fbpx

blog

0
202
Thursday, October 10, 2008

Why the Cloud? Processing, Exploitation and Dissemination

So why is the intelligence community so interested in cloud computing? Three letters: PED (Processing, Exploitation, Dissemination). Take these two real life examples from the publishing industry.

Jim Staten of Forrester Research provided an example of how the New York Times leverage the cloud. The Times wanted to makes its historic archives available for online access. They needed to process 11 million articles and turn them into .pdf files. Initial estimates outlined that hundreds of servers and about 4 Tb of storage would be necessary. The IT organization at the Times estimated a months-long delay before beginning, the need for a significant budget and highlighted the difficulty of locating the computing resources. The project manager give Amazon Web Services a try and kicked off 100 EC2 instances and 4 terabytes of S3 storage. The job was finished the next day with a total cost of $240.

Another hard example comes from the Washington Post. Peter Harkins, a Senior Engineer at The Washington Post, used the Amazon Elastic Compute Cloud (Amazon EC2) to launch 200 server instances to process 17,481 pages of non-searchable PDF images into a searchable online library. With a processing speed of approximately 60 seconds per page, job was completed within nine hours and provided web portal access to the public 26 hours later. Harkins ruminates, “EC2 made it possible for this project to happen at the speed of breaking news. I used 1,407 hours of virtual machine time for a final expense of $144.62. The database of Hillary Clinton’s 1993-2001 Schedule is publicly available at: https://projects.washingtonpost.com/2008/clinton-schedule/.

Examples like this show how cloud computing techniques can be used to revolutionize PED processes. By increasing the use of automation and focusing our analyst on higher level exploitation tasks, near-real time exploitation and dissemination of critical intelligence products may be enabled in the very near term with cloud computing.

Follow me at https://Twitter.com/Kevin_Jackson

LEAVE A COMMENT

Name*
E-mail*
Phone number*
Your Message

Latest posts

0
2620

The IoT Nexus: Bosch Connected World 2019 in Berlin

Next week, I will be influencing #LikeABosch as I accept an invitation from the company to attend Bosch ConnectedWorl...

0
405

Survive and Thrive With Digital Transformation

First cloud computing then multi-cloud. How can we get ahead of this digital transformation nightmare? These are the ...

0
211

The “George Jetson” of Today

He grew up in Silicon Valley, landed his first job at Apple Computers, was introduced to Nobel Prize winners by his d...

0
697

MWC19: Where Telecommunications and Cloud Meet

As a cloud solution architect, my passion is learning the details about how cloud computing uniquely supports specifi...

0
269

Tulane University SoPA Selects “Architechting Cloud Computing Solutions”

Last week, Packt Publishing announced that “Architecting Cloud Computing Solutions” by Kevin L. Jackson a...

0
498

5G Wireless Technology Connecting Healthcare

Healthcare is in the middle of massive change. Called digital transformation by many, this term describes the industr...

0
462

Maria Lensing: The Network Platform for Healthcare’s Future

As a girl, Maria and her family traveled to Memphis, Tennessee to get cancer treatment for her sick brother. The mira...

0
1493

How “Big Iron” Does “Big Regulation”

According to Verizon, there were over there were over 53,000 security incidents in 2017, with over 2,200 of those ide...

0
1912

Mainframe Synergies for Digital Transformation

In July  of 2018, Broadcom announced its intentions to acquire CA Technologies. In the press release, Hock Tan, Presi...

0
557

2018 AT&T Business Summit: Security “in” and “of” the Cloud

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can...