The document discusses cloud computing and its potential benefits for the Department of Defense (DoD). It provides various definitions of cloud computing from different organizations and outlines some realities of adopting cloud computing, including that it is a disruptive technology that will require planning, pilots, and lessons learned. The document also discusses how moving the desktop into the cloud could pay huge returns through cost savings, agility, and performance.
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...CloudOps Summit
CloudOps Summit 2012, Frankfurt, 20.9.2012
Track 2 - Build and Run by Francesco Incorvaia, fluid Operations AG (@fluidops)
http://cloudops.de/sprecher/#francescoincorvaia
Find the video of this talk at http://youtu.be/Eb0HO0hi_jc
This is Lenovo's presentation at FETC 2013.
The mega-trends of bring-your-own-device (BYOD) and the consumerization of IT go directly against the desire to limit security exposure and keep TCO low. In this session, Rich discusses approaches to meeting both needs plus drill down on how and where cloud computing can ultimately, resolve these seemingly mutually exclusive goals and streamline the enablement of BYOD.
Presenter: Rich Cheston, Chief Technical Architect, Distinguished Engineer and Master Inventor, Lenovo
www.lenovo.com/eduevents
Jambey Clinkscales gave presentation on "The Value of Cloud in the Business Technology Ecosystem" at the 2011 BDPA Technology Conference in Chicago.
Jambey shared his thoughts on the workshop during BDPA iRadio Show interview held on August 28, 2011 --> http://www.blogtalkradio.com/bdpa/2011/08/29/bdpa-iradio-workshop-presenters
Workshop Presenter:
Jambey Clinkscales
Capabilites and Program Manager, HP Enterprise Services
Topic: The Value of the Cloud in the Business Technology Ecology
BDPA New York Chapter
[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the SolutionJeff Hung
Elaster CAP is a Platform-as-a-Service (PaaS) solution that enable any developer or service provider to host their own PaaS cloud. So they can focus on application logic and Elaster CAP will help to reduce operation cost. Elaster CAP supports Java Web Applications and Hadoop Map/Reduce Applications. It also provides many cloud-based infrastructures to support your Software-as-a-Service applications, such as Relational Database, Index/Search service, and Big-data Storage with S3 compatible adapter. Elaster CAP is designed to be elastic that, depends on the use cases, the cloud can be as small as one node, or as big as more than hundreds of nodes. The nodes in Elaster CAP can run on physical machines in your data center, or virtual machines hosted by Infrastructure-as-a-Service (IaaS) providers such as EC2 and TCloud Elaster.
In this talk, We'd like to describe the technology and strategy we took when building Elaster CAP. And share the pitfalls and gotchas that we experienced during the journey.
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...CloudOps Summit
CloudOps Summit 2012, Frankfurt, 20.9.2012
Track 2 - Build and Run by Francesco Incorvaia, fluid Operations AG (@fluidops)
http://cloudops.de/sprecher/#francescoincorvaia
Find the video of this talk at http://youtu.be/Eb0HO0hi_jc
This is Lenovo's presentation at FETC 2013.
The mega-trends of bring-your-own-device (BYOD) and the consumerization of IT go directly against the desire to limit security exposure and keep TCO low. In this session, Rich discusses approaches to meeting both needs plus drill down on how and where cloud computing can ultimately, resolve these seemingly mutually exclusive goals and streamline the enablement of BYOD.
Presenter: Rich Cheston, Chief Technical Architect, Distinguished Engineer and Master Inventor, Lenovo
www.lenovo.com/eduevents
Jambey Clinkscales gave presentation on "The Value of Cloud in the Business Technology Ecosystem" at the 2011 BDPA Technology Conference in Chicago.
Jambey shared his thoughts on the workshop during BDPA iRadio Show interview held on August 28, 2011 --> http://www.blogtalkradio.com/bdpa/2011/08/29/bdpa-iradio-workshop-presenters
Workshop Presenter:
Jambey Clinkscales
Capabilites and Program Manager, HP Enterprise Services
Topic: The Value of the Cloud in the Business Technology Ecology
BDPA New York Chapter
[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the SolutionJeff Hung
Elaster CAP is a Platform-as-a-Service (PaaS) solution that enable any developer or service provider to host their own PaaS cloud. So they can focus on application logic and Elaster CAP will help to reduce operation cost. Elaster CAP supports Java Web Applications and Hadoop Map/Reduce Applications. It also provides many cloud-based infrastructures to support your Software-as-a-Service applications, such as Relational Database, Index/Search service, and Big-data Storage with S3 compatible adapter. Elaster CAP is designed to be elastic that, depends on the use cases, the cloud can be as small as one node, or as big as more than hundreds of nodes. The nodes in Elaster CAP can run on physical machines in your data center, or virtual machines hosted by Infrastructure-as-a-Service (IaaS) providers such as EC2 and TCloud Elaster.
In this talk, We'd like to describe the technology and strategy we took when building Elaster CAP. And share the pitfalls and gotchas that we experienced during the journey.
Cloud-based systems have brought a new, scalable application
delivery service model to the market. They can help clients
save both capital and operational costs, and further shift capital
expenses (CAPEX) to operational expenses (OPEX) while
providing increased flexibility for their organizations. However,
a key aspect of any type of Cloud deployment is reliable service
delivery, on which ready access to the digital information (data)
in the Cloud is foundational requirement.
This is PPT created on cloud computing. We acknowledge the contribution from following: R. Raja and V. Verma, Faculties at IIIT Hyderabad; ibm.com; wikipedia and other anonymous persons who contributed throught their uploaded images etc.
Ankit & Group
FMS Delhi
2009-11
Presentation on basics of cloud computing models, current status and future use in healthcare environments, differences between traditional outsourcing contracting and cloud contracting, and discussion of e-discovery issues created by cloud environments.
Cloud computing -- a technology that “enables on-demand utilization of a shared, infinite amount of compute resources or computing power via the Internet” -- is fast becoming mainstream.
“Cost savings, reduced time to market, and rapid ROI -- these are three key factors that IT and business executives alike cite when asked about the value of cloud computing,” says Winston Damarillo, chief executive officer for G2iX, in reference to the results of the discussions among CIOs and CTOs of global enterprises located in Manila and Cebu.
VMware Enterprise Management – The Vision cfArrow ECS UK
VMware Enterprise Management – The Vision
A steer on the vision for the new Enterprise Management solution suites – the biggest management launch in VMware history.
Colin Fernandes, Global Technical Marketing Manager, VMware
UP2011 - Integrate the enterprise with the cloudWolfgang Schmidt
Hybrid cloud connectivity capabilities are a key enabler of the near and long term usage of cloud services. We are delighted that our proposal "Hybrid Cloud Connectivity - Integrate the Enterprise with the Cloud" has been selected by the conference review committee, for inclusion in the Virtual agenda of second annual UP2011 Conference on December 08, 2011 via Webex.
But because today is a special day - I started with a famous quote by John Lennon:
„Life is what happens to you - while you're busy making other plans.”
I remember todays day before 31 years when I was 12 years old. I was in school and someone told me that John Lennon died that day. Sad day. That’s why today is a special day.
„Life is what happens to you - while you're busy making other plans.”
Why do I mention this? Because Cloud happens to us in these days to our "IT life" and a lot of people want to wait to use the new capabilities till there is standardized interoperability and integration.
Don't wait - start today - in this presentation I show you how!
Happy to talk about the details :-)
Cloud-based systems have brought a new, scalable application
delivery service model to the market. They can help clients
save both capital and operational costs, and further shift capital
expenses (CAPEX) to operational expenses (OPEX) while
providing increased flexibility for their organizations. However,
a key aspect of any type of Cloud deployment is reliable service
delivery, on which ready access to the digital information (data)
in the Cloud is foundational requirement.
This is PPT created on cloud computing. We acknowledge the contribution from following: R. Raja and V. Verma, Faculties at IIIT Hyderabad; ibm.com; wikipedia and other anonymous persons who contributed throught their uploaded images etc.
Ankit & Group
FMS Delhi
2009-11
Presentation on basics of cloud computing models, current status and future use in healthcare environments, differences between traditional outsourcing contracting and cloud contracting, and discussion of e-discovery issues created by cloud environments.
Cloud computing -- a technology that “enables on-demand utilization of a shared, infinite amount of compute resources or computing power via the Internet” -- is fast becoming mainstream.
“Cost savings, reduced time to market, and rapid ROI -- these are three key factors that IT and business executives alike cite when asked about the value of cloud computing,” says Winston Damarillo, chief executive officer for G2iX, in reference to the results of the discussions among CIOs and CTOs of global enterprises located in Manila and Cebu.
VMware Enterprise Management – The Vision cfArrow ECS UK
VMware Enterprise Management – The Vision
A steer on the vision for the new Enterprise Management solution suites – the biggest management launch in VMware history.
Colin Fernandes, Global Technical Marketing Manager, VMware
UP2011 - Integrate the enterprise with the cloudWolfgang Schmidt
Hybrid cloud connectivity capabilities are a key enabler of the near and long term usage of cloud services. We are delighted that our proposal "Hybrid Cloud Connectivity - Integrate the Enterprise with the Cloud" has been selected by the conference review committee, for inclusion in the Virtual agenda of second annual UP2011 Conference on December 08, 2011 via Webex.
But because today is a special day - I started with a famous quote by John Lennon:
„Life is what happens to you - while you're busy making other plans.”
I remember todays day before 31 years when I was 12 years old. I was in school and someone told me that John Lennon died that day. Sad day. That’s why today is a special day.
„Life is what happens to you - while you're busy making other plans.”
Why do I mention this? Because Cloud happens to us in these days to our "IT life" and a lot of people want to wait to use the new capabilities till there is standardized interoperability and integration.
Don't wait - start today - in this presentation I show you how!
Happy to talk about the details :-)
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
LTC Chris Wade, USA
The Office Chief of Cyber will provide a Cyber Personnel Overview focusing on the military occupational specialties (MOS) and areas of concentration (AOC) that enable Cyber Defensive and Offensive Operations.
Presented at MPLS 2010 Oct 24-27 Washington D.C.
Monique Morrow, Cisco Distinguished Consulting Engineer, discussed the role of the network in developing as a base for cloud computing in developing XaaS models across a private backbone vs offering Cloud-based services over the Internet.
The presenter further presented the potential evolution of Cloud Computing in the form of Private, Hybrid and Inter-Cloud.
Service Level Management and Security are also highlighted themes in this presentation.
An overview of the various standards organizations and forums that may be specific to cloud computing and emerging inter-cloud was also provided
Discussion and takeaway - the value of these models to your business.
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...CloudOps Summit
CloudOps Summit 2012, Frankfurt, 20.9.2012 Track 2 - Build and Run
by Nigel Sanctuary, VP Propositions at Kognitio (www.kognitio.com)
http://cloudops.de/sprecher/#nigelsanctuary
Find the video of this talk at http://youtu.be/wQrHQNOMlKc
The Cloud is a term with a long history in telephony, which has in the past decade, been adopted as a metaphor for internet based services, with a common depiction in network diagrams as a cloud outline.
In this presentation, the Eclipse plugins from Amazon (announced at EclipseCon 2009) will be compared with the tooling for Microsoft Azure (announced at Eclipse Summit Europe 2009). Additionally, the features of the g-Eclipse project will be presented. g-Eclipse 1.0 was released in December 2009 as an Eclipse project for Grid and Cloud computing within the Eclipse community. g-Eclipse is a framework that allows users and developers to access Computing Grids and Cloud Computing resources in a unified way.
This benchmark is the result of the collaboration between Burstorm and Rice University and uses a high degree of automation. The scope of the first benchmark is seven suppliers across three continents with a total of 96 different instance types. The benchmark was executed every day, for at least 15 days. The results are normalized to a monthly pricing model to establish the price-performance metrics.
Cloud Computing is an information technology gold rush. Everything from social media and smart phones to streaming video and additive games come from the cloud. This revolution has also driven many to wonder how they can retool themselves to take advantage of this massive shift. Many in IT see the technology as an opportunity to accelerate their careers but in their attempt to navigate their cloud computing future, the question of what type of training, vendor-neutral or vendor-specific, is right for them
The Federal government today is in the midst of a revolution. The revolution is challenging the norms of government by introducing new ways of serving the people. New models for creating services and delivering information; new policies and procedures that are redefining federal acquisition and what it means to be a federal system integrator. This revolution also lacks the physical and tangible artifacts of the past. Its ephemeral nature, global expanse and economic impact all combine in a tidal wave of change. This revolution is called cloud computing.
Since announcing its “Cloud First” policy in 2010, the Federal government has correctly identified cloud computing as a way to reduce costs and improve the use of existing assets, and has accordingly prioritized its adoption. It has also taken judicious steps to protect Federal networks from nefarious cyber-attacks and promote the dissemination of best practices for cybersecurity. The Federal government has also embraced mobility as a means to conduct work from any location. But until now, the implementation of these initiatives has been fragmented and lacked coordination across Federal agencies. This paper offers a framework for integrating these programs in a way that enables the Federal government to realize the economic, technological, and mission-effectiveness benefits of cloud services while simultaneously meeting current Federal cybersecurity
requirements. It advocates shifting from a compliance-based cybersecurity paradigm to
one that is risk-based and focusing on how to most effectively secure their implementation of cloud services.
GovCloud Network, LLC helps its clients develop and execute mission and business strategies to leverage the parallel and global nature of cloud-based services. We employ our technology, strategy, digital publishing and social media expertise across three lines of business- Business Strategy & Design, Digital Publishing & Social Media and Education.
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
When the government purchases products or services with inadequate in-built “cybersecurity,” the risks created persist throughout the lifespan of the item purchased. The lasting effect of inadequate cybersecurity in acquired items is part of what makes acquisition reform so important to achieving cybersecurity and resiliency.
Currently, government and contractors use varied and nonstandard practices, which make it difficult to consistently manage and measure acquisition cyber risks across different organizations.
Meanwhile, due to the growing sophistication and complexity of ICT and the global ICT supply chains, federal agency information systems are increasingly at risk of compromise, and agencies need guidance to help manage ICT supply chain risks
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
Assured C2 sets conditions for Navy commanders to maintain the IT- enabled ability to exercise C2 authorities across the sea, land, air, space, and cyberspace domains in heavily contested or denied operating conditions.
Navy must continue to clearly define and manage capability-based Assured C2 requirements and resources, and align those requirements and resources with JIE/IC ITE through the IDEA
The primary beneficiaries of the effort to deliver Assured C2 capabilities are the requirements stakeholders: USFF, USPACFLT, and USFLTCYBERCOM subordinate commanders who execute Navy’s warfighting mission in all domains.
Agile Cloud Conference 2 Introduction - John BrennanGovCloud Network
Develop and open and inclusive cloud service brokerage environment that provides the Government the capability for rapid acquisition of proven innovative technologies on a fee for service basis
To the maximum extent possible leverage what already exits versus custom development to include incorporation of industry standards and a consistent implementation environment
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
BCL is tailored for the rapid delivery of enterprise business capability. It combines multiple, disjointed oversight processes into a single process. It recognizes that technology rapidly evolves and changes, and consequently, BCL mandates rapid capability delivery – within
eighteen months or less of program initiation. BCL is outcome-based, and modeled on best commercial practices. The process allows for the fact that not all solutions are purely technical. The entire DOTMLPF (Doctrine, Organization, Training, Materiel, Leadership
and education, Personnel and Facilities) spectrum of potential solutions are considered.
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
Cloud computing is driving the business of information technology today.
“A recent Gartner survey on the future of IT services found that only 38 percent of all organizations surveyed indicate cloud services use today. However, 80 percent of organizations said that they intend to use cloud services in some form within 12 months, including 55 percent of the organizations not doing so today.“ (Gartner, Inc, 2013)
As companies rush to adopt cloud, however, information technology (IT) security sometimes seems to be an afterthought.
The goal of this paper is to provide a survey of the current state of IT security within public cloud infrastructure-as-a-service providers. After first providing a cloud computing overview, the paper will focus on the infrastructure-as-a-service (IaaS) deployment model, the typical home of IaaS intrusion detection components. The Gartner Cloud Use Case Framework will then be introduced as it will also serve as the framework for this survey. An in-depth review of public cloud intrusion detection studies, options and expert observations will then follow. The paper will then offer the authors conclusions and cloud computing IDS recommendations for enterprises considering a move to the cloud.
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
Technology adoption is always a critical concern in organizations (private and public). South African government experienced this encounter when adopted Open Source Software (OSS) with the objective to reduce ICT services costs among others. The implementation of OSS in SA government has faced several challenges such as user resistance, human factor, support and funding. As a result of these challenges cost reduction has not been fully achieved. Cost reduction issue ultimately affects implementation of other government programmes such as those who yields job creation, better education, and improving health, etc. The potential alternative to address the same objective as aimed by OSS is Cloud Computing adoption. Cloud Computing promise to offer the SA government more advantages OSS. This study explore the feasibility of Cloud Computing adoption as an alternative to enable cost reduction, effectiveness and efficient of IT services in SA government as was aimed by OSS initiative.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
When stars align: studies in data quality, knowledge graphs, and machine lear...
20090921 Risacher To Ncoic Cloud Storefront
1. Cloud Computing and the DoD CIO Storefront
Dan Risacher
Enterprise Services & Integration
Office of the DoD CIO
2009-09-21
1
2. What is Cloud Computing?
Headline: “The Internet Industry Is on a Cloud –
Whatever That May Mean”
- Wall Street Journal, A1, March 26, 2009
Headline: “Federal CIO Scrutinizes Spending And
Eyes Cloud Computing”
- Information Week, March 14, 2009
“I had a customer tell me there’s a rainstorm coming, that there will
be all these clouds and none are going to talk to each other.”
- Susan Adams, Chief Technology Officer,
Microsoft Federal Civilian Practice
Hype Or Fact? Yes 2
3. What is Cloud Computing?
Cloud Computing –
the 2:10 technology……
Two Years of Hyper-Buzz
Ten Years of Adoption
- Rob Carter, CIO FedEx, DISA Customer Partnership Conference
We‟re still in the first year of Hyper-
Buzz…. Watching CC mature…
3
4. What is Cloud Computing?
IBM: “A cloud is an IT service delivered to users that has:
A user interface that makes the infrastructure underlying the
service transparent to the user
Reduced incremental management costs when additional IT
resources are added
Services oriented management architecture
Massive Scalability
Forrester: “An abstracted, fabric-based infrastructure that
enables dynamic movement, growth, and protection of
services that is billed like a utility. … cloud computing is
looking like a classic disruptive technology”
Lots of different Cloud Computing definitions….
4
5. What is Cloud Computing?
Gartner: “Cloud computing is a style of computing
where massively scalable IT-related capabilities are
provided „as a service‟ across the Internet to multiple
external customers”
The 451 Group: “The cloud is IT, presented as a
service to the user, delivered by virtualized resources
that are independent of location.”
National Institute of Standards and Technology (NIST):
“Cloud computing is still an evolving paradigm. Its
definitions, use cases, underlying technologies,
issues, risks, and benefits will be refined in a spirited
debate by the public and private sectors. These
definitions, attributes, and characteristics will evolve
and change over time. “
5
6. What is Cloud Computing?
Draft NIST Working Definition of Cloud Computing v15:
http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-
v15.doc
Under the direction of the Federal Cloud Computing WG
(Chaired by Ms. Casey Coleman (GSA CIO), directed by Mr.
Vivek Kundra (Federal CIO).
What we can agree on is that Clouds (Cloud
Computing) bring the promise of
Enterprise Power to Users as Services
The Service-Oriented Architecture / Enterprise is a key enabler
to achieving a Stateless Cloud Computing environment.
6
7. Clouds Services and Related IT Capabilities
Dimensional Indexing
Parallel Programming
Data.Gov
Distributed Computing
Distributed File Systems
Client Device
Virtualization
Process Orchestration Data-as-a-Service
Software Appliances
Messaging Services Software-as-a-Service
Rich Internet
SOA Application Interfaces
Infrastructure-as-a-Service
Simple Messaging Service
Data Center
Consolidation ITIL-based
Technologies
Commodity Processing
Grid Computing
Infrastructure
Virtualization Utility Computing
Leveraging Flexibility and Demand-Focused
IT Capabilities 7
8. Clouds - What‟s the Business Case?
Provisioning and Placement
Software Configuration
100X
Dedicated Mission Capabilities
Relative Per Problem Cost
Data Collection and Startup
…
Redundant Facilities and Capacity
Infrastructure-as-a-Service (IaaS) Cloud(s)
(e.g., Amazon WS, RACE)
10X
Redundant Licensing and Operations
Data Search and Fusion
Software-as-a-Service (SaaS) Cloud(s) (e.g., Salesforce.com,
DKO, Intelink, A-Space)
…
Extended Capacity Utilization
Data-as-a-Service (DaaS) Cloud(s) (e.g., Google Analytics, DNI)
1X
Core Mission Execution Time
… … …
Seconds Minutes Hours Days
Problem Agility
Cost-Effective Agile Response to Uncertainty 9
9. Amazon Web Services (AWS)
(Five Years of Planning)
Establishing an On-demand Web Scale IT Service is tightly
coupled to extended bandwidth services
10
10. Amazon Web Services (AWS)
http://animoto.com/
Realizing On-demand IT on a Web Scale
11
11. Cloud Computing Realities
It is a Disruptive Technology – we need to treat it as such…
A new technology, that radically transforms markets, creates wholly
new markets or destroys existing markets for other technologies..
Not mature – needs 2+ years – This is the time to plan
DoD Acquisition “as a process” could be a significant barrier
(CC is not a weapon system).
Requires planning, pilots, and lessons learn to build a new
(fundamental) understanding of how DoD will migrate legacy
applications and associated data to “Services” hosted in the
Cloud.
Requires adoption of a DoD Platform (as a Service) that delivers
Brutal Standardization in the form of standards, processes,
toolkits, Core Enterprise Services (e.g., Single Sign On, Search,
Publish, Collaboration, etc), and Desktop Virtualization.
12
12. Cloud Computing Realities
Stateless Cloud Computing Technology?
DoD CIO views that as collapsing the desktop (which stores /
manages desktop state resulting from data, applications,
network profile, etc) into the Cloud.
Moving the desktop into the Cloud will pay
HUGE returns – cost savings, agility,
performance, etc, etc…
Offers the potential of saving billons in “provisioning costs” per
year
13
13. Cloud Opportunities
Infrastructure as a Service
Public Clouds Fed CIO / GSA
Private Clouds DISA
Deployable Clouds Navy (CANES), Army (GNEC)
Other
Cross-cloud solutions ?
Platform as a Service ?
Software as a Service
Productivity apps DoD CIO, Army
Desktop Virtualization DARPA? DIA?
Web app framework DoD CIO Storefront
14
14. DOD CIO Storefront Vision
Create single NIPRNET access point for DOD CIO to share its
information and knowledge with authorized consumers in the
DOD Enterprise
– Net-centric implementation guidance and tools
– Host/employ emerging Web 2.0 tools
– Create a DoD CIO widget development kit, followed by prototyping and C&A
process (with Forge.Mil) supporting a DoD CIO “Apps Store” (similar to iTunes)
– (n.) widget: modular, loosely-coupled web application designed to run on customizable
net-centric framework, conforming to established guidelines for configuration and
enterprise security
– similar to Google Gadget
Become the DOD Enterprise Innovator and Exemplar 15
15
16. Goals
1. “The coolest .mil website ever”
Communications channel so compelling
users will keep coming back
As easy as iGoogle; as intuitive as Facebook
2. The DoD Net-Centric platform (Widget Framework & “Apps Store”)
Certified and accredited framework for future web-applications
Enabling creativity and empowering developers
3. Real-world pathfinder for future enterprise applications
Provide “hands on” experience for providing net-centric solutions
4. Influence policy through real-world experience with Net-Centric
capabilities
5. Computing environment intended for multiple security domains
Initial efforts on NIPRnet
17
17. The Storefront Essentials
Identity management / Single sign-on
The web framework
And developer guidance
First round of widgets
The marketplace
18
18. Guiding Principles
Cloud Computing Environment
Utilize Open Source/GOTS software
Leverage Partners:
DISA
RACE-in-production to provide a robust, elastic, scalable environment
forge.mil to provide a common repository to support DOD development
ICES –
Intelink Publish & Search to provide means for making information available
and discoverable
Stand up an Apps Store
Galvanize third-party developers across the DoD Enterprise
19
19. DOD CIO Storefront POA&M
Spiral 0: 30 days
– Develop storefront system requirements, generate use cases, investigate
technology options
– Identify potential “integration” partners/components
– Identify Cloud source
– Prioritize efforts for Spiral 1
Spiral 1: 90 days
– Stand up initial Storefront prototype in a private cloud computing environment
– Generate net-centric implementation content, begin to organize content within
Storefront
– Develop initial core portlets (i.e., SSO) and services
– Prioritize efforts for Spiral 2
Spiral 2+: 90 days
– TBD
20
20. Proposed IdM/SSO
Framework Architecture
CRL/
OCSP
DoD CAC PKI Storefront IdM/SSO SAML Storefront
Users Framework Services and
DoD Non-CAC OpenID/ Widgets
(OpenSSO)
Affiliates User ID/ OAuth External
Federal PKI Password Liberty Service/Widget
- Session Management
(e.g., IC, DHS) - Sponsored Account Alliance Providers
Other Mission Other Administration Other External
Partners Auth. - Coarse-Grained ABAC Fed. IdM/SSO
Frameworks
Storefront Identity Management
Attribute Retrieval Process
Automated retrieval of identity attributes
from authoritative Identity Management
sources
DMDC
Others
(DoD/CAC Users)
Identity Management Sources 21
21. Storefront Partnerships
Knowledge
Management
Storefront
Widget
Storefront
Framework
Content
ES&I Training Management
System
Fannie Callands
Social
Networking
Customized Service
Widgets
Identity
Management/
Single Sign-On UCore
Cloud Storefront
Computing Services
Clay Robinson
ES&I ES&I ICAM (DoD CIO)
ESSF/AANAC
DISA RACE Dan Green ICES
Marty Costellic Paul Grant (SPAWAR) (Publish
Alfred Rivera and Search)
DISA Other
PEO-GES
Mike Todd
Becky Harris
Fannie
Callands
22
22