Cyber assurance for government mission accomplishment

Government Cyber Assurance

Subscribe to Government Cyber Assurance: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cyber Assurance: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Runaway cloud computing cost may be causing an information technology industry crisis. Expanding requirements, extended transition schedules and misleading marketplace hype have made "Transformation" a dirty word.  Questions about how to manage cost variances and deviations with assets and cost across different suppliers abound. A  recent Cloud Tech article explained that while public cloud offers considerable cost savings in comparison to private or on-premises based alternatives, there may also be significant hidden costs. Operational features like auto-scaling can cause costs to soar in line with demand for resources, making predicting costs difficult and budgeting even harder. There is also an acute need for a holistic and heterogeneous system that can track the costs of cloud services from the point of consumption (e.g., an application or business unit) down to... (more)

Crisis Response Using Cloud Computing | @CloudExpo #ML #IoT #AI #DX #DevOps #FedRAMP

Cloud computing is more than servers and storage. In a crisis situation it can actually be a lifesaver. BlackBerry, in fact, has just become the first cloud-based crisis communication service to receive a Federal Risk and Authorization Management Program (FedRAMP) authorization from the United States Government for its AtHoc Alert and AtHoc Connect services. If you're not familiar with FedRAMP, it is a US government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The Blackberry certification was sponsored by the US Federal Aviation Administration. While you may not need a US Government certified solution in an emergency, your organization may really want to consider the benefits of cloud computing for crisis response. From a communications point of view, companies can... (more)

Blockchain Business Innovation | @CloudExpo #Cloud #FinTech #Blockchain

Is there more than bitcoin to blockchain? Absolutely, because today's blockchain is opening up a pathtowards the delivery of trusted online services. To understand this statement, you need to see blockchain as more that it's more famous bitcoin use case. As a fundamental digital tool, blockchain is a shared, immutable ledger for recording the history of transactions. If used in this fashion, it can enable transactional applications that can have embedded trust, accountability and transparency attributes. Instead of having a Bitcoin blockchain that is reliant on the exchange of cryptocurrencies with anonymous users on a public network, a Business blockchain can provide a permissioned network with known and verified identities. With this kind of transactional visibility, all activities within that network are observable and auditable by every network user. This end-to... (more)

American Airlines Adopts Public Cloud Computing | @CloudExpo #AI #Cloud #Analytics

Did you know that the reservations systems of the biggest carriers mostly run on a specialized IBM operating system known as Transaction Processing Facility (TPF). Designed by IBM in the 1960s it was designed to process a large numbers of transactions quickly. Although IBM is still updating the code, the last major rewrite was about ten years ago. With all the major technologies changes since then, it's clear that IBM has already accomplished a herculean task by keeping an application viable for over 50 years. Just like Americas aging physical infrastructure, the airlines are suffering from years of minimal investment in their information technology. This critical failure has been highlighted by a number of newsworthy incidents including: Delta, April 4, 2017 - Following storms that affected its Atlanta hub, Delta's crew-scheduling systems failed, causing days of op... (more)

Digital Transformation Driven by ITaaS | @CloudExpo #Cloud #ITaaS #DigitalTransformation

When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment. This represents a shift from buying parts for self-assembly to composing services through self-serve consumption and pay-per-use models.  Quite often this transition also leads to the adoption of software defined environments across the enterprise infrastructure. Software defined infrastructures do, however, bring with them some very unique challenges. Many of the most prevalent issues are centered around the relatively immature state of the technology itself. The most significant aspect of this challenge is the lack of industry standards for device control. Control software must know the status of all network devices and trunks, no matter what vendor equipment is being used. While OpenFlow stands today as the d... (more)

NATO ACT 'Art of the Possible' Interoperability Demonstration

NATO ACT 'Art of the Possible' Interoperability Demonstration GovCloud Network is proud to have served as the Program Manager for the NATO Allied Command Transformation, "Art of the Possible" Interoperability Demonstration on December 16, 2016. supporting the The Network Centric Operations Industry Consortium (NCOIC), this effort featured an important demonstration for military, government and business leaders by its member-companies to underscore the benefits of collaborating via an interoperable network environment. The demonstration used a secure, federated-cloud infrastructure to highlight the consortium's work over the past few years in how to develop a trusted environment, including governance processes and federation management as well as interoperability verification. This demonstration itself is an outgrowth of  the NCOIC Interoperability Verification (IV)... (more)

Cloudy Thinking and Digital Transformation | @CloudExpo #DX #Cloud #Analytics

(Originally posted on the Engility Corporation Blog) There's a lot to gain from cloud computing, but success requires a thoughtful and enterprise focused approach. Cloud computing decouples data and information from the infrastructure on which it lies. A process that is a LOT more involved than dragging some folders from your desktop to a shared drive. Cloud computing as a mission transformation activity, not a technological one. As an organization moves from local information hosting to the cloud, one of the most important challenges is addressing cloud computing as a mission transformation activity, not a technological one. Cloud computing isn't a new technology. It's a new way of consuming and provisioning information technology services. Adopting cloud computing means paralleling your mission processes, rethinking the economic models and abstracting your applicati... (more)

Business Chatbots Taking Over | @CloudExpo #AI #ML #IoT #M2M #Cloud

Chat apps characteristics make them very appealing to businesses and marketers. Prominent ones include their size, user retention, usage rates, and user demographics. In fact, the combined user base of the top four chat apps is larger than that of the top four social networks. Chat apps also have higher retention and usage rates than most mobile apps. Finally, the majority of their users are young, an extremely important demographic for brands, advertisers and publishers. These chat app traits have accelerated the blending of artificial intelligence and business service functions to create the modern chatbot. Recent advances in this area include: A chatbot's ability to conduct engaging human conversations which has allowed businesses to leverage the inexpensive and wide-reaching technology to engage with more consumers; The greater suitability of chatbots with mobil... (more)

How Quantum Computing with DNA Storage Will Affect Your Health | @CloudExpo #Cloud #Storage

How Quantum Computing with DNA Storage Will Affect Your Health By Guest Contributor Taran Volckhausen Contributing Editor at Vector Moore's Law, which states that processing speeds will double every two years as we cram more and more silicon transistors onto chips, has been faltering since the early 2000s when the law started to run up against fundamental limitations presented by the laws of thermodynamics. While the chip industry, with Intel leading the charge, has found ways to sidestep the limitations up until now, many are now saying that despite the industry's best efforts, the stunning gains in processor speeds will not be seen again by the simple application of Moore's Law. In fact, there is evidence to show that we are reaching the plateau for the number of transistors that will fit on a single chip. Intel has even suggested silicon transistors can only keep ... (more)

The Enterprise Network | @ThingsExpo #IoT #M2M #DigitalTransformation

Photo credit: Shutterstock The computer and the network that connects them are both inextricably linked to the success of any business.  This truth is at the heart of our contemporary connection economy. "The computer patiently measures and reports. [T]he network creates value in connection. The connection economy values the bridges between the nodes as much as the nodes themselves." - Seth Godin This train of thought explains why Uber is worth more than the independent cars it connects.  It also describes the imperative for enterprises to redefine their network in order to operate in the modern data economy.  The instantiation of today's data economy lies in the digital supply chain that links customer demand and organizational products. This reality surfaces the need for organizations to transform their supply chains into demand and product networks. This strate... (more)

Surviving the Coming 'Hackerpocalypse' | @CloudExpo #API #Cloud #Security

With all the excellent training available on television today, we are all now well prepared to deal with the coming Zombie Apocalypse.  Our failure as a society lies, however, in our misunderstanding of the nature of the cybersecurity challenge. This failure threatens us all and our survival will depend on society’s ability to deal with the evolution and maturation of the changing enterprise cybersecurity challenge. If you’re completely oblivious to the living dead threat, a zombie apocalypse refers to a widespread (usually global) rise of zombies hostile to human life.  The zombies will engage in a general assault on civilization where victims may become zombies themselves. This causes the outbreak to become an exponentially growing crisis. The spreading phenomenon swamps normal military and law enforcement organizations, leading to the panicked collapse of civili... (more)