The document discusses cloud computing services provided by the Defense Information Systems Agency (DISA). It summarizes DISA's cloud computing portfolio including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Data as a Service. It highlights DISA's Rapid Access Computing Environment (RACE) which provides automated 24-hour provisioning of development, test, and production environments to support faster application development and deployment with reduced costs and risks. RACE offerings are expanding to include SIPRNet deployment and further accreditation automation.
Investments in information technology have a direct and fundamental impact on the success of an organization's revenue-generating activities. As a consequence, the business' financial leadership has a crucial stake in understanding and influencing IT decisions.
The presentation content focuses on a three-stage approach geared toward building profit models around well-planned cloud implementations. Discover how CFOs are in a unique position to lead this effort and make the IT organization aware of its impact on revenue and profitability
Making of a Successful Cloud Business:
Current Status & Future Requirements
Rajarshi Bhose and Sumit Kumar Bose
Infosys Technologies Limited
Delivered as part of Cloud symposium, at ACM Bangalore COmpute 2009.
Investments in information technology have a direct and fundamental impact on the success of an organization's revenue-generating activities. As a consequence, the business' financial leadership has a crucial stake in understanding and influencing IT decisions.
The presentation content focuses on a three-stage approach geared toward building profit models around well-planned cloud implementations. Discover how CFOs are in a unique position to lead this effort and make the IT organization aware of its impact on revenue and profitability
Making of a Successful Cloud Business:
Current Status & Future Requirements
Rajarshi Bhose and Sumit Kumar Bose
Infosys Technologies Limited
Delivered as part of Cloud symposium, at ACM Bangalore COmpute 2009.
The Enterprise Cloud: Immediate. Urgent. Inevitable.Peter Coffee
Peter Coffee presentation to 2010 Spring Conference of Colorado Government Association of IT on cloud computing status and prospects for application development, collaboration and cloud/legacy integration
Having the Cloud Conversation: Why the Business Architect Should CarePeter Coffee
Peter Coffee presentation at The Open Group in Seattle, February 2010, on business incentives and handling of business concerns surrounding cloud computing
This is a presentation made by Mr. Eng Chin Kooi who is an executive for WebSphere conectivity and integration. Mr, Eng Chin Kooi's presented on the 12th of June in Bangalore, part of Impact India 2012
Converged Infrastructure as a Go Forward StrategyJames Charter
Converged Infrastructure as the Go Forward Strategy. Overview of CI versus traditional architecture of compute, storage, networking and the benefits of adopting CI. Presented at VMware Virtualization Forum December 2010, February 2011.
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
This session will help you understand what cloud security is and how to implement it in your enterprise. It will discuss the technical aspects of cloud security and how we can help you secure the cloud while ensuring sensitive information always remains behind the firewall.
An introduction to Citrix CloudPlatform (powered by Apache CloudStack), Citri...ShapeBlue
During this session, Giles Sirett Managing Consultant of ShapeBlue will look at the USE-CASE’s for CloudPlatform, the different versions of the technology available and the benefits it brings to service providers and enterprises alike.
Using his real world project experience, Giles will openly discuss competing technologies and where Citrix CloudPlatform sits in the currently Cloud eco-system. He will also look at the benefits to be gained from Citrix CloudPortal and Citrix CloudBridge.
This is Lenovo's presentation at FETC 2013.
The mega-trends of bring-your-own-device (BYOD) and the consumerization of IT go directly against the desire to limit security exposure and keep TCO low. In this session, Rich discusses approaches to meeting both needs plus drill down on how and where cloud computing can ultimately, resolve these seemingly mutually exclusive goals and streamline the enablement of BYOD.
Presenter: Rich Cheston, Chief Technical Architect, Distinguished Engineer and Master Inventor, Lenovo
www.lenovo.com/eduevents
Cloud computing is more than an opportunity to lower the costs of IT as it has been; it's a chance to re-envision IT as fundamentally more connected, more immediate, and more responsive to the needs of tomorrow's competitive environment.
The Enterprise Cloud: Immediate. Urgent. Inevitable.Peter Coffee
Peter Coffee presentation to 2010 Spring Conference of Colorado Government Association of IT on cloud computing status and prospects for application development, collaboration and cloud/legacy integration
Having the Cloud Conversation: Why the Business Architect Should CarePeter Coffee
Peter Coffee presentation at The Open Group in Seattle, February 2010, on business incentives and handling of business concerns surrounding cloud computing
This is a presentation made by Mr. Eng Chin Kooi who is an executive for WebSphere conectivity and integration. Mr, Eng Chin Kooi's presented on the 12th of June in Bangalore, part of Impact India 2012
Converged Infrastructure as a Go Forward StrategyJames Charter
Converged Infrastructure as the Go Forward Strategy. Overview of CI versus traditional architecture of compute, storage, networking and the benefits of adopting CI. Presented at VMware Virtualization Forum December 2010, February 2011.
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
This session will help you understand what cloud security is and how to implement it in your enterprise. It will discuss the technical aspects of cloud security and how we can help you secure the cloud while ensuring sensitive information always remains behind the firewall.
An introduction to Citrix CloudPlatform (powered by Apache CloudStack), Citri...ShapeBlue
During this session, Giles Sirett Managing Consultant of ShapeBlue will look at the USE-CASE’s for CloudPlatform, the different versions of the technology available and the benefits it brings to service providers and enterprises alike.
Using his real world project experience, Giles will openly discuss competing technologies and where Citrix CloudPlatform sits in the currently Cloud eco-system. He will also look at the benefits to be gained from Citrix CloudPortal and Citrix CloudBridge.
This is Lenovo's presentation at FETC 2013.
The mega-trends of bring-your-own-device (BYOD) and the consumerization of IT go directly against the desire to limit security exposure and keep TCO low. In this session, Rich discusses approaches to meeting both needs plus drill down on how and where cloud computing can ultimately, resolve these seemingly mutually exclusive goals and streamline the enablement of BYOD.
Presenter: Rich Cheston, Chief Technical Architect, Distinguished Engineer and Master Inventor, Lenovo
www.lenovo.com/eduevents
Cloud computing is more than an opportunity to lower the costs of IT as it has been; it's a chance to re-envision IT as fundamentally more connected, more immediate, and more responsive to the needs of tomorrow's competitive environment.
Internap’s John Freimuth and Steve LeClair of VMware discuss different paths businesses take toward cloud adoption, how to evolve your own cloud strategy and key considerations for choosing a provider to meet your virtualization goals.
Overview of SaaS and online services and the business reasons why organisations should be considering these. Delivered by Ben Kepes at Intergen's ON seminar series in May 2010.
It has always been a challenge to explain and convince top management including the Chief Financial Officers to embark into Cloud Computing. Predominantly because many still unclear or not so very sure what is cloud computing. Is it managed hosting, co-location or managed services? While technology providers and vendors continue to confuse management technology jargon, the need to embark into cloud computing seems inevitable...just like any others before such as the need to have emails, websites, online transactions, web based applications etc.
This presentation provides layman's, easy to understand meaning of cloud computing, why is it important for management,especially the CFO to seriously consider embarking into and some statistics and trend of how the world will move toward cloud.
Storage Management and High Availability 6.0 LaunchSymantec
Symantec announced version 6.0 of the company’s storage management and high availability products. With this release, Symantec enables IT organizations to build resilient private clouds by transforming their existing infrastructure. Organizations can manage entire business services end-to-end with built in resiliency, even if the business service is run across multiple virtualization technologies, operating systems, and storage platforms. This release spans multiple products in Symantec’s portfolio including its flagship Veritas Storage Foundation 6.0, Veritas Cluster Server 6.0, and Veritas Operations Manager 4.1, all tightly integrated to help IT organizations move confidently to a private cloud architecture.
A presentation on how enterprises can adopt Cloud Computing. Starting with a brief overview of Cloud Computing, this presentation provides Cloud services that enterprises can adopt saving costs and providing the much sought after Agility. The presentation also talks about a customer case study that I worked with. It provides insights into how an airline customer utilized Cloud Computing to drive more sales and reduce costs during their sales promotion cycles.
Internap’s Adam Weissmuller and Michael Carman of VMware discuss different paths businesses take toward cloud adoption, how to evolve your own cloud strategy and key considerations for choosing a pro
Similar to Disa CSD Cloud Brief Sept 2009 Hjs (20)
This benchmark is the result of the collaboration between Burstorm and Rice University and uses a high degree of automation. The scope of the first benchmark is seven suppliers across three continents with a total of 96 different instance types. The benchmark was executed every day, for at least 15 days. The results are normalized to a monthly pricing model to establish the price-performance metrics.
Cloud Computing is an information technology gold rush. Everything from social media and smart phones to streaming video and additive games come from the cloud. This revolution has also driven many to wonder how they can retool themselves to take advantage of this massive shift. Many in IT see the technology as an opportunity to accelerate their careers but in their attempt to navigate their cloud computing future, the question of what type of training, vendor-neutral or vendor-specific, is right for them
The Federal government today is in the midst of a revolution. The revolution is challenging the norms of government by introducing new ways of serving the people. New models for creating services and delivering information; new policies and procedures that are redefining federal acquisition and what it means to be a federal system integrator. This revolution also lacks the physical and tangible artifacts of the past. Its ephemeral nature, global expanse and economic impact all combine in a tidal wave of change. This revolution is called cloud computing.
Since announcing its “Cloud First” policy in 2010, the Federal government has correctly identified cloud computing as a way to reduce costs and improve the use of existing assets, and has accordingly prioritized its adoption. It has also taken judicious steps to protect Federal networks from nefarious cyber-attacks and promote the dissemination of best practices for cybersecurity. The Federal government has also embraced mobility as a means to conduct work from any location. But until now, the implementation of these initiatives has been fragmented and lacked coordination across Federal agencies. This paper offers a framework for integrating these programs in a way that enables the Federal government to realize the economic, technological, and mission-effectiveness benefits of cloud services while simultaneously meeting current Federal cybersecurity
requirements. It advocates shifting from a compliance-based cybersecurity paradigm to
one that is risk-based and focusing on how to most effectively secure their implementation of cloud services.
GovCloud Network, LLC helps its clients develop and execute mission and business strategies to leverage the parallel and global nature of cloud-based services. We employ our technology, strategy, digital publishing and social media expertise across three lines of business- Business Strategy & Design, Digital Publishing & Social Media and Education.
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
When the government purchases products or services with inadequate in-built “cybersecurity,” the risks created persist throughout the lifespan of the item purchased. The lasting effect of inadequate cybersecurity in acquired items is part of what makes acquisition reform so important to achieving cybersecurity and resiliency.
Currently, government and contractors use varied and nonstandard practices, which make it difficult to consistently manage and measure acquisition cyber risks across different organizations.
Meanwhile, due to the growing sophistication and complexity of ICT and the global ICT supply chains, federal agency information systems are increasingly at risk of compromise, and agencies need guidance to help manage ICT supply chain risks
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
Assured C2 sets conditions for Navy commanders to maintain the IT- enabled ability to exercise C2 authorities across the sea, land, air, space, and cyberspace domains in heavily contested or denied operating conditions.
Navy must continue to clearly define and manage capability-based Assured C2 requirements and resources, and align those requirements and resources with JIE/IC ITE through the IDEA
The primary beneficiaries of the effort to deliver Assured C2 capabilities are the requirements stakeholders: USFF, USPACFLT, and USFLTCYBERCOM subordinate commanders who execute Navy’s warfighting mission in all domains.
Agile Cloud Conference 2 Introduction - John BrennanGovCloud Network
Develop and open and inclusive cloud service brokerage environment that provides the Government the capability for rapid acquisition of proven innovative technologies on a fee for service basis
To the maximum extent possible leverage what already exits versus custom development to include incorporation of industry standards and a consistent implementation environment
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
BCL is tailored for the rapid delivery of enterprise business capability. It combines multiple, disjointed oversight processes into a single process. It recognizes that technology rapidly evolves and changes, and consequently, BCL mandates rapid capability delivery – within
eighteen months or less of program initiation. BCL is outcome-based, and modeled on best commercial practices. The process allows for the fact that not all solutions are purely technical. The entire DOTMLPF (Doctrine, Organization, Training, Materiel, Leadership
and education, Personnel and Facilities) spectrum of potential solutions are considered.
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
Cloud computing is driving the business of information technology today.
“A recent Gartner survey on the future of IT services found that only 38 percent of all organizations surveyed indicate cloud services use today. However, 80 percent of organizations said that they intend to use cloud services in some form within 12 months, including 55 percent of the organizations not doing so today.“ (Gartner, Inc, 2013)
As companies rush to adopt cloud, however, information technology (IT) security sometimes seems to be an afterthought.
The goal of this paper is to provide a survey of the current state of IT security within public cloud infrastructure-as-a-service providers. After first providing a cloud computing overview, the paper will focus on the infrastructure-as-a-service (IaaS) deployment model, the typical home of IaaS intrusion detection components. The Gartner Cloud Use Case Framework will then be introduced as it will also serve as the framework for this survey. An in-depth review of public cloud intrusion detection studies, options and expert observations will then follow. The paper will then offer the authors conclusions and cloud computing IDS recommendations for enterprises considering a move to the cloud.
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
Technology adoption is always a critical concern in organizations (private and public). South African government experienced this encounter when adopted Open Source Software (OSS) with the objective to reduce ICT services costs among others. The implementation of OSS in SA government has faced several challenges such as user resistance, human factor, support and funding. As a result of these challenges cost reduction has not been fully achieved. Cost reduction issue ultimately affects implementation of other government programmes such as those who yields job creation, better education, and improving health, etc. The potential alternative to address the same objective as aimed by OSS is Cloud Computing adoption. Cloud Computing promise to offer the SA government more advantages OSS. This study explore the feasibility of Cloud Computing adoption as an alternative to enable cost reduction, effectiveness and efficient of IT services in SA government as was aimed by OSS initiative.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
1. Defense Information Systems Agency
A Combat Support Agency
Cloud Computing:
A perspective
Mr. Henry J. Sienkiewicz
Technical Program Director
Computing Services
Defense Information Systems Agency
September 2009
2. Our World Today
A Combat Support Agency
Changes in the underlying platform enable
Web 2.0 – blogs, wikis, social networking
• Agility/flexibility of technology – implying a power shift
• Always on – ubiquitous
• Real time information and immediate feedback
• Providing
– New distribution channels
– Early warning through the blogosphere
– Radical transparency
– Dynamic, ad hoc sharing and collaboration
Presenting challenges for the „institution‟ 2
3. Changes In
A Combat Support Agency
Consumption Patterns
Warfighters
On Demand
Developers Commodity Service
Flexibility Providers
Security
Customers
Changes In Expectations 3
4. Processing & Storage
A Combat Support Agency as a Service
Concept Processor Orders to date
• Acquire capacity as a service provided • 439 total orders completed, with a $31.5M
annualized value
by vendor partners
• Average delivery timeline of 11 days
• Pay much like a homeowner pays for – 14 days for mainframe; 10 for server
utilities, e.g., by CPU-hours or – 113 orders took less than 5 days
megabytes consumed – 208 orders took between 5 – 14 days
Storage Orders to date
• 157 Total Orders Completed
• $9.6M Annualized Value
• Average delivery timeline of 14 Days
– 7 Days for Disk
– 11 Days for Network Ports
– 24 Days for Tape Slot Capacity
Speed, Agility, Utility Pricing, Reduced Overhead
& Technology Currency 4
5. Virtualization
A Combat Support Agency
• Why? Many benefits…
– Consolidation – Reduces footprint
– Deployment – Eases provisioning of new workloads
– Agility – Increases support for changing workload demands and simple
failover situations
– Protection - Lowers barriers to disaster recovery
– Savings – Fewer machines means fewer administrators, less power, floor
space, and cooling
– Utilization - Enables multiple systems to run on high-performance hardware
– Price – Reduces the cost of service delivery and lowers the total cost of
ownership
• Current utilization is 15% - 20%, climbs to > 60% through virtualization
• Server virtualization standard environments
– Windows/Linux – VMware
– Solaris 10 Containers
– HP-UX virtual server environment
5
6. DISA Computing Environment
A Combat Support Agency
• 4,000,000+ users
• 13 facilities
• 445,000 sq ft raised floor
• 34 mainframes
• 6,100 servers
• 3,800 terabytes of storage
• 2,800 application / database
instances
• 215 software vendors
Defense Enterprise Computing Centers (DECC) 6
7. “The Cloud”
A Combat Support Agency
A style of computing where massively
scalable (and elastic) IT-related capabilities
are provided “as a service” to external
customers using Internet technologies.
What’s new?
Technical Model:
Acquisition Model: Business Model: Access Model: Over
Scalable, elastic,
Based on purchasing Based on pay for the Internet to ANY
dynamic, multi-
of services use device
tenant, & sharable
Source: Gartner
Computing As A Service 7
8. DISA Cloud Services
A Combat Support Agency Portfolio
Data-as-a-Service
Forge.mil
Software-as-a-Service
Software Development
RACE GCDS
Platform/Infrastructure-as-a-Service
Compute/Store Content Delivery
8
10. RACE Drivers…Why Do It
A Combat Support Agency
• Support faster application development/deployment
– Reduce hardware provisioning from months to hours
– Provide standard platforms to encourage standardization
– Developing under security guidelines reduces implementation
delays to retrofit security
• Reduce development and operating cost
– Self-service model reduces costs
– Standardization reduces support costs
– Centralizing resources in the cloud
• Improve overall security posture
– No servers under desks
– Secure facilities
– Uniform application of security guidelines
10
11. RACE – The Solution
A Combat Support Agency
Increased Speed Increased Scalability
24 hour provisioning Increase capacity ~ 24 hours
Online self service “Turn On / Turn Off” monthly
Credit card acquisition Capacity on demand
Reduced Risk Reduced Cost
No capital $ needed Pay only for what you need
DECC Infrastructure Month-to-month service
Develop under DoD IA No annual maintenance fees
standards
Computing As A Service 11
12. RACE Offerings
A Combat Support Agency
Today
Development/Test
24-hour automated
provisioning
1 October 2009
Customer root access Production
Ability to promote from User self-service
Dev to Test provisioning within the FY10 Initiatives
Standard CSD Operating PRODUCTION SIPRNet deployment
Environments environment Complete integrate
Minimized and Ability to promote from accreditation automation
streamlined test to production processes
accreditation Streamlined/Automated Continue to refine RACE
Increase capacity ~ 24 accreditation Portal
hours Pre-established inherited Interface with Forge.Mil
Month-to-month service IA controls Projects
Reduced cost Complete integration with
DISA standardized
configuration management
system (BladeLogic)
On-going Development Driven By The User Community 12
13. RACE – How
A Combat Support Agency It Works
Source: Gartner
User Self-Service 13
14. GIG Content Delivery
A Combat Support AgencyService (GCDS)
• The Global Information Grid (GIG) Content Management
System (GCDS):
– DoD designated content delivery service
– Managed by the Defense Information System Agency (DISA's)
Computing Services Directorate (CSD).
– GCDS is a global platform
• Uses Akamai™ technology, that provides intelligent routing and
caching of web-based content.
• Interfaces with web-based applications and portals.
• Requires the local system be configured to allow GCDS to handle
communications between it and the Defense Information Systems
Network (DISN).
• GCDS Cloud Computing Defined:
– Infrastructure as a Service (IaaS) in the DISN Cloud
14
14
15. GCDS Customers
A Combat Support Agency
DISN CLOUD ARMY NAVY AIR FORCE MARINES DoD Pending TOTAL
NIPRNET 2 8 3 0 9 1 23
SIPRNET 2 0 1 2 15 7 27
TOTAL 4 8 4 2 24 24 50
SharePoint Portals
Intel Applications
Service Portals,
Mission Applications &
First Responders
eLearning
Applications
Other Web As of:
Applications May 2009
15
15
16. Forge.mil
A Combat Support Agency
Shared Asset
Libraries & Repositories
TODAY Tester
Developer
• Siloed development environments
• Expensive and time consuming start-
up Developer
• Limited exposure, sharing, or re-use
• Duplication of effort
Shared Test & Development
Certifier
Tools/Services/Environments User
FORGE.mil
• Agile development and testing
• Cross-program sharing: software and services
• Early and continuous collaboration
• Integrated approach to development life cycle
• Extensible platform to support delivery of partner
capabilities
Software Lifecycle Development 16
17. Forge.mil
A Combat Support Agency
A collaborative platform to improve DoD‟s ability to rapidly deliver dependable
software and services in support of net-centric operations and warfare
Available Collaborative software development and reuse
Now
Q1 FY10 On-demand application development tools
Agile certification process
Future Common test and evaluation environment
Collaborative development of IT standards
Driving Innovation Through Collaboration 17
18. Challenges and Barriers
A Combat Support Agency
Current
• Balancing Security and Usability
– User Validation
– Virtualization; servers, firewalls, networks
– Access
• Business processes
– Flexible funding; credit cards, speeding MIPR process
• Cultural inertia
– Sharing the vision
– Convincing “Box Huggers”
• Controlling expectations
– “Why can‟t it…..”
Future
• Security optimization
– “Shared” accreditation
– Validation of customer applications
– Integrating Software as a Service
– Accessing federated and shared services
– Varying interpretations of security guidelines
• Business streamlining
– Each Service and Agency has unique processes
– Funding hurdles; Procurement $ verses Operating $
18