Get the latest information on current and future plans for Cloud Computing!
IDGA’s Cloud Computing for DoD & Government is your opportunity to claim your place in the virtual world of DoD and federal government data storage. You will be able to meet with key decision-makers and top-notch innovators for your chance to tap into the emerging market of cloud computing for defense and government!
Lead the way with revolutionary cloud computing initiatives by attending sessions on:
- Implementation of SaaS solutions
- The immediate need to coordinate cloud standards and how they provide benefit to the enterprise
- Security challenges and solutions for government organizations planning a move to the cloud
- Current DoD and Government programs and future plans for cloud computing activities
The Cloud! Oh how we love this IT catchword!
Yet many IT professionals still find themselves wondering what exactly it can do for their unique enterprise. Sure it offers agility, flexibility and cost savings, but how about seeing it in action in today’s businesses?
In this exclusive resource, check out real-world, surprising cloud computing observations on the following topics:
How IT departments are actively employing these services
The reactions to both public and private cloud initiatives
What the cloud means for future IT decisions
And more
The Cloud! Oh how we love this IT catchword!
Yet many IT professionals still find themselves wondering what exactly it can do for their unique enterprise. Sure it offers agility, flexibility and cost savings, but how about seeing it in action in today’s businesses?
In this exclusive resource, check out real-world, surprising cloud computing observations on the following topics:
How IT departments are actively employing these services
The reactions to both public and private cloud initiatives
What the cloud means for future IT decisions
And more
IBM Global Financing can tailor financing solutions to your specific IT needs. For more information on great rates, flexible payment plans and loans, and asset buyback and disposal
VMblog - 2020 IT Predictions from 26 Industry Expertsvmblog
Find out what's going on in the world of #artificialintelligence, #machinelearning, #cloud, #kubernetes, #containers, #virtualization, #security, #disasterrecovery, #networking, #data and so much more in 2020. Read these #predictions from 26 of the industry's leading experts to learn more! Hear from industry thought leaders from companies like Altaro, Citrix, Commvault, Datacore, IGEL, Kaspersky, Liquidware, SolarWinds, Veeam, Vembu, VMware and more. And make sure to also read the more than 430+ other expert predictions here: http://bit.ly/2QVorPI at VMblog.com.
Faced with depressing predictions of looming budget cuts cloud computing has come to the fore of discussions to uncover relatively short-term economies in IT functions within the public sector. But how much of the cloud story is hype? How different are cloud architectures to the web-server farms that organizations have had the means to access for well over a decade? And how realistic is it that core business systems will move out of the data centre to the cloud?
NJVC Implementation of Cloud Computing Solutions in Federal AgenciesGovCloud Network
This paper outlines the essential steps to constructing a solid cloud computing roadmap.This paper outlines the essential steps to constructing a solid cloud computing roadmap.
IDGA is pleased to announce the return of the 5th Annual Cloud Computing for DoD & Government. The Draft Agenda is now available for you to view. Get your copy at www.CloudComputingEvent.com or request a copy via email at idga@idga.org
This summit is unique from the rest as it allows you to look at both sides of the Cloud - the fluid and functional aspect of Cloud services for government agencies, as well as with the tactical capabilities of the Cloud.
IBM Global Financing can tailor financing solutions to your specific IT needs. For more information on great rates, flexible payment plans and loans, and asset buyback and disposal
VMblog - 2020 IT Predictions from 26 Industry Expertsvmblog
Find out what's going on in the world of #artificialintelligence, #machinelearning, #cloud, #kubernetes, #containers, #virtualization, #security, #disasterrecovery, #networking, #data and so much more in 2020. Read these #predictions from 26 of the industry's leading experts to learn more! Hear from industry thought leaders from companies like Altaro, Citrix, Commvault, Datacore, IGEL, Kaspersky, Liquidware, SolarWinds, Veeam, Vembu, VMware and more. And make sure to also read the more than 430+ other expert predictions here: http://bit.ly/2QVorPI at VMblog.com.
Faced with depressing predictions of looming budget cuts cloud computing has come to the fore of discussions to uncover relatively short-term economies in IT functions within the public sector. But how much of the cloud story is hype? How different are cloud architectures to the web-server farms that organizations have had the means to access for well over a decade? And how realistic is it that core business systems will move out of the data centre to the cloud?
NJVC Implementation of Cloud Computing Solutions in Federal AgenciesGovCloud Network
This paper outlines the essential steps to constructing a solid cloud computing roadmap.This paper outlines the essential steps to constructing a solid cloud computing roadmap.
IDGA is pleased to announce the return of the 5th Annual Cloud Computing for DoD & Government. The Draft Agenda is now available for you to view. Get your copy at www.CloudComputingEvent.com or request a copy via email at idga@idga.org
This summit is unique from the rest as it allows you to look at both sides of the Cloud - the fluid and functional aspect of Cloud services for government agencies, as well as with the tactical capabilities of the Cloud.
Cloud Computing for Banking
What does the future of cloud computing for banking look like—both in the near and long terms? Accenture sees cloud computing as an important step in the continuing industrialization of IT and thus capable of ultimately playing a key role in enabling high performance.
Wikibon's annual Predictions webinar discussed 13 predictions across digital business, IoT, AI, big data, AppDev, cloud, and future systems architecture.
Netmagic talks about the increasing preference for hybrid cloud computing and why it is the future of IT. Know more information from Netmagicsolutions.com
The Microsoft Cloud includes Azure, Office 365 and much more. During this presentation I give an overview of the platform and talk specifically about the productivity portion of the Microsoft Cloud and the services Oakwood provides to implement Office 365 for customers.
Crisis-Ready Crisis-Proof IT Infrastructure for the New NormalKalin Hitrov
At our digital event for IT innovators looking to future-proof their infrastructure we shared ideas and real-world case studies on how to reduce complexity, improve agility and perfect scalability in an ever-changing environment.
SPLC 2019 Summit: Sustainability in Cloud-Services ProcurementsSPLCouncil
Slides from David Asiello, Program Manager, US Department of Defense, presented at the Sustainable Purchasing Leadership Council’s 2019 Summit in Portland, OR.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
1. Explore the latest information
presents a training conference: on current and future plans!
Cloud Computing
for
DoD & Government
TM
Developing Strategies to February 22 - 24, 2010
Increase Database Storage Washington DC
& Management Efficiency Metro Area
Lead the way with revolutionary Meet key decision-makers and hear from a
cloud computing initiatives by distinguished speaker faculty that includes:
attending sessions on: Mark Krzysko
Assistant Deputy Under Secretary of Defense for Business
• Implementation of SaaS solutions Transformation
• The immediate need to coordinate cloud Maj Gen Stephen Gross, USAFR
standards and how they provide benefit Mobilization Assistant to the Chief of Warfighting
to the enterprise Integration and Chief Information Officer
• Security challenges and solutions for Henry Sienkiewicz
government organizations planning a Technical Program Director, DISA
move to the cloud Doug Bourgeois
Director, National Business Center, Department of Interior
• Current DoD and Government programs
and future plans for cloud computing William C. Barker
activities Chief Cyber Security Advisor, NIST
Media Partners
www.CloudComputingEvent.com
2. Cloud Computing
for TM
Developing Strategies to Increase Database
Storage & Management Efficiency
February 22 - 24, 2010
DoD & Government Washington DC Metro Area
There is an ever-increasing number of companies buying Who You Will Meet
computing, storage, and networking power as they need it IDGA’s Cloud Computing for DoD & Government is
from the cloud. Now there is an even greater need for a one-stop a forum on the revolutionary challenges the IT
community currently faces in data storage and
event that brings together players from the main layers of the management. You will have the unique opportunity to
Cloud ecosystem - the infrastructure players, the platform interact and network with an audience of military,
government, academic and private sector leaders with
providers, and those offering applications. job functions such as:
• CIO
This year, President Obama appointed the first Federal CIO • IT Manager
propelling the government into new age of computing. The • Cyber Security
• Chief Technology Officer
current economic situation brings forth new opportunities • Enterprise Architecture
for the government to spend more money on leaner yet • Architecture Integration
• Technology Services
necessary supercomputing technologies. Leading integrators • Engineers
are jumping at the opportunity to establish “clouds” of • Business Transformation
• Enterprise Transformation
partnerships in order to maximize interoperability across all
government agencies and services.
About IDGA
IDGA’s Cloud Computing for DoD & Government is your The Institute for Defense &
Government Advancement
opportunity to claim your place in the virtual world of DoD and (IDGA) is a non-partisan
federal government data storage. You will be able to meet with information-based organization
dedicated to the promotion of innovative ideas in public
top-notch innovators for your chance to tap into the emerging service and defense through live conferences and
market of cloud computing for defense and government. events. We bring together speaker panels and events
comprised of military and government professionals
while attracting delegates with decision-making power
This premier event will emphasize the following key issues: from military, government, and defense industries.
• Survivability of a cloud In addition to our live events, IDGA also offers an online
community dedicated to providing defense industry
• Technical definitions and security roles professionals with breaking news, business
opportunities, introductions, podcasts, webinars, and
• Tactical cloud computing presentations from key industry leaders. Members of
our online community are able to extend their live event
• Securing cloud based applications experience and interact with the defense industry by
leveraging the opportunity to network, share ideas, best
• and much more!
practices, and business solutions.
For more information, please visit www.idga.org.
Do not delay! Follow us on
Get the latest news on Cloud Computing for DoD and
Set standards and keep your cloud secure – Government including updates and exclusive discounts
register today! to IDGA’s related events. Follow us at
www.twitter.com/cloud4gov.
“I don’t get the chance to get too many of these events, but I feel that
this conference has been very interesting and helpful.”
- Senior Member Technical Staff, Rincon Research Corporation
2 www.CloudComputingEvent.com
3. CLOUD COMPUTING WORKSHOP DAY Cloud Computing Workshop Day
Monday, February 22, 2010
Sign up for this in-depth and interactive workshop day examining the strategies behind cloud standards and security. During this focus
day, you can expect smaller, classroom-style sessions, live applications, in-depth discussions with the class leaders and fellow attendees.
7:30am Registration & Coffee
8:00am-10:00am Obtain vital information on cloud computing standards
Coordinating Cloud Standards
As cloud computing is becoming a reality for enterprise data centers, How you will benefit:
standards are increasingly important to provide interoperability • Investigate the true opportunity that cloud computing offers
between enterprise clouds and cloud service providers. This workshop • Learn best practices to effectively use these applications
will focus on current and emerging standards that will be utilized to
enable enhanced portability and flexibility of virtualized applications in Session Leader: Doina Bein, Research Associate, Information
this emerging cloud computing paradigm. Science and Technology Division of the Applied Research
Laboratory, Pennsylvania State University
What will be covered:
• Mapping cloud use cases to standards
• Leveraging the enumerable and quantifiable benefits of the cloud
• Maintaining total control over private and sensitive data
10:15am-12:15am The Cloud’s impact on IT users
Adopting the Cloud: Privacy, Residency, and Security
Cloud computing has dramatically lowered the barriers to entry for What will be covered:
new web entrepreneurs wanting to start innovative businesses. • Learn how enterprises have adopted the cloud
However, the lack of interoperability, consistency and security • Laying the groundwork for the cloud
concerns across services keeps many businesses from adopting. There
have been several calls for standards to help make services from How you will benefit:
different cloud providers interoperable and ultimately more useful and • Discover safeguards to protect your databases
secure to enterprises. This workshop will explore the pros and cons of • Developing policies to ensure security
standards, address myths surrounding security in the cloud.
Session Leader: Joseph Gonzalez, Carnegie Mellon University
12:15pm-1:15pm Lunch for Workshop Attendees and Speakers
1:15pm-3:15pm Ensuring availability in volatile resources
Cloud Computing on Volatile Resources
Increasingly services are being deployed over large-scale What will be covered:
computational and storage infrastructures. To meet ever-increasing • Explore the endless opportunities of cloud computing
computational demands and to reduce both hardware and system • Learn best practices to effectively use these applications
administration costs, these infrastructures have begun to include
Internet resources distributed over enterprise and residential How you will benefit:
broadband networks. As these infrastructures increase in scale to • Learn key strategies for empowering agency-wide participation
hundreds of thousands to millions of resources, issues of resource • Understand how to develop applications that are cost-effectively in
availability and service reliability inevitably emerge. This workshop will scale
drive a change in software development methodology.
Session Leader: Wu-chun Feng, Associate Professor, Director,
SyNeRGy Laboratory, Virginia Tech
3:30pm-5:30pm Securing your Cloud
Secure Cloud Computing: A Researcher's Viewpoint
Due to several hard-to-resist benefits, Cloud Computing, in such current security protection tools? How could these hurdles be
forms as Storage as a Service, Software as a Service, and Platform as a overcome?
Service, has been increasingly embraced by the industry as well as
governments. However, security (e.g., data protection, availability, How you will benefit:
data loss, sense of control) tops the list of concerns with cloud • Gain a deeper understanding of the security issues associated with
computing (InformationWeek Survey). This session will discuss the cloud computing, particularly from a technical point of view
truths and misunderstandings about secure cloud computing. • Distinguish the truths from the misunderstandings about secure
cloud computing
What will be covered: • Learn the emerging R&D challenges in making cloud computing
• Does cloud computing really make enterprise IT solutions secure and trustworthy
more vulnerable?
• Securing an enterprise's clouds is more a management issue Session Leader:
or a technical issue? Dr. Peng Liu, Associate Professor, Director, Cyber Security Lab,
• What are the new technical hurdles beyond properly deploying Penn State University
3 www.CloudComputingEvent.com
4. Main Summit Day One Main Summit Day Two
Tuesday, February 23, 2010 Wednesday, February 24, 2010
7:15 Registration & Coffee 7:30 Registration & Coffee
8:05 Chairperson’s Welcome & Opening Remarks 8:05 Chairperson’s Welcome & Opening Remarks
8:15 Cloud Computing Priorities: Managing Technical 8:15 The USAF’s Position and Initiatives in Cloud Computing
Definitions and Security Roles •Strategic goals and requirements on cloud computing
Keynote
Mark Krzysko, Assistant Deputy Under Secretary of •Current USAF cloud computing projects
Defense for Business Transformation Maj Gen Stephen Gross, USAFR, Mobilization Assistant to the
Chief of Warfighting Integration and Chief Information Officer
Keynote
9:00 Requirements for Collaboration in the Cloud
• Best practices for implementing a secure on-premise and cloud 9:00 Implementing Storage-on-Demand
deployment mix •Managing infrastructure and middleware
• Crossing boundaries and taking the full benefits from Cloud •Strategies to avoid common pitfalls when implementing an
Computing SaaS solution
Patrick Dowd, Chief Architect, NSA Daud Santosa, Chief Technology Officer, National Business
Center, Department of Interior
9:45 Networking Break
9:45 Round Table Discussion: The Future of the Cloud
10:30 The Federal Cloud Computing Initiative and the Take part in facilitated roundtable discussion about successful
Progress-to-Date cloud computing applications and how your organization can
•Establishing a cloud-based collaboration environment benefit from this new era of data storage.
•Improving the government’s ability to create a transparent, Moderated by: Jeremy Geelan, Senior Vice President, SYS-
open and participatory government CON Media & Events, & Founder, Cloud Computing Journal
Peter Tseronis, PMP, Deputy Associate CIO, US Department
of Energy 10:15 Networking Break
11:15 Establishing Key Elements of the Security 11:00 Applying Various Virtualization Techniques within
Foundation the Cloud
• Enabling warfighting capabilities through the network • Understanding the realities of both virtualization and Cloud
• Realizing efficiencies while improving effectiveness
Computing security
• Ensuring interoperability across the DoD • Deal with the things that don't change and also the things that
David Honeywell, Chief, Network Managed Services do profoundly
Branch, DISA William C. Barker, Chief Cybersecurity Advisor, NIST
12:00 Lunch 11:45 Driving SOA Initiatives into Cloud
• Managing pragmatic concessions against long term vision
1:15 Securing Cloud-Based Applications • Defining cloud computing through SOA
• Exploring best practices and emerging standards in securing Dr. Scott Sarlin, Acting Director of Science & Technology,
cloud computing solutions Office of National Intelligence
• Methodologies for securing shared resources
Dr. Stephen M. Jarrett, CTO ISR/IO/IA & Cyber Security 12:30 Lunch
Code 50DE, Space & Naval Warfare Systems Center
Atlantic 1:45 Cloud Computing: Secure and Effective Use
•Technical guidance and standards
2:00 Application Hosting and Cloud Computing •Cloud architectures, security, and deployment strategies
• Integrating external cloud applications with on-premise data Peter Mell, Cloud Computing Project Lead & Senior
and processes Computer Scientist, NIST
• Reducing IT costs through cloud computing
James Tsujimoto, Office of Government Wide Policy, GSA
Doug Bourgeois, Director, National Business Center,
Department of Interior 2:30 Survivability of a Cloud
• Understanding the environmental risks of a cloud in different
2:45 Networking Break geographical locations
• Disaster recovery in the storage cloud
3:30 Open Source Infrastructure for Data Intensive Ron Ross, Computer Security Division, Information
Computing Technology Laboratory, NIST
•Understanding an open source cloud application
•Interoperability issues and emerging standards 3:15 Networking Break
Dr. Richard W. Etter, CISSP, Senior Information Assurance
Officer, Acting Director, Cyber Security & Critical 3:45 Management and Policy Challenges Related to the Cloud
Infrastructure, Office of the Chief Information Officer, • Understanding the tectonic shift in how computing is done
Department of the Navy • Embracing new paradigms in computing
• How to change the mindsets and assumptions of users, IT staff,
4:15 Cloud Computing with RACE managers, and policy makers
•Updates on program capabilities and successes Michael R. Nelson, Visiting Professor, Internet Studies,
•Opportunities for standardized computing platforms that they Communication, Culture & Technology Program,
can quickly, inexpensively and securely be set up Georgetown University
Henry Sienkiewicz, Technical Program Director, DISA
4:30 Tactical Cloud Computing
5:00 Cocktail Reception •The tactical cloud and interoperability
•Supporting the warfighter in joint, interagency, and coalition
environments
Mary Ann Malloy, PhD, Principal Information Systems
6:00 End of Day One Engineer, Data Transparency Group Leader, Department
E142 - Warfighter Architecting, The MITRE Corporation
4 www.CloudComputingEvent.com 5:15 End of Main Summit
6. IDGA
Cloud Computing
for
535 5th Avenue, 8th Floor
New York, NY 10017
DoD & Government
TM
Developing Strategies to February 22 - 24, 2010
Increase Database Storage Washington DC
& Management Efficiency Metro Area
Your customer registration code is:
When registering, please provide the code above.
Here is your chance to
meet top innovators and tap
into the emerging market of
cloud computing for
defense and government,
as well as develop strategies to
5 EASY WAYS TO REGISTER:
increase database storage 1 Web: www.CloudComputingEvent.com
and management 2 Email: info@idga.org
3 Phone: 1-800-882-8684
efficiency! 4 Fax: 646-378-6025, 24 hours a day
5 Mail: IDGA
535 5th Avenue, 8th Floor
18395.001/D/TP New York, NY 10017
Explore the latest information
presents a training conference: on current and future plans!
Cloud Computing
for
DoD & Government
TM
Developing Strategies to February 22 - 24, 2010
Increase Database Storage Washington DC
& Management Efficiency Metro Area
www.CloudComputingEvent.com