garing-cdca 4.ppt


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Internet: Worldwide Internet Access Point Capacity: One new connection, OC-3, added to the Internet in FY06 Two OC-3s upgraded to OC-12s in FY07 Capacity: Oct 2005: 6287 Mbps; Oct 2006: 6436 Mbps; Oct 2007: 7234 Mbps Peak period Internet traffic averaged 33% annual growth during the last two years Inbound to the NIPRNET is 4 times the outbound volume INBOUND: Oct 2005: 3007 Mbps Oct 2006: 4184 Mbps; Oct 2007: 5280 Mbps or 3 gigabits per second to 5 gigabits per second (33%/year increase) OUTBOUND: Oct 2005: 807 Mbps Oct 2006: 1065 Mbps; Oct 2007: 1305 Mbps (27%/year increase) CAPACITY is the total available throughput for Internet Traffic (combined Inbound and Outbound traffic) Combined Inbound and Outbound traffic cannot exceed Capacity DISA is always looking for ways to increase capacity Capacity is expensive
  • FDCE Collaborative software development and re-use Shared process with communities of interest Collaborative planning/ execution of testing There are three major components of the GIG FDCE infrastructure: Collaborative Software Development: Enables DoD-wide open source software development, distribution and information exchange by adopting the process and tools used by the Internet’s open source development community. This capability supports the shared development and reuse of software with government purpose rights or intellectual property rights assigned to the government. This FDCE service will resemble the and the services that support the open source community on the internet, but will be used to support open and community source projects within the DoD and our industrial base. In addition to supporting open source development, these tools will be offered for use within specific programs or organizations to provide an extremely cost-effective and robust capability to support their own development needs. GIG Test and Certification: Building on the NECC FDCE , Provides a tailorable system engineering process supported by automated workflow and system testing. The system certification process establishes a common, standards-based approach to help protect the GIG from potentially harmful systems while enabling the rapid evolution of our IT systems. In addition to supporting software and systems, the FDCE will provide SOA service evaluation and certification process integrated with the NCES SOA Foundation registry to enable GIG SOA governance. In addition this FDCE component enables the linkage between services, the systems used to provide them and software component that can be used to consume them, thus improving the ability of GIG community to find and reuse the software, systems, and services necessary to perform their missions. Cloud Computing: As defined by Gartner, cloud computing is a style of computing where massively scalable IT-enabled capabilities are delivered 'as a service' to external customers using Internet technologies. This leads to the industrialization of IT and will alter the way many organizations deliver business and mission services that are enabled by IT. The FDCE will not only use cloud computing to deliver its services, the FDCE will provide computing clouds for others to use in the development, testing, and delivery of their own services. Rapid Access Computing : Sharing accessible virtual resources in a secure and scalable manner “ Cloud computing” Accessibility for government personnel and industry partners Encourages standard operating environment
  • garing-cdca 4.ppt

    1. 1. Mr. John Garing Defense Information Systems Agency November 20, 2008
    2. 2. Engineering Information Assurance Acquisition Testing Operations Force Provider to the Joint Task Force – Global Network Operations Enablers Pillars Combat Support Agency Joint Warfighting Joint Technical Advocate Special Missions Command & Control Enterprise Services Computing Network
    3. 3. <ul><li>“ It is interesting to be writing these words at a time of complete dependence on the Internet – which only became generally known about 15 years ago – and wonder how we will be communicating with each other in another dozen years.” </li></ul><ul><li>“ In national or global terms, the loss of the Internet would be a huge blow from which it would be very hard to rebuild.” </li></ul><ul><ul><ul><ul><ul><li> A Vision for 2012 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>John L. Peterson, 2008 </li></ul></ul></ul></ul></ul>
    4. 4. <ul><li>“ Computing is turning into a utility, and once again the economic equations that determine the way we work and live are being rewritten.” </li></ul><ul><li>“ Thus, processing power has expanded far more rapidly than the capacity of communication networks.” </li></ul><ul><li>The Big Switch </li></ul><ul><li>Rewiring the World, From Edison to Google </li></ul><ul><li>Nicholas Carr, 2008 </li></ul>
    5. 5. <ul><li>From Wikipedia: </li></ul><ul><li>Web 2.0 : “Web 2.0 is a term describing changing trends in the use of web technology and web design that aims to enhance creativity, secure information sharing, collaboration and functionality of the web. Web 2.0 concepts have led to the development and evolution of web-based communities and its hosted services, such as social networking sites, video sharing sites, wikis, blogs, and folksonomies (form of tagging).” </li></ul>
    6. 6. Work and Live Anywhere at Any Time Demands on institutions of a highly mobile workforce Work is not a place; work is what I do
    7. 7. Exponential rise in phishing websites Web 2.0 used as threat vector Incidents increasing Malware increasing A Mission-Assured Network “ Hackers gained extensive access to unclassified White House emails when they broke into White House computer systems on multiple occasions last year, according to current and former government officials familiar with the matter. ” “ More than 10,000 web pages have been booby trapped with malware in one of the largest attacks of its kind to date.”
    8. 8. Congruent and Converging Forces…that Compete! <ul><li>If you accept… </li></ul><ul><ul><li>There is an unquenchable thirst for collaboration and sharing </li></ul></ul><ul><ul><li>We can work anywhere at any time – highly mobile workforce </li></ul></ul><ul><ul><li>You can live wherever you are – at home, at work, traveling </li></ul></ul>The enterprise never relaxes <ul><li>Then… </li></ul><ul><ul><li>How do we achieve mission assurance on the same network? </li></ul></ul><ul><ul><li>How do we ensure the network is there when we need it? </li></ul></ul><ul><ul><li>Do we take a new approach? </li></ul></ul>
    9. 9. Continuously Learning
    10. 10. Web 2.0 and Beyond Circuits Applications Client server Predictable behavior Schedules Pipes and processing Brick and mortar Bandwidth Services Platform Any time, anywhere Always on Capacity on the network Cloud
    11. 11. Initiatives <ul><li>Capacity on Demand </li></ul><ul><ul><li>Acquire a service – pay only for what we use </li></ul></ul><ul><li>Rapid Access Computing Environment (RACE) </li></ul><ul><ul><li>Sharing resources in a secure and scalable manner </li></ul></ul><ul><li>Federated Development and Certification Environment (FDCE) </li></ul><ul><ul><li>Collaborative software development, testing, certification, and re-use </li></ul></ul><ul><li>FORGE.MIL </li></ul><ul><ul><li>On-demand development and testing </li></ul></ul>
    12. 12. Enterprise Services <ul><li>Definition </li></ul><ul><ul><li>Common user </li></ul></ul><ul><ul><li>Cost to produce the service </li></ul></ul><ul><ul><li>Market demand for service (how else can users get the service) </li></ul></ul><ul><ul><li>Strategic intent of the service, that is, what behavior does the Department want and want to incentivize. </li></ul></ul><ul><li>On the horizon </li></ul><ul><ul><li>Enterprise e-mail </li></ul></ul><ul><ul><li>Identity </li></ul></ul><ul><ul><li>Single sign on </li></ul></ul><ul><ul><li>Social networking </li></ul></ul><ul><ul><li>Enterprise software execution </li></ul></ul><ul><ul><li>SaaS </li></ul></ul>
    13. 13. Command and Control <ul><li>The goal – net-enabled command and control </li></ul><ul><ul><li>Interoperable framework </li></ul></ul><ul><ul><li>Enterprise service based </li></ul></ul><ul><ul><li>Reusable software </li></ul></ul><ul><ul><li>Collaboratively built </li></ul></ul><ul><ul><li>Effects composed by the user </li></ul></ul><ul><li>The future </li></ul><ul><ul><li>NECC program is challenging </li></ul></ul><ul><ul><li>GCCS family of systems represents a large investment over time </li></ul></ul>
    14. 14. Our Approach <ul><li>We want to achieve… </li></ul><ul><ul><li>- Mobility </li></ul></ul><ul><ul><li>- Agility </li></ul></ul><ul><ul><li>- Availability </li></ul></ul><ul><ul><li>- Elasticity </li></ul></ul><ul><ul><li>- Speed </li></ul></ul><ul><li>With… </li></ul><ul><ul><li>- Relationships </li></ul></ul><ul><ul><li>- Partnerships </li></ul></ul><ul><ul><li>- Non-traditional sources </li></ul></ul><ul><li>Through… </li></ul><ul><ul><li>- Innovation </li></ul></ul><ul><ul><li>- Ingenuity </li></ul></ul><ul><li>Using smart sourcing… </li></ul><ul><ul><li>- Use of existing vehicles </li></ul></ul><ul><ul><li>- Managed Services </li></ul></ul><ul><ul><li>- Right mix of time and materials and performance-based contracts </li></ul></ul><ul><ul><li>- Right mix of resources </li></ul></ul>
    15. 15. The DISA Supply Chain Network users Service consumers Special needs Increasingly mobile and collaborative Carriers Integrators Technology companies Service providers Small businesses Innovators Services and Agencies Varied and changing Create value and balance and speed The value of what is compared to the value of what can be Resources Policy Technology Law DISA and Our Partners Services Capabilities Reachback Sustaining Base
    16. 16. What we do for them Our duty