blog

0
126
Wednesday, April 4, 2011

Cloud Computing Highlighted at DoDIIS 2011

Cloud Computing Highlighted at DoDIIS 2011

Are you going to DoDIIS? Schedule for May 1-5, 2011 in Detroit, Michigan, the conference highlights the Defense Intelligence Agency’s (DIA) commitment to developing and maintaining secure and reliable networks for Department of Defense personnel, services and information technology customers. This year’s 3,000 attendees will focus on the “Secure and Collaborative Intelligence in Defense of the Nation” theme.
In an earlier interview DIA CIO Grant Scheider discussed the agency views on cloud computing:

“We’ve got three elements of the cloud architecture or infrastructure for the customer’s mission focus. One is our data layer, which is having our data available and its native authoritative location so we don’t have to keep making copies of databases, if you will. The second piece is our identity and access manager, which is the regulator of who gets to see and access which data. And the third piece is the application environment, which needs to move to a widget environment where the customer can select the various tools to provide their operational capabilities and then those applications would be leveraged by the identity access manager to give them access into the appropriate data sources.”

I will be there as well. With our partners, NJVC will be presenting an exciting set of secure cloud services offerings. Provisioned from the teams HSPD-12 compliant, PIV/CAC card enabled secure cloud platform, these services are available through our GSA Infrastructure-as-a-Service blanket purchase agreement. Unlike traditional RFP that entails capital expenditures and inordinate procurement delays, our cloud services are provisioned from an online link just as if you were using Google to do an online search or Netflix to rent a movie. After establishing an account, government organizations are charged only for actual use. The services we will be presenting include:

  • Geodata Search & Publishing Service courtesy of GeoEye Analytics
  • Analytics and Pipeline Services courtesy of Appistry
  • Cloud Service Orchestration Framework courtesy of Teleology Services Inc
  • Cloud Application Performance Monitoring courtesy of Visual Network Services
  • Secure Infrastructure-as-a-Service courtesy of Team CLEXO

Access to these advanced analytics capabilities will not require hardware and software purchases or months and months of operational delay. Our cloud services provide:

  • Increased Speed to Mission Capability
  • Drastic Reduction in O&S Cost
  • The elimination of capability related capital expenditures; and
  • Compliance with the Federal “Cloud First Policy”
COME SEE US IN BOOTH # 748

Cloud Computing Highlighted at DoDIIS 2011

Bookmark and Share

Cloud Musings on Forbes
( Thank you. If you enjoyed this article, get free updates by email or RSS – KLJ )

Follow me at https://Twitter.com/Kevin_Jackson

LEAVE A COMMENT

Name*
E-mail*
Phone number*
Your Message

Latest posts

0
46

Survive and Thrive With Digital Transformation

First cloud computing then multi-cloud. How can we get ahead of this digital transformation nightmare? These are the ...

0
61

The “George Jetson” of Today

He grew up in Silicon Valley, landed his first job at Apple Computers, was introduced to Nobel Prize winners by his d...

0
254

MWC19: Where Telecommunications and Cloud Meet

As a cloud solution architect, my passion is learning the details about how cloud computing uniquely supports specifi...

0
192

Tulane University SoPA Selects “Architechting Cloud Computing Solutions”

Last week, Packt Publishing announced that “Architecting Cloud Computing Solutions” by Kevin L. Jackson a...

0
408

5G Wireless Technology Connecting Healthcare

Healthcare is in the middle of massive change. Called digital transformation by many, this term describes the industr...

0
378

Maria Lensing: The Network Platform for Healthcare’s Future

As a girl, Maria and her family traveled to Memphis, Tennessee to get cancer treatment for her sick brother. The mira...

0
1425

How “Big Iron” Does “Big Regulation”

According to Verizon, there were over there were over 53,000 security incidents in 2017, with over 2,200 of those ide...

0
1840

Mainframe Synergies for Digital Transformation

In July  of 2018, Broadcom announced its intentions to acquire CA Technologies. In the press release, Hock Tan, Presi...

0
488

2018 AT&T Business Summit: Security “in” and “of” the Cloud

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can...

0
220

My Brush with Royalty: Queen Latifah

Queen Latifah! Hip Hop Icon. Movie Star. Television Star. Fashion Model. Songwriter. Producer. Entrepreneurial Genius...