blog

1
216
Wednesday, August 8, 2008

Comments from Mr. Robert Carey, DON CIO and Army COS General George W. Casey, Jr

Over the last couple of weeks, I’ve had the distinct pleasure to listen to both Mr. Robert Carey, CIO, Department of the Navy, and General George W. Casey, Jr., Chief of Staff US Army. Some of my observations are summarized below:

Mr. Robert Carey

  • IT connectivity brings stability to the world. The world’s hotspots coincide with places that lack IT connectivity
  • The US is currently in a cyberwar. Cybersecurity is our #1 issue.
  • DON CIO major focus areas include encryption of data at rest, increased information security and increased information reliability
  • The Navy’s next generation network will be responsive to the operational commander, unleash the collaborative nature of the Millennium Generation and empower our future warriors.
  • The Navy’s next generation network will build on the lessons learned in developing the world’s largest intranet, allowing the control and cost visibility necessary to migrate off expensive vulnerable legacy networks.
  • Industry needs to provide Net-Centric Licensing
  • Information sharing initiatives require we move in a direction that allows us to share National Security information with whomever requires access
  • “I’m passionate about Web 2.0 technologies!”

General George W. Casey

  • The US Army is transforming to be able to conduct offensive, defensive and stability operation simultaneously within a sustained conflict environment
  • Advances in technology exacerbate the problem
  • The force will operate abroad
  • Our force will need to work with indigenous forces
  • Military power will need to work closely with all other elements of national power
  • A 21st Century transformed force and its people must be versatile
  • A 21st Century transformed force must be intellectually and institutionally agile
  • The network is central to building the 21st Century force
  • Soldiers will have handheld devices from which they will be able to access the Army’s information
  • The network must be protected
  • A network that collaborates is critical to institutional agility
  • The Army must have the ability to generate world class information technology capabilities in a garrisoned environment and an enhanced ability for people to collaborate
  • Common IT standards must be accepted
Follow me at https://Twitter.com/Kevin_Jackson

LEAVE A COMMENT

Name*
E-mail*
Phone number*
Your Message
user profile image
7 years ago

Enterprise Mobile Apps and Beyond

I agree with both Mr. Robert Carey and General George W. Casey.

Reply

Latest posts

0
46

Survive and Thrive With Digital Transformation

First cloud computing then multi-cloud. How can we get ahead of this digital transformation nightmare? These are the ...

0
61

The “George Jetson” of Today

He grew up in Silicon Valley, landed his first job at Apple Computers, was introduced to Nobel Prize winners by his d...

0
254

MWC19: Where Telecommunications and Cloud Meet

As a cloud solution architect, my passion is learning the details about how cloud computing uniquely supports specifi...

0
192

Tulane University SoPA Selects “Architechting Cloud Computing Solutions”

Last week, Packt Publishing announced that “Architecting Cloud Computing Solutions” by Kevin L. Jackson a...

0
408

5G Wireless Technology Connecting Healthcare

Healthcare is in the middle of massive change. Called digital transformation by many, this term describes the industr...

0
378

Maria Lensing: The Network Platform for Healthcare’s Future

As a girl, Maria and her family traveled to Memphis, Tennessee to get cancer treatment for her sick brother. The mira...

0
1426

How “Big Iron” Does “Big Regulation”

According to Verizon, there were over there were over 53,000 security incidents in 2017, with over 2,200 of those ide...

0
1840

Mainframe Synergies for Digital Transformation

In July  of 2018, Broadcom announced its intentions to acquire CA Technologies. In the press release, Hock Tan, Presi...

0
489

2018 AT&T Business Summit: Security “in” and “of” the Cloud

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can...

0
221

My Brush with Royalty: Queen Latifah

Queen Latifah! Hip Hop Icon. Movie Star. Television Star. Fashion Model. Songwriter. Producer. Entrepreneurial Genius...