidiary Stratus Solution to provide a cloud platform to the command, according to the company. Under the contract, the company will support the comand's ability to adopt commercial cloud services and migrate its activities into the cloud, by use of the company’s cloud platform-as-a-service called Altitude. The company will support the command in developing and implementing a secure, flexible and scalable cloud platform, and overseeing its migration to the cloud and the ongoing operation of its cloud environment as it scales, a company officiael stated. The company will provide architecture design, implementation and operation, security acceleration, and cloud governance. 

September 13, 2019
 

Milpatis, California-based Avocado Systems* received a $1.8 million Small Business Innovation Research (SBIR) program Phase II award from the U.S. Air Force to evaluate the company's ability to protect Air Force data centers and cloud systems, according to a company announcement. Through AFWERX, the award has the company evaluating Avocado's patented application security solution to secure enterprise level cloud and data center infrastructures. The company's Pico-Segmentation technology secures application, web and data tiers inside of clouds and data centers, a company official stated. *Small Business

August 21, 2019
By George I. Seffers
Gregory Garcia, the Army’s deputy chief information officer/G-6 and chief data officer, speaks at TechNet Augusta. Photo by Michael Carpenter

U.S. Army officials expect in the coming weeks or months to release a data strategy that will be closely aligned with its existing cloud strategy and are also building an enterprise cloud office, according to Gregory Garcia, the Army’s deputy chief information officer/G-6 and chief data officer.

Garcia made the remarks during an address and fireside chat on the second morning of the AFCEA TechNet Augusta conference in Augusta, Georgia.

“We have a data strategy that’s going to be processed in the next weeks and months. That’s going to get after making sure data is visible, accessible, understandable and interoperable,” he said.

July 18, 2019
By Kimberly Underwood
After five years in use, the Federal Risk and Authorization Management Program, known as FedRAMP, offers benefits to federal governmental agencies, as well as some challenges, experts tell Congress. Credit Shutterstock/Blackboard

Officials from several federal agencies testified on Wednesday as to the effectiveness of the government’s cloud accreditation process, the Federal Risk and Authorization Management Program, with mixed reviews. Most witnesses before the U.S. House of Representatives Committee on Oversight and Reform’s Subcommittee on Government Operations hearing, entitled To the Cloud! The Cloudy Role of FedRAMP in IT Modernization, confirmed the positive benefits of the program.

July 17, 2019
Posted by Kimberly Underwood
Dana Deasy, the Defense Department’s CIO, pictured speaking at AFCEA’s 2018 Defensive Cyber Operations Symposium in Baltimore, is stressing the role of cloud and artificial intelligence as part of DOD’s new Digital Modernization Strategy. Credit: Michael Carpenter

On Friday, the Defense Department released its DOD Digital Modernization Strategy, aiming to greatly improve the military’s digital environment. The strategy aims to modernize the DOD’s joint information enterprise environment by advancing its fixed and mobile networking capabilities,; DOD-wide enterprise information technology (IT) services, coordinated technology refresh efforts, joint cybersecurity capability and access to data.

June 28, 2019
 

Innovative Defense Technologies,* Arlington, Virginia, is awarded a $12,972,431 option under a previously awarded cost-plus-fixed-fee contract N00014-19-C-1054 for the Cloud-to-Edge development under Small Business Innovative Research project in Phase III. With the exercise of this option, it brings the value of the contract to $13,001,964. Work will be performed at the contractor's facility in Arlington, Virginia, and work is expected to be completed June 28, 2024. Fiscal year 2019 research, development, test and evaluation (Navy) funds in the amount of $9,774,000 will be obligated at the time of award. No funds will expire at the end of the current fiscal year.

May 15, 2019
By George I. Seffers
Lt. Gen. Bruce Crawford, USA, chief information officer/G-6, U.S. Army, speaks about network security and capabilities at TechNet Cyber. Photo by Michael Carpenter

Lt. Gen. Bruce Crawford, USA, chief information officer/G-6, U.S. Army, suggests the possibility of an Internet of Strategic Things in addition to the Internet of Tactical Things.

“We’ve had some really good discussions about the Internet of Things. That was a thing a couple of years ago. And then we started talking about the Internet of Tactical Things. I think what’s on the horizon is more of a discussion of the Internet of Strategic Things,” Gen. Crawford told the audience on the second day of the AFCEA TechNet Cyber 2019 conference in Baltimore.

April 22, 2019
By Jim Hansen
The amphibious assault ship USS Boxer transits the Pacific Ocean, Oct. 3, 2018. The Navy’s Combat to Connect in 24 Hours program may redefine the ability to quickly adapt to cyber combat. Credit: Navy Petty Officer 3rd Class Alexander C. Kubitza

The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program that has the potential to change naval warfare as we know it.

The program is designed to improve operational efficiency by automating the Navy’s risk management framework (RMF) efforts; providing sailors with near real-time access to critical data; and accelerating the Navy’s ability to deploy new applications in 24 hours rather than the typical 18 months.

April 18, 2019
By Cameron Chehreh
The steps required to get artificial intelligence efforts off the ground are clear and tangible—invest in the right infrastructure, develop strong industry and government partnerships and prioritize training and hiring for AI skillets. Credit: geralt/Pixabay

Over the next five years, artificial intelligence (AI) will redefine what the U.S. federal government can achieve with technology. AI will help ensure our nation stays competitive, effectively serves its citizens and maintains safety for Americans at home and abroad.

April 1, 2019
By Grimt Habtemariam
The Defense Department’s cloud computing strategy recognizes mission and tactical-edge needs along with the requirement to prepare for artificial intelligence. Credit: TheDigitalArtist/Pixabay

In every recent discussion I have had with government and defense leaders around IT modernization, the conversation quickly leads to cloud and its role in enabling agile ways of working for government. Many agencies have already developed cloud migration targets and are looking at how they can accelerate cloud adoption.

April 1, 2019
By George I. Seffers
Marines train with communications equipment in the village of Hell, Norway, October 14, 2018, as part of Trident Juncture 18, a NATO exercise. Trident Juncture 18 marks the first time NATO is using data science in addition to traditional lessons learned processes following a major training exercise.  Photo By Marine Corps Lance Cpl. Scott R. Jenkins

Trident Juncture 2018, a large-scale NATO military exercise, wrapped up late last year. But in the weeks since, the alliance has been doing something it has never done before by using big data science to help inform lessons learned from the exercise.

March 11, 2019
 

Dell Marketing LP, Round Rock, Texas, was awarded an estimated $231,170,000 firm-fixed-price blanket purchase agreement (BPA) in accordance with the firm’s General Services Administration (GSA) Federal Supply Schedule contract. This agreement will provide VMware brand-name software licenses, software maintenance and services to the Department of the Navy (DON). The products will meet the following functional capabilities: data center and Cloud infrastructure; networking and security; storage and availability; Cloud management; network functions virtualization; digital workspace; desktop and application virtualization; and training.

February 28, 2019
By Kimberly Underwood
Credit: GreenTech/Shutterstock

Commercial cloud offers the federal government access to a dynamic computing environment almost immediately, with services or capabilities they may not have previously had access to during the time of having to purchase all of the hardware, software and infrastructure themselves. However, the roll out to the cloud for the government has not come quickly or easily, experts say.

February 27, 2019
By Kimberly Underwood
Congress is keeping an eye on the Defense Department’s information technology efforts. Credit:Shutterstock/Tono Balaguer

The U.S. House of Representatives is examining the status of the Defense Department’s information technology, modernization efforts and strategic direction. The House Armed Forces Committee’s Subcommittee on Intelligence and Emerging Threats and Capabilities, led by ranking member Rep. James Langevin (D-R.I.), held a hearing on February 26, with top DOD IT leaders testifying.   

February 15, 2019
By George I. Seffers
Rear Adm. Boris Becker, commander of the Space and Naval Warfare Systems Center, speaks during a panel at West 2019. Photo by Michael Carpenter

Artificial intelligence, machine learning, advanced manufacturing, blockchain, 5G, the Internet of Things, quantum computing, data science, cloud computing and cybersecurity all have one thing in common: information.

Rear Adm. Boris Becker, USN, commander of the Space and Naval Warfare Systems Center, made that point during a panel session at the AFCEA-USNI West 2019 Conference in San Diego. “It’s information in warfare and information as warfare,” he added.

February 13, 2019
By George I. Seffers
Brig. Gen. Dennis Crall, USMC, deputy principal cyber advisor, Office of the Secretary of Defense, speaks at the National Security Technology Forum and Exposition in San Diego. Photo by Michael Carpenter

Last year the U.S. Defense Department released a cyber strategy and followed that with posture review that identified more than 90 gaps in cybersecurity capabilities, many of which were determined to be critical shortcomings. This year, officials expect to begin implementing the strategy, beginning with several priority areas involving endpoint management, network visibility, user authentication and cyber force development, according to Brig. Gen. Dennis Crall, USMC, deputy principal cyber advisor, Office of the Secretary of Defense.

February 6, 2019
By George I. Seffers
Industry and military officials see both silver linings and gray skies in the Pentagon's cloud computing strategy. Credit: Ivan Cholakov and jannoon0281/Shutterstock, edited by Chris D'Elia

The cloud strategy document released this week by the U.S. Defense Department is drawing mixed reactions from industry and military officials. Experts welcome the strategy as an important step toward modernizing the department’s infrastructure but also express some concerns and note that many questions remain.

February 1, 2019
By Kimberly Underwood
The Coast Guard faces bandwidth challenges, and the service is looking at how to optimize applications on smaller ships.

The U.S. Coast Guard is pursuing digital solutions to support its unique set of military, law enforcement, humanitarian, regulatory and diplomatic responsibilities. It is no small feat to provide information technology to its workforce of 87,570, as well as to its cutters, boats, and aircraft that move along the coastline and inland waterways protecting the United States.

February 1, 2019
By George I. Seffers
A U.S. Air Force F-15E Strike Eagle, center, a Royal Air Force F-35 Lightning II, left, and a French air force Dassault Rafale fly behind a U.S. Air Force KC-135 Stratotanker over the English Channel, during a November 2018 multinational training exercise. The Air Force is developing and fielding a new mission planning system for tankers using an agile software development methodology.  Photo by Air Force Senior Airman Luke Milano

A combination of artificial intelligence, machine learning, cloud computing, fifth-generation communications and agile software development processes may one day allow commanders to direct any asset from anywhere, essentially revolutionizing command and control.

During the recent AFCEA Alamo Chapter Event in San Antonio, several officials agreed that the current command and control (C2) center known as an air operations center (AOC) has grown too cumbersome and vulnerable for Air Force commanders to make the rapid-fire decisions required in the modern era of multi-domain operations.

Pages