blog

1
168
Thursday, January 1, 2009

Bob Gourley on Cloud Computing and NetCentric Operations

Bob Gourley, Crucial Point CTO and former DIA CTO, just posted  Cloud Computing and Net Centric Operations on his website CTOvision . In it he outlines how the OSD and ASD NII strategy to enable net-centric operations has benefited from the advent of cloud computing. Of particular note is his list of key principles for OSD implementation of cloud computing:
  • The importance of mission-focused engineering. This key point is already embodied in the ASD NII Strategic Plan, but is worth restating to keep it at the forefront of all IT discussions in the department.
  • The continual need for security, including data confidentiality, integrity and availability. All DoD computing approaches must be engineered to be in total consonance with DoD guidelines to assure DoD information, information systems and information infrastructure. Cloud Computing, when engineered right, makes dramatic, positive changes to the mission assurance posture of DoD. Cloud computing enables stronger end point security and better data protection. It also enables the use of thin clients and the many security benefits they provide.
  • The need for always instantaneously available backup of data in the cloud. Ensured availability under all circumstances is a key benefit of smart cloud computing approaches.
  • The continual need for open source and open standards. Most cloud infrastructure today is based on open source (Linux, Solaris, MySQL, Glassfish, Hadoop) and this positive trend will help in net centric approaches. According to the IDC Group, open source software (OSS) is “the most significant, all-encompassing and long-term trend that the software industry has seen since the early 1980’s” Gartner projects that by 2012, 90 percent of the world’s companies will be using open source software. This all indicates open source and open standards should be a key principle for DoD cloud computing and other net centric approaches.
  • The continual need to evaluate both low barrier to entry and low barrier to exit. As approaches to cloud computing are evaluated, too frequently the cost of exiting an approach is not considered, resulting in lock-in into a capability that may soon be inefficient. Cloud computing capabilities should be adopted that do not result in lock-in.
  • The need for open standards. Cloud computing contributions to net centric operations increase interoperability as the code, API’s and interfaces for cloud computing are secure but are widely published for all participants to interface with. OSD involvement in open source and open standards communities should continue and be accelerated, since increasingly cloud computing open standards are being discussed and designed by open standards bodies like W3C, OASIS, IETF and the Liberty Alliance. Document and other formats used by OSD cloud computing activities will be open and available for all authorized users on all devices.
  • The need to understand the cost of “private clouds”. For at least the near term, DoD will remain a provider of “private cloud” capabilities where security dictates ownership levels of control over compute power. This fact means DoD must continually engineer for change and technology insertion, which underscores the need for low barriers to exist in design criteria.
I hope that our decision makers heed his wise council.
Follow me at https://Twitter.com/Kevin_Jackson

LEAVE A COMMENT

Name*
E-mail*
Phone number*
Your Message
user profile image
10 years ago

Anonymous

^^Thanks!!

婚前徵信婚姻感情大陸抓姦外遇抓姦法律諮詢家暴婚前徵信尋人感情挽回大陸抓姦離婚工商徵信婚前徵信外遇抓姦感情挽回尋人大陸抓姦離婚家暴工商徵信法律諮詢跟蹤工商徵信婚前徵信感情挽回外遇抓姦法律諮詢家暴尋人大陸抓姦離婚大陸抓姦外遇尋人家暴工商徵信法律諮詢家暴感情挽回大陸抓姦外遇婚前徵信離婚尋人工商徵信外遇抓姦法律諮詢家暴婚前徵信大陸抓姦尋人感情挽回外遇抓姦婚前徵信感情挽回尋人大陸抓姦工商徵信法律諮詢離婚家暴工商徵信外遇抓姦法律諮詢家暴婚前徵信尋人感情挽回大陸抓姦離婚婚前徵信工商徵信外遇抓姦尋人離婚家暴大陸抓姦感情挽回法律諮詢離婚感情挽回婚前徵信外遇抓姦家暴尋人工商徵信外遇抓姦法律諮詢家暴婚前徵信尋人感情挽回">徵大陸抓姦離婚婚前徵信工商徵信外遇抓姦尋人離婚家暴大陸抓姦感情挽回法律諮詢

Reply

Latest posts

0
115

Survive and Thrive With Digital Transformation

First cloud computing then multi-cloud. How can we get ahead of this digital transformation nightmare? These are the ...

0
75

The “George Jetson” of Today

He grew up in Silicon Valley, landed his first job at Apple Computers, was introduced to Nobel Prize winners by his d...

0
261

MWC19: Where Telecommunications and Cloud Meet

As a cloud solution architect, my passion is learning the details about how cloud computing uniquely supports specifi...

0
203

Tulane University SoPA Selects “Architechting Cloud Computing Solutions”

Last week, Packt Publishing announced that “Architecting Cloud Computing Solutions” by Kevin L. Jackson a...

0
424

5G Wireless Technology Connecting Healthcare

Healthcare is in the middle of massive change. Called digital transformation by many, this term describes the industr...

0
386

Maria Lensing: The Network Platform for Healthcare’s Future

As a girl, Maria and her family traveled to Memphis, Tennessee to get cancer treatment for her sick brother. The mira...

0
1433

How “Big Iron” Does “Big Regulation”

According to Verizon, there were over there were over 53,000 security incidents in 2017, with over 2,200 of those ide...

0
1851

Mainframe Synergies for Digital Transformation

In July  of 2018, Broadcom announced its intentions to acquire CA Technologies. In the press release, Hock Tan, Presi...

0
499

2018 AT&T Business Summit: Security “in” and “of” the Cloud

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can...

0
230

My Brush with Royalty: Queen Latifah

Queen Latifah! Hip Hop Icon. Movie Star. Television Star. Fashion Model. Songwriter. Producer. Entrepreneurial Genius...