SlideShare a Scribd company logo
1 of 19
Download to read offline
Overview:
                                Implementation of Cloud
                                Computing Solutions in Federal
                                Agencies

                                An NJVC Executive White Paper


                                Kevin L. Jackson
                                General Manager, Cloud Services

                                September 2011




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   1
Executive Summary

Cloud computing is a game changer. The value of the new approach of cloud computing to the
provisioning and consuming information technology lies within its ability to enable more efficient
and effective information sharing. Its merit is not just in cost savings, but in enhanced mission and
business enhancements and improved allocation of resources. Its characteristics not only
dramatically transform how an IT infrastructure is managed, but also the traditional roles of
enterprise IT professionals to a more service management orientation—as they become
responsible for helping their internal customers better use the externally provided IT services.
Building a cloud computing roadmap is essential to unlocking the value of the cloud in a predictable
fashion with acceptable risk. This paper outlines the essential steps to constructing a solid cloud
computing roadmap.

As a young approach, cloud computing is not without its
challenges. Few established tools, procedures and formats,
potential risks exist. Primary challenges exist in security
controls—particularly related to the protection of sensitive
data—lack of federal regulations and compliance standards, and
data sovereignty.

The benefits of cloud computing are recognized by the federal
government, including the defense and intelligence
communities. Dialogue on cloud computing has been ongoing
within the government for years, but agencies are still in the
early stages of implementing and adopting this new IT
approach. The Obama administration has publicly identified
cloud computing as a viable solution to help cut the federal
budget. The administration adopted a “cloud-first policy” as part
of its 25-point IT reform plan, which mandates all federal
agencies to develop and implement one cloud-based solution by
December 2011 and three such solutions by June 2012. For the
federal government, the evolution to the cloud is not something
to consider in the future—it is something to put into operation
today.



      The Obama administration has publicly identified cloud computing as a viable solution to help cut the
      federal budget. The administration adopted a “cloud-first” policy as part of its 25-point IT reform plan
      … For the federal government, the evolution to the cloud is not something to consider in the future—
      it is something to put into operation today.


The government can learn many lessons from the private sector pertaining to the implementation
of cloud computing solutions, as the private sector embarked on the journey to the cloud some time
ago. These valuable lessons include the need to expect a multi-year transition to the cloud, use a
consistent cloud opportunity identification process to reduce the risk of project failure and
formulate appropriate metrics (economic, operational and service) that are directly tied to mission.


NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   2
Use of a gate-driven cloud adoption process designed to terminate failed projects early in the
project lifecycle and deliver measurable capabilities within a quick timeframe is recommended.

The defense and intelligence communities require utility computing methods that scale on demand
and enable self discovery and self-service access to secure, timely and relevant information in
support of mission. Designing software independence from the hardware through the use of cloud
computing solutions allows an operating system, applications and data to “live” across the
enterprise and is fundamental to the transformation of compute, storage and network functionality.

Facing an estimated $178 billion in budget cuts during the next several years, the Department of
Defense is exploring a number of administrative and structural cost-cutting measures—and IT is
one of the first areas for consideration. Defense Secretary Robert Gates recently stated that the
agency is reviewing how to reform how it currently uses IT, which costs the agency approximately
$37 billion annually. DoD is in the process of consolidating hundreds of data centers and utilizing
cloud computing in this shift, and the fact that the defense community is beginning to explore cloud
computing through various smaller-scale projects is promising to proponents.

For intelligence professionals, the use of cloud computing can not only make the automation of the
interpretation of documents and translation of data into operationally relevant entities and events
possible, but it enables real-time continuous processing of the now digital document flow of our
adversaries. This commodity also removes the human from this tedious task, allowing intelligence
professionals to apply higher order professional analysis and insight.



     For intelligence professionals, the use of cloud computing can not only make the automation of the
     interpretation of documents and translation of data into operationally relevant entities and events
     possible, but it enables real-time continuous processing of the now digital document flow of our
     adversaries.


The human-based documentation exploitation process has led to a reliance on “operationally
proven” processes and filters. Instantiated by the use of multi-page structure query language (e.g.,
Boolean) and the ubiquitous goal of obtaining an appropriate “working set” of data, these processes
were born from the need to meet critical decision timelines within a computationally inadequate
environment. Cloud techniques and technologies can now be used to work on all the data. And with
an ability to leverage the power of a supercomputer at will, the working set requirement is now an
anachronism and critical decision timelines can now be more easily met.

Cloud computing can uniquely address important issues associated with mission support—
particularly related to its ability to remove information silos among various organizations that have
joined forces on the same mission. Moving IT operations to the cloud assists in enhanced
collaboration to meet mission needs. It is critical to our national defense. As a bonus, cloud
computing also can improve IT enterprise efficiencies and incur marked cost savings during project
lifecycles to alleviate some of the pressure of budget reductions for the defense and intelligence
agencies.




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   3
Introduction

Cloud computing is a new approach in the provisioning and consumption of information technology
(IT). While technology is a crucial component, the real value of cloud computing lies in its ability to
enable new capabilities or in the execution of current capabilities in more efficient and effective
ways.

Although the current hype around cloud computing has focused on expected cost savings, the true
value is really found in the mission and business enhancements these techniques can provide.
When properly deployed, the cloud computing model provides greatly enhanced mission and
business capability without a commensurate increase in resource (time, people or money)
expenditures.

Cloud Computing: Changing the Game

The use of commodity components, coupled with highly automated controls, enable cloud
computing.1 These characteristics also enable the economic model that makes it so disruptive to the
status quo. As an example, the software-as-a-service cloud delivery model typically does not
require any advance usage commitment or long-term contractual arrangements. SaaS not only
changes the typical software vendor business model, but also radically changes the strategy,
budgeting, buying and management options for the buyer. When Salesforce.com proved the
viability of SaaS, the software subscription model was instantly endangered as a profitable business
model. Amazon Web Services is similarly attacking data center hosting with its Virtual Private
Datacenter Infrastructure as a Service (IaaS) offering.



     Different cloud computing deployment models are actually changing what it means to be an IT
     professional … This transition puts the enterprise IT professional into a service management role,
     responsible for helping his or her internal customers better use externally provided IT services.



Looking at this phenomenon from another angle, different cloud computing deployment models are
actually changing what it means to be an IT professional. Since the days of the first computer, IT
workers have prided themselves in their ability to design, build, operate and fix the enterprise
hardware and software components that comprise the IT lifeblood of organizations—both in the
public and private sectors. These tightly knit teams worked hard to keep these custom-made
platforms updated, patched and ready to meet daily business and mission requirements. In the
cloud computing world, IT infrastructure that is not delivering differentiating value is viewed as
worthless cost. Critical business applications like email, Customer Resource Management (CRM),
Human Resource Management and Enterprise Resource Planning are being routed to more capable
cloud providers of these same services. This transition puts the enterprise IT professional into a
service management role, responsible for helping his or her internal customers better use
externally provided IT services. The new enterprise IT department is more a services organization
than the traditional delivery organization.




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   4
The new cloud economic model also radically changes the view of what’s actually possible.
Traditional IT procurement and provisioning processes have historically driven timelines
associated with the delivery or fielding of improved information and data processing capabilities.
Multiple threads of development, test, training and maintenance can also tax an organization’s
short- and long-term financial resources. IaaS and Platform as a Service options can not only
eliminate or limit capital expenditures, but can reduce or eliminate the expectation of operations
and sustainment costs. The time required to realize mission or business value also is substantially
reduced. With these differences, the impossible can suddenly become not only possible, but often
can lead to new mission capabilities or brand-new cloud-enabled, revenue-generating businesses.

Challenges of Cloud Computing

Despite the myriad benefits of cloud computing solutions, several challenges still exist. Being a
young industry, there are few tools, procedures or standard data formats or service interfaces in
place to guarantee data, computer application and service portability. As evidenced with the recent
situation involving the services failure of Amazon’s Elastic Compute Cloud, outages can be a
potential risk—and can have widespread implications for consumers of cloud services. This risk
becomes even more severe if a mission-critical environment could be impacted.

A benefit as well as a challenge, security concerns have also slowed the widespread adoption of
cloud computing. A variety of security concerns exist. According to the article, “Three Cloud
Computing Risks to Consider,” in Information Security Magazine (June 2009), “the logging and
auditing controls provided by some [cloud] vendors are not yet as robust as the logging providing
within enterprises and enterprise applications,” which can put critical and sensitive data and
information at risk. Security, of course, becomes increasingly critical in defense and intelligence IT
environments.

For the government market, the lack of regulations and compliance standards are also cause for
concern. Currently, no federal regulations are in place to govern cloud computing, and according to
an April 2011 Information Systems Audit and Control Association survey of 1,800 Chief Information
Officers (CIOs), compliance is a top risk. Approximately 30 percent of the CIOs surveyed said that
“compliance projects are the biggest driver for IT risk-related projects”—particularly in public
clouds. Specific to federal environments, data sovereignty is a challenge. According to a speech
given by former Federal CIO Vivek Kundra at an April 7, 2010, National Institute of Standards and
Technology (NIST) forum," [Data sovereignty] is not going to be a question of technology. [Data
sovereignty] is going to be a question of international law, and treaties that we will need to engage
in the coming years.” CIO Kundra later added: “We've got a very diverse interpretation and a very
diverse perspective when it comes to privacy or international security, if you look at our
neighbors—Canada or Mexico—versus what's happening in the European Union.”




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   5
Cloud Computing and the Federal Government

The Obama administration has identified cloud computing as a means to achieve savings in IT
budgets across federal agencies—across the board—and to address various other challenges (e.g.,
delays to capabilities and other inefficiencies) that have negatively impacted IT implementations. In
his Fiscal Year (FY) 2011 budget, President Barack Obama ordered a three-year freeze in spending
for non-defense, intelligence and national security programs and the trimming of the budgets of
some federal agencies by five percent. At a July 1, 2010, House subcommittee hearing, CIO Kundra
testified: “To do more than less [in terms for federal spending], we need game changing
technologies. Cloud computing is one such technology.”

The federal government is in the early stages of a decade-long process to “move to the cloud,” but
has taken definitive steps in its adoption. Several key milestones have been achieved during the
past two years in support of this effort:
     2009: Establishment of the General Services Administration (GSA) Cloud Computing
       Program Office to coordinate the government’s cloud computing efforts; assembly of a
       public-private sector Industry Summit to discuss the benefits and risks of cloud computing;
       and creation of Security and Standards Working Groups to encourage collaboration and
       discussion on cloud computing by federal agencies
     2010: Commencement of the development of federal security certification and
       accreditation processes for cloud services; convening of a NIST-hosted, public-private
       sector “Cloud Computing Forum and Workshop” to collaboratively develop cloud standards;
       release of 25-point federal IT reform plan; announcement by GSA and Federal Chief
       Information Officers Council on the requirements for the Federal Risk and Authorization
       Management Program, a standard approach for the federal government to access and
       authorize secure cloud-computing services and products
     2011: Release of the Federal Cloud Computing Strategy (per the Obama administration’s
       25-point IT reform plan) and award of 12 GSA IaaS blanket purchase agreements

The Obama administration
adopted a “cloud-first” policy as
part of its earlier referenced 25-
point federal IT reform plan. This
plan was developed after
extensive review of federal IT
projects with a particularly hard
eye on 26 large-scale projects at
risk due to being over budget and
behind schedule. This policy is part
of the 2012 budget process.
                                                                    Source: 25-Point Implementation Plan to Reform Federal
One of the first steps in the “cloud-first”                          Information Technology Management, February 2009
adoption is the requirement for every
federal agency to develop and implement one cloud-based solution by December 2011 and three
cloud-based solutions by June 2012. As of April 2011, agencies are making progress in this
endeavor.




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved                     6
During a special White House event, CIO Kundra said that CIOs from 15 agencies have already
informed the Office of Management and Budget that they will evolve to cloud-based email solutions
by the December 2011 deadline.

Cloud computing also has been identified by the Obama
administration as a viable solution to the administration’s
challenge to cut the federal budget via the consolidation of
800 of the government’s 2,094 data centers by 2015. CIO
Kundra has specifically identified cloud computing as a
central measure to reduce the costs and increase the
efficiencies of federal data centers. Cost savings are already
being achieved. At an April 12, 2011 Senate subcommittee
hearing, Dave McClure, Associate Administrator, GSA Office
of Citizen Services and Innovative Technologies, testified that
the consolidation of just 12 data centers to three will save $2
million a year. Mr. McClure also testified that GSA’s move to a
cloud-based email system will save $15 million over the
                                                                                          Source: “Federal Cloud Computing Strategy,” Office of the U.S.
next five years.
                                                                                         Chief Information Officer, Executive Office of the President of the
                                                                                                           United States, Feb. 14, 2011
So, whether or not federal agency CIOs support cloud
computing, the evolution to the cloud in their specific IT environments is not something to consider
in the future: it is something to undertake today—and is mandated. Therefore, the way the federal
government conceives of IT operations must change from traditional practices and operating
systems to new enterprise resource controls, standards and business processes and operations.
With the computing stacks functioning as a utility within the infrastructure as a platform and new
business processes in place, highly automated resources provide the extensible platform needed to
meet agency or mission needs.

Cloud Transition Lessons Learned

While the benefits and value of the federal cloud computing policy can be debated, the world’s
transition to cloud computing as an integral component of any IT infrastructure cannot be denied.
The prudent government executive should, therefore, heed the lessons learned from the many
private industry corporations that already have miles behind them on this journey.

When identifying a potential cloud computing project, one should always count on a multi-year
transition. Organizations should always use a consistent cloud opportunity identification process to
reduce the risk of project failure by leveraging data from successful cloud implementations. Clients
need to determine set metrics (economic, operational and service) with direct linkage to specific
mission requirement(s). Use of a gate-driven cloud adoption process designed to terminate failed
projects early in the project lifecycle and deliver measurable capabilities within a quick timeframe
(weeks—not years) is highly recommended.




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved                                7
A risk mitigation plan also must be formalized that addresses each of the following concerns:2
     Loss of Governance. When moving to a cloud environment, clients relinquish control to the
        CP on a number of security-related issues. A gap in security defenses may also exist as
        service level agreements may not adequately address CP-related security requirements.
     Portability. Issues related to provider lock in are outlined in the Challenges section of this
        white paper on page 5.
     Isolation Failure. Multi-tenancy and collaboration are at the core of cloud computing.
        Resource isolation failure addresses mechanisms separating storage, memory, routing and
        reputation among different clients on the same cloud (e.g., guest-hopping attacks).
        However, it must be noted that attacks on these mechanisms are not as pervasive and much
        more difficult to attempt versus attacks on traditional operating systems.
     Compliance Risks. Investments in certifications (e.g., industry standard or regulatory
        requirements) may be compromised or lost when moving to the cloud.
     Management Interface Compromise. Security is an issue with client management
        interfaces with the public cloud provider. The reason? These services are provided via the
        internet and permit access to a larger set of resources than traditional operating systems.
        Security risk can dramatically increase when this is combined with remote access and web
        browser vulnerabilities.
     Data Protection. It may be difficult for clients to effectively check the data-handling
        practices of their CPs to ensure critical and sensitive data is handled lawfully and ethically.
        This problem can be aggravated in cases of multiple transfers of data (e.g., between
        federated clouds). However, it must be noted that some CPs share information on their
        data-handling practices with clients and others offer certification summaries on their data
        processing and data security activities and their various security controls (e.g., Statement
        on Auditing Standards 70 Certification.
     Insecure or Incomplete Data Deletion. As with most operating systems, when a request
        to remove a cloud resource is made, a true erase of data may not happen. Adequate or
        timely data deletion also may not be feasible (or undesirable from a client perspective)
        because extra copies of data are stored but not readily available or the disk to be destroyed
        also houses other data from other clients. When multi-tenancies and the reuse of hardware
        resources are added to the mix, this risk can increase.
     Malicious Insider. Cloud architectures necessitate the creation of certain staff positions
        (e.g., CP system administrators and managed security service providers) that can be
        extremely high risk in terms of internal security threats.


                         Frequently observed signs for failure should be avoided
                                     Lack of formal planning process
                                     Missing or poor IT governance
                                     Poor or missing responsibility matrix
                                     Neglecting the human resource management challenges
                                     No established program/project management office
                                     Missing inventory of assets
                                     Lack of executive oversight
                                     Lack of established service level agreements (especially in
                                      multiple cloud provider scenarios)




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   8
Creating a Cloud Computing Roadmap for Federal Agencies

First Steps

According to, GovCloud: Cloud Computing for the Business of Government, when a government
agency is ready to undertake the implementation of a cloud-based solution, it must determine
which IT services, business functions and processes to deploy in the cloud environment. A five-year
roadmap should be created that includes the desired order to move each of the services to the cloud
for each year during that time period.3 Requirements for each service to be deployed in the cloud
should be developed and a cost/benefits analysis performed to establish the rationale why each
targeted service should move to the cloud.

Implementation of a Low-Risk Test Case

A low-risk test case should be implemented prior to undertaking a wholesale transfer of services to
the cloud.4 This is harder than it may sound as some IT services that may seem simple to deploy to
the cloud are not so easy. Four questions should be asked (and answered) to decide which IT
services are best suited to live in the cloud5:


                   1. Can compliance requirements be balanced with other IT
                      prioirities?
                   2. Is this an IT function or service the agency has
                      mastered?
                   3. Can the agency use a standardized service?
                   4. Is the test case easily implementable?



A misconception may exist that just because an application or service being deployed to the cloud
isn’t mission critical, the process will be simple and straightforward. This is not always true. If the
agency is new to the cloud and wishes to establish a private cloud it will take time to determine the
appropriate split of responsibilities between the service provider and the agency’s IT team.6
Compliance and liability issues can also be tricky, as defining compliance conditions and
establishing liability for intellectual property protection with cloud vendors reach well beyond the
IT world—and, as such, with so many moving parts may take time to properly address and
resolved.7 NIST has launched the U.S. Government Cloud Computing Business Case Working Group
to assist agencies with the development of cloud-compatible user cases. Email, geospatial data
exchange and services management are among the first user cases currently in development.




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   9
Additional Recommendations

The authors of GovCloud: Cloud Computing for the Business of Government also offer seven
recommendations that must be considered during the development and implementation of an
agency’s cloud roadmap:

         Own the information, even if you own nothing else. An agency must claim its right to
          own the information even if it doesn’t own the infrastructure, application or service
          associated with that information. Any agency is liable for its information—regardless of
          where it lives—and some education will likely be needed about this fact among its IT team.
          While it may be unrealistic to prevent departments from provisioning their own cloud
          application, the agency must institute policies and procedures to ensure it can monitor how
          information deployed to the cloud is managed. As it is often hard to envision future uses of
          information, it also is recommended that agencies make sure cloud-dwelling data can be
          brought back into the enterprise if needed.
         Don’t take terminology for granted. It is vital to ensure that important terminology is
          defined in the same way by the agency and the cloud service provider—room for different
          interpretation always exists. A review of information governance policies must take place to
          identify the areas of highest risk so authoritative definitions for vocabulary in these areas
          can be developed and adopted.
         Hope for standards, but prepare to integrate. In short, the cloud is young and isn’t
          established enough to have developed standard specifications for platform interoperability
          and data exchange. Strategic groundwork for future data integration needs to be laid in the
          early stages of any movement to the cloud. Agencies must insist that their cloud service
          providers provide clear documentation on the data formats and schemas used for
          information storage in their systems.
         Control cloud platform proliferation. Agencies should minimize the number of different
          cloud platforms that require support to limit information fragmentation and decrease the
          chance of a future huge integration effort. To the greatest extent possible, an agency’s IT
          team should help departments look for shared requirements in standardized business
          functions. The team can identify cloud platforms that meet these needs and consolidate the
          agency’s services on them, when possible. Not only will the ability to share information
          increase, this will result in greater leverage when negotiating contract terms and pricing.
         Make the information “cloud ready.” Agencies that organize their data sets well enough
          for use across multiple platforms will be best positioned to take advantage of cloud services,
          and will be better able to deploy enterprise information to the cloud more easily.IT teams
          need to get into the habit of encrypting data into one common format (probably XML)—a
          process even more important if data moves through externally operated resources to the
          cloud.
         Master solution integration. The shift to the cloud requires IT professionals to change
          their focus from owning and operating enterprise systems to becoming master information
          service integrators. In addition to linking legacy databases to SaaS, IT teams need to connect
          their private and public clouds to create a seamless technology environment that works like
          a single cloud custom-made for their specific enterprises.




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   10
Cloud Computing for Defense and Intelligence

The defense and intelligence communities are not immune to cloud computing. Arguably more than
any other government agencies, their missions require a fabric of utility computing that scales on
demand and enables self discovery and self-service access to secure, timely and relevant
information in support of mission: individual or shared. The traditional IT model requires system
engineering that binds most software to the hardware and does not provide an enterprise suite of
functionality or allow for increased flexibility and a governed lifecycle of services. Designing
software independence from the hardware allows an operating system, applications and data to
“live” across the enterprise and is fundamental to the transformation of compute, storage and
network functionality.


       Designing software independence from the hardware allows an operating system, applications and
       data to “live” across the enterprise and is fundamental to the transformation of compute, storage
       and network functionality.



Defense is dealing with a $78 billion budget cut—the first since September 11, 2001—and another
$100 billion in other cost-cutting measures over a five-year period commencing in FY 2012.
Defense Secretary Robert Gates is directing that the budget be cut from agency administrative and
structural areas (e.g., the Office of the Assistant Secretary of Defense for Network Intelligence and
Information, the Business Transformation Agency, and the Joint Forces Command are in the process
of being eliminated or disestablished with some essential functions transferred to other
organizations with the Pentagon).

In an official statement on the proposed budget costs provided on January 6, 2011, Secretary Gates
said: “First, reforming how the department uses information technology, which costs us about $37
billion a year. At this time all of our bases and headquarters have their own separate IT
infrastructure and processes, which drive up costs and create cyber vulnerabilities. The department
is planning to consolidate hundreds of data centers and move to a more secure enterprise system,
which we estimate could save more than $1 billion a year.” Department of Defense Chief
Information Officer Terry Takai also publically commented about the potential IT budget cuts at an
April 21, 2011, INPUT event, stating DoD’s support of the move of some of its IT operations to the
cloud—particularly data centers.

DoD has begun to explore cloud computing through several smaller-scale projects; some of these
are outlined in the “Examples of Successful Federal Cloud Solution Implementations” on page 13.




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   11
Cloud Computing and Mission Support

Information is often the decisive discriminator in modern conflict. Studies of recent mission failures
highlighted this fact, finding that many of these failures were caused by:
     Existence of data silos
     Human-based document exploitation process
     Reliance on “operationally proven” processes and filters typically used to address the lack of
        computational power or decision time

Also disturbing is that in most of these cases, the critical piece of information necessary for mission
was in possession. The failure wasn’t in obtaining the information, but in locating and applying it to
the mission at hand. Cloud computing uniquely addresses all of these important issues.

Data silos evolved from a system-centric IT procurement policy and an almost reflexive reliance on
relational database technology. In developing early data processing systems, the high cost of
memory and storage led to a premium being placed on the efficiency of application data access and
retrieval. Relational database technology effectively addressed this need, which in turn led to its
pervasive use across government. In modern IT system development, memory and storage are
cheap—and getting cheaper—which has led to internet-scale storage and search paradigms that
are the stuff of everyday use today. The world’s largest databases cannot, in fact, be searched
quickly using a relational database management approach. Today’s ability to search multi-petabyte
data stores in milliseconds virtually eliminates the need for data silos. This capability is realized in
cloud-based storage.




                                    Source: United States Army Intelligence and Security Command




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   12
Documents are the persistent records of human activity. As such, they are used to provide insight
into the societal structure and processes of our opponents. Conflict, however, is entity and event
centric. The intelligence professional must, therefore, interpret documents and translate that data
into operationally relevant entities and events. The time and resource intensive nature of this
skillcraft is perfectly suited for the precision search and analytic capabilities of the modern
compute cloud. The use of highly standardized and virtualized commodity infrastructure, not only
make the automation of this function possible, but it enables real-time continuous processing of the
now digital document flow of our adversaries. This commodity also removes the human from this
tedious task, allowing intelligence professionals to apply higher order professional analysis and
insight.

The human-based document
exploitation process led directly to an
institutional reliance on the
aforementioned “operationally
proven” processes and filters.
Instantiated by the use of multi-page
structure query language and the
ubiquitous goal of obtaining an
appropriate “working set” of data,
these time-honored processes were
born from the need to meet critical
decision timelines within a
computationally inadequate
environment. Cloud techniques and
technologies can now be used to work
on all the data. And with an ability to
leverage the power of a
supercomputer at will, the working
set requirement is now an
                                                                     Source: United States Army Intelligence and Security Command
anachronism and critical decision
timelines can now be more easily met.

Cloud computing is unique in its ability to address these critical defense and intelligence mission
needs. That’s why cloud computing is critical to our national defense. As a bonus, cloud computing
offers defense and intelligence agencies the ability to increase efficiencies and incur marked cost
savings during their lifecycles to alleviate some of the pressure of budget reductions. Moving IT
operations to the cloud also will assist in enhanced collaboration.




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved                       13
Examples of Successful Cloud Implementations

Army Experience Center Pilot Program, United States
Army                                                                                                 Solution Benefits
                                                                                               Fewer recruiters required to
Two years ago, the United States Army initiated a pilot                                         handle the workload of the five
program to explore how to better utilize new technologies                                       traditional recruiting centers
in support of its marketing and recruiting work. The Army                                       that the AEC replaced
Experience Center (AEC) in Philadelphia, PA, uses a variety                                    Faster application upgrades
                                                                                               Dramatic reduction in hardware
of exciting technology—touch-screen career exploration
                                                                                                and IT staff expenses
kiosks, virtual reality simulators and social networking
                                                                                               Significant increase in staff
tools to educate potential recruits about the Army and help                                     productivity
them make informed decisions about enlisting. As part of
the center operations, the Army needed a customer
relationship management system to track prospect engagement (virtual and in person) to help
personnel better manage the recruitment and enlistment process.

Despite constant updates over the years, the Army’s legacy data system could not be modified to
meet the new requirements of the AEC, specifically social networking and other web 2.0
applications, data access from multiple platforms including mobile devices, the tracking of AEC
visitor information and the amalgamation of marketing and recruiting data. After reviewing bids
from both traditional and “non-traditional” IT vendors, the Army chose a customized version of
Salesforce for the pilot program. The annual cost of the pilot is only $54,000—compared to the
proposed operational costs from traditional vendors of $500,000 to $1 million a year.

This cloud-based, mobility solution CRM tool allows the Army to track potential recruits as they
participate in the different virtual activities in the AEC, and recruits can remain engaged with
recruiters after they leave the center through social media and email. Due to the mobility of the
platform, recruiters also can access potential recruit information anytime and anywhere.

Rapid Access Computing Environment, Defense
Information Systems Agency                                                                                 Solution Benefits
                                                                                          Avoidance of high start-up costs and
The Defense Information Systems Agency made the leap                                       additional ROI through software reuse
to the cloud by establishing the Rapid Access Computing                                   Savings of between $200,000 and $500,000
Environment in 2008. RACE is the agency’s secure,                                          per project due to rapid project start-ups at
stable, private cloud that utilizes virtual server                                         lower costs
technology to provide on-demand server space for                                          An estimated $15 million in cost avoidance
development teams. RACE is made up of several virtual                                      by using open source software that provides
servers co-located in a single physical server.                                            for software reuse and collaborative
                                                                                           development—in addition to lower funds for
                                                                                           licensing and support
                                                                                          Improved software for agency users by
                                                                                           providing version control and traceability




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved                          14
RACE, which uses virtual server technology to provide on-demand server space for development
teams, aims to be more secure and stable than a traditional public cloud. RACE consists of many
virtual servers inside a single physical server. Within this virtual environment that meets DoD
security standards, customers use a self-service portal to provision computing resources in 50 GB
increments. The cost for RACE access is reasonable and can be established with an approved
government-issued credit card.

RACE offers the same level service and availability as a traditional server environment. Since RACE
was implemented, hundreds of military applications, including command and control systems,
convoy control systems and satellite programs have been developed and tested on this cloud-based
solution.

Forge.mil Program, DISA                                                                               Solution Benefits
                                                                                               Cost savings by dividing the costs of
Forge.mil is the secure software development                                                    provisioning and operating one
environment established by DISA designed to provide                                             physical server among several
DoD with tools and services to rapidly develop, test and                                        virtual servers
deploy new software and systems. CollabNet provided                                            Rapid provisioning of functional
DISA with a cloud-based software development platform                                           server space to users (24 hours),
to allow customers to reuse and collaborate on software                                         compared to a traditional dedicated
code. To date, forge.mil manages more than 5,000 users                                          server environment (three to six
with more than 300 open source projects, 500 file                                               weeks)
release posts and 30,000 downloads.                                                            Improved security through built-in
                                                                                                application separation controls so
                                                                                                all applications, databases and web
Forge.mil hosts an array of projects for different DoD
                                                                                                servers are separated, and a strict
agencies, including the Army, Navy, Air Force, Marine
                                                                                                data cleaning process
Corps and the Joint Chiefs of Staff.

Personnel Services Delivery Transformation, Air Force
Personnel Center
                                                                                                       Solution Benefits:
Due to the mandated manpower reduction initiative, the                                          Savings of $4 million annually
Air Force Personnel Center had to find a new, viable way to                                     Seventy percent increase in
deliver human resource tools and services, while                                                 customer engagement in the
improving customer experiences by providing self-service                                         knowledge base
solutions and the ability to track customer needs. AFPC                                         Reduction on the time required for
decided that the SaaS solution by RightNow was the                                               customers to find answers from
solution necessary for improved knowledge management,                                            more than 15,000 documents on
case and contact center tracking and the ability to meet                                         file: from 20 minutes to only two
client survey mission requirements.                                                              minutes.

After implementation of the RightNow solution, customer
searches on the knowledge base have risen to nearly 2
million per week. This cloud-based platform also provides the ability to scale services to meet
fluctuating demand without any impact to customer experience.




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved                                15
Appendix 1: References

1. Mell, Peter, and Grance, Timothy. “The NIST Definition of Cloud Computing: Recommendations
   of the National Institute of Standards and Technology.” January 2011. Jackson, Kevin L., and
   Philpott, Don. GovCloud: Cloud Computing for the Business of Government: Desk Reference, March
   2011
2. “Cloud Computing: Benefits, Risks and Recommendations for Information Security.” European
   Network and Information Security Agency. November 2009.
3. Jackson, Kevin L., and Philpott. Don. GovCloud: Cloud Computing for the Business of Government:
   Desk Reference, March 2011.
4. Jackson, Kevin L., and Philpott. Don. GovCloud: Cloud Computing for the Business of Government:
   Desk Reference, March 2011.
5. Jackson, Kevin L., and Philpott. Don. GovCloud: Cloud Computing for the Business of Government:
   Desk Reference, March 2011.
6. Jackson, Kevin L., and Philpott. Don. GovCloud: Cloud Computing for the Business of Government:
   Desk Reference, March 2011.
7. Jackson, Kevin L., and Philpott. Don. GovCloud: Cloud Computing for the Business of Government:
   Desk Reference, March 2011.




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   16
Appendix 2: Cloud Computing Resources

Info.apps.gov (http://www.info.apps.gov/node/19)

Federal Cloud Computing Initiative (http://www.info.apps.gov/node/2)

Federal Risk and Authorization Management Program (FedRAMP) –
(http://www.info.apps.gov/content/federal-risk-and-authorization-management-program-
fedramp)

Cloud Computing Resources (http://www.info.apps.gov/node/14)

“Cloud Musings by Kevin L. Jackson” (http://kevinljackson.blogspot.com/)

“Cloud Musings on Forbes” (http://blogs.forbes.com/kevinjackson/)

“Government Cloud Computing on Ulitzer”(http://govcloud.ulitzer.com/)

NIST Business Use Case Template (https://collaborate.nist.gov/twiki-cloud-
computing/bin/view/cloudcomputing/businessusecasescall03)

NIST Computer Security Division, Computer Security Resource Center, Cloud Computing
(http://csrc.nist.gov/groups/SNS/cloud-computing/)




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   17
About the Author

Kevin Jackson is General Manager, Cloud Services, at NJVC. Before joining the company, Mr. Jackson
served in various senior management positions with Dataline, LLC; Cryptek, Inc.; IBM; and JP
Morgan Chase. Recently, he was named a “Cyber Security Visionary” by U.S. Black Engineer and
Information Technology magazine. Mr. Jackson is the founder and author of “Cloud Musings”
(http://kevinljackson.blogspot.com) and “Cloud Musings on Forbes”
(http://blogs.forbes.com/kevinjackson), a Forbes magazine online blog dedicated to public sector
cloud computing. He is also founder and editor of “Government Cloud Computing on Ulitzer“
electronic magazine (http://govcloud.ulitzer.com ). His first book, GovCloud: Cloud Computing for
the Business of Government was released in spring 2011. Mr. Jackson has been deeply involved in
the broad collaborative effort between industry and the U.S. National Institute of Standards and
Technology on the federal government’s adoption of cloud computing technologies. He is the
Network Centric Operations Industry Consortium’s Cloud Computing Working Group Chairman.

About NJVC

NJVC is one of the largest information technology solutions providers supporting the U.S.
Department of Defense. We provide innovative and high-quality IT solutions to the government and
commercial organizations, and specialize in supporting highly secure IT enterprises, particularly for
the intelligence and defense communities. To learn more, visit www.njvc.com.




NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   18
Headquarters
                                                   8614 Westwood Center Dr
                                                           Suite 300
                                                       Vienna, VA 22182
                                                         703.556.0110


                                                        www.njvc.com

NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved   19

More Related Content

What's hot

Comcast Metro E Strategic White Paper
Comcast Metro E Strategic White PaperComcast Metro E Strategic White Paper
Comcast Metro E Strategic White Paperbklinger
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperFaimin Khan
 
Monthly Technology Brief
Monthly Technology Brief Monthly Technology Brief
Monthly Technology Brief Capgemini
 
Dispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial servicesDispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial servicesIBM India Smarter Computing
 
How will cloud computing transform technology
How will cloud computing transform technologyHow will cloud computing transform technology
How will cloud computing transform technologyTarunabh Verma
 
The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...Diego Alberto Tamayo
 
1 18784 navisite-wp-cloud_roi
1 18784 navisite-wp-cloud_roi1 18784 navisite-wp-cloud_roi
1 18784 navisite-wp-cloud_roiAccenture
 
Ib Ms Vision For A Dynamic Infrastructure
Ib Ms Vision For A Dynamic InfrastructureIb Ms Vision For A Dynamic Infrastructure
Ib Ms Vision For A Dynamic Infrastructuresimonarden
 
Three Generations of Citrix CEOs: Enabling a Better Way to Work
Three Generations of Citrix CEOs: Enabling a Better Way to WorkThree Generations of Citrix CEOs: Enabling a Better Way to Work
Three Generations of Citrix CEOs: Enabling a Better Way to WorkDana Gardner
 
Dell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCDell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCarms8586
 
The Cloud: Time for Delivery
The Cloud: Time for DeliveryThe Cloud: Time for Delivery
The Cloud: Time for DeliveryCapgemini
 
The Evolution of Converged Infrastructure - White Paper 2009
The Evolution of Converged Infrastructure - White Paper 2009The Evolution of Converged Infrastructure - White Paper 2009
The Evolution of Converged Infrastructure - White Paper 2009SusanSampsonHP
 
Why is Mobility More than Making Enterprise Applications Available?
Why is Mobility More than Making Enterprise Applications Available?Why is Mobility More than Making Enterprise Applications Available?
Why is Mobility More than Making Enterprise Applications Available?Capgemini
 
2011 Cloud Trends Report
2011 Cloud Trends Report2011 Cloud Trends Report
2011 Cloud Trends Reportahollobaugh
 
White paper cost savings_final
White paper cost savings_finalWhite paper cost savings_final
White paper cost savings_finalJulie Dolak
 
To Cloud, or Not to Cloud?
To Cloud, or Not to Cloud?To Cloud, or Not to Cloud?
To Cloud, or Not to Cloud?Sentilla
 
Technology Insight Report Cloud Computing Billing Technologies
Technology Insight Report  Cloud Computing Billing TechnologiesTechnology Insight Report  Cloud Computing Billing Technologies
Technology Insight Report Cloud Computing Billing TechnologiesPrashant Nair
 

What's hot (19)

Comcast Metro E Strategic White Paper
Comcast Metro E Strategic White PaperComcast Metro E Strategic White Paper
Comcast Metro E Strategic White Paper
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
 
Monthly Technology Brief
Monthly Technology Brief Monthly Technology Brief
Monthly Technology Brief
 
Dispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial servicesDispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial services
 
How will cloud computing transform technology
How will cloud computing transform technologyHow will cloud computing transform technology
How will cloud computing transform technology
 
SIIA & INPUT Webinar: Federal Cloud Computing Initiative Update
SIIA & INPUT Webinar: Federal Cloud Computing Initiative UpdateSIIA & INPUT Webinar: Federal Cloud Computing Initiative Update
SIIA & INPUT Webinar: Federal Cloud Computing Initiative Update
 
The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...The data center impact of cloud, analytics, mobile, social and security rlw03...
The data center impact of cloud, analytics, mobile, social and security rlw03...
 
1 18784 navisite-wp-cloud_roi
1 18784 navisite-wp-cloud_roi1 18784 navisite-wp-cloud_roi
1 18784 navisite-wp-cloud_roi
 
Ib Ms Vision For A Dynamic Infrastructure
Ib Ms Vision For A Dynamic InfrastructureIb Ms Vision For A Dynamic Infrastructure
Ib Ms Vision For A Dynamic Infrastructure
 
Three Generations of Citrix CEOs: Enabling a Better Way to Work
Three Generations of Citrix CEOs: Enabling a Better Way to WorkThree Generations of Citrix CEOs: Enabling a Better Way to Work
Three Generations of Citrix CEOs: Enabling a Better Way to Work
 
Dell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCDell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDC
 
The Cloud: Time for Delivery
The Cloud: Time for DeliveryThe Cloud: Time for Delivery
The Cloud: Time for Delivery
 
The Evolution of Converged Infrastructure - White Paper 2009
The Evolution of Converged Infrastructure - White Paper 2009The Evolution of Converged Infrastructure - White Paper 2009
The Evolution of Converged Infrastructure - White Paper 2009
 
Why is Mobility More than Making Enterprise Applications Available?
Why is Mobility More than Making Enterprise Applications Available?Why is Mobility More than Making Enterprise Applications Available?
Why is Mobility More than Making Enterprise Applications Available?
 
2011 Cloud Trends Report
2011 Cloud Trends Report2011 Cloud Trends Report
2011 Cloud Trends Report
 
White paper cost savings_final
White paper cost savings_finalWhite paper cost savings_final
White paper cost savings_final
 
To Cloud, or Not to Cloud?
To Cloud, or Not to Cloud?To Cloud, or Not to Cloud?
To Cloud, or Not to Cloud?
 
Technology Insight Report Cloud Computing Billing Technologies
Technology Insight Report  Cloud Computing Billing TechnologiesTechnology Insight Report  Cloud Computing Billing Technologies
Technology Insight Report Cloud Computing Billing Technologies
 
Dispelling the vapor around cloud computing
Dispelling the vapor around cloud computingDispelling the vapor around cloud computing
Dispelling the vapor around cloud computing
 

Viewers also liked

Cloud Computing: Is it really new?
Cloud Computing: Is it really new?Cloud Computing: Is it really new?
Cloud Computing: Is it really new?GovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC)
Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC)Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC)
Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC)GovCloud Network
 
Federal Cloud Computing: From Business Use Cases to Pilots to Implementations
Federal Cloud Computing:From Business Use Cases to Pilots to ImplementationsFederal Cloud Computing:From Business Use Cases to Pilots to Implementations
Federal Cloud Computing: From Business Use Cases to Pilots to ImplementationsGovCloud Network
 
IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmarkGovCloud Network
 

Viewers also liked (7)

Coming Soon
Coming SoonComing Soon
Coming Soon
 
Cloud Computing: Is it really new?
Cloud Computing: Is it really new?Cloud Computing: Is it really new?
Cloud Computing: Is it really new?
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC)
Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC)Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC)
Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC)
 
Brand niemann03292011
Brand niemann03292011Brand niemann03292011
Brand niemann03292011
 
Federal Cloud Computing: From Business Use Cases to Pilots to Implementations
Federal Cloud Computing:From Business Use Cases to Pilots to ImplementationsFederal Cloud Computing:From Business Use Cases to Pilots to Implementations
Federal Cloud Computing: From Business Use Cases to Pilots to Implementations
 
IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 

Similar to NJVC Implementation of Cloud Computing Solutions in Federal Agencies

Cloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliveryCloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliverySoftweb Solutions
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
 
The cloud promises
The cloud promisesThe cloud promises
The cloud promisesGrand Crue
 
Google Apps: 4 ROI cases studies
Google Apps: 4 ROI cases studiesGoogle Apps: 4 ROI cases studies
Google Apps: 4 ROI cases studiesTom Henn
 
Piloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow TechnologiesPiloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow TechnologiesNitin Badjatia
 
White paper vt cloud computing en
White paper vt cloud computing enWhite paper vt cloud computing en
White paper vt cloud computing enF i l Zanella
 
Transforming an organization to cloud
Transforming an organization to cloud Transforming an organization to cloud
Transforming an organization to cloud Ali Akbar
 
The Future of Convergence Paper
The Future of Convergence PaperThe Future of Convergence Paper
The Future of Convergence PaperHitachi Vantara
 
Developing a Business Case for Cloud
Developing a Business Case for CloudDeveloping a Business Case for Cloud
Developing a Business Case for CloudBooz Allen Hamilton
 
Secure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of controlSecure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of controlCapgemini
 
Federal Cloud Computing Strategy
Federal Cloud Computing StrategyFederal Cloud Computing Strategy
Federal Cloud Computing Strategyrameshgpai
 
Please read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docxPlease read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docxchristalgrieg
 
Disaster recovery with cloud computing
Disaster recovery with cloud computingDisaster recovery with cloud computing
Disaster recovery with cloud computingIsrael Roy Sambu
 
Ibm Perspective On Cloud Computing
Ibm Perspective On Cloud ComputingIbm Perspective On Cloud Computing
Ibm Perspective On Cloud Computinglambertt
 
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET Journal
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computingMandar Pathrikar
 
NVTC "Cool Tech" Presentation
NVTC "Cool Tech" PresentationNVTC "Cool Tech" Presentation
NVTC "Cool Tech" PresentationGovCloud Network
 
Cloud computing and What It Means for Digital Marketing
Cloud computing and What It Means for Digital MarketingCloud computing and What It Means for Digital Marketing
Cloud computing and What It Means for Digital Marketinggstweet99
 
QAC020N254A Cloud Computing.docx
QAC020N254A Cloud Computing.docxQAC020N254A Cloud Computing.docx
QAC020N254A Cloud Computing.docxwrite5
 
How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...Claudia Brown
 

Similar to NJVC Implementation of Cloud Computing Solutions in Federal Agencies (20)

Cloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliveryCloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT Delivery
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
The cloud promises
The cloud promisesThe cloud promises
The cloud promises
 
Google Apps: 4 ROI cases studies
Google Apps: 4 ROI cases studiesGoogle Apps: 4 ROI cases studies
Google Apps: 4 ROI cases studies
 
Piloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow TechnologiesPiloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
 
White paper vt cloud computing en
White paper vt cloud computing enWhite paper vt cloud computing en
White paper vt cloud computing en
 
Transforming an organization to cloud
Transforming an organization to cloud Transforming an organization to cloud
Transforming an organization to cloud
 
The Future of Convergence Paper
The Future of Convergence PaperThe Future of Convergence Paper
The Future of Convergence Paper
 
Developing a Business Case for Cloud
Developing a Business Case for CloudDeveloping a Business Case for Cloud
Developing a Business Case for Cloud
 
Secure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of controlSecure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of control
 
Federal Cloud Computing Strategy
Federal Cloud Computing StrategyFederal Cloud Computing Strategy
Federal Cloud Computing Strategy
 
Please read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docxPlease read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docx
 
Disaster recovery with cloud computing
Disaster recovery with cloud computingDisaster recovery with cloud computing
Disaster recovery with cloud computing
 
Ibm Perspective On Cloud Computing
Ibm Perspective On Cloud ComputingIbm Perspective On Cloud Computing
Ibm Perspective On Cloud Computing
 
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
NVTC "Cool Tech" Presentation
NVTC "Cool Tech" PresentationNVTC "Cool Tech" Presentation
NVTC "Cool Tech" Presentation
 
Cloud computing and What It Means for Digital Marketing
Cloud computing and What It Means for Digital MarketingCloud computing and What It Means for Digital Marketing
Cloud computing and What It Means for Digital Marketing
 
QAC020N254A Cloud Computing.docx
QAC020N254A Cloud Computing.docxQAC020N254A Cloud Computing.docx
QAC020N254A Cloud Computing.docx
 
How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...
 

More from GovCloud Network

Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for meGovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeGovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in CyberspaceGovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessGovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture GovCloud Network
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin JacksonGovCloud Network
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanGovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefGovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 
Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013GovCloud Network
 

More from GovCloud Network (20)

Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 
Cloud computing-made-easy
Cloud computing-made-easyCloud computing-made-easy
Cloud computing-made-easy
 
Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

NJVC Implementation of Cloud Computing Solutions in Federal Agencies

  • 1. Overview: Implementation of Cloud Computing Solutions in Federal Agencies An NJVC Executive White Paper Kevin L. Jackson General Manager, Cloud Services September 2011 NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 1
  • 2. Executive Summary Cloud computing is a game changer. The value of the new approach of cloud computing to the provisioning and consuming information technology lies within its ability to enable more efficient and effective information sharing. Its merit is not just in cost savings, but in enhanced mission and business enhancements and improved allocation of resources. Its characteristics not only dramatically transform how an IT infrastructure is managed, but also the traditional roles of enterprise IT professionals to a more service management orientation—as they become responsible for helping their internal customers better use the externally provided IT services. Building a cloud computing roadmap is essential to unlocking the value of the cloud in a predictable fashion with acceptable risk. This paper outlines the essential steps to constructing a solid cloud computing roadmap. As a young approach, cloud computing is not without its challenges. Few established tools, procedures and formats, potential risks exist. Primary challenges exist in security controls—particularly related to the protection of sensitive data—lack of federal regulations and compliance standards, and data sovereignty. The benefits of cloud computing are recognized by the federal government, including the defense and intelligence communities. Dialogue on cloud computing has been ongoing within the government for years, but agencies are still in the early stages of implementing and adopting this new IT approach. The Obama administration has publicly identified cloud computing as a viable solution to help cut the federal budget. The administration adopted a “cloud-first policy” as part of its 25-point IT reform plan, which mandates all federal agencies to develop and implement one cloud-based solution by December 2011 and three such solutions by June 2012. For the federal government, the evolution to the cloud is not something to consider in the future—it is something to put into operation today. The Obama administration has publicly identified cloud computing as a viable solution to help cut the federal budget. The administration adopted a “cloud-first” policy as part of its 25-point IT reform plan … For the federal government, the evolution to the cloud is not something to consider in the future— it is something to put into operation today. The government can learn many lessons from the private sector pertaining to the implementation of cloud computing solutions, as the private sector embarked on the journey to the cloud some time ago. These valuable lessons include the need to expect a multi-year transition to the cloud, use a consistent cloud opportunity identification process to reduce the risk of project failure and formulate appropriate metrics (economic, operational and service) that are directly tied to mission. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 2
  • 3. Use of a gate-driven cloud adoption process designed to terminate failed projects early in the project lifecycle and deliver measurable capabilities within a quick timeframe is recommended. The defense and intelligence communities require utility computing methods that scale on demand and enable self discovery and self-service access to secure, timely and relevant information in support of mission. Designing software independence from the hardware through the use of cloud computing solutions allows an operating system, applications and data to “live” across the enterprise and is fundamental to the transformation of compute, storage and network functionality. Facing an estimated $178 billion in budget cuts during the next several years, the Department of Defense is exploring a number of administrative and structural cost-cutting measures—and IT is one of the first areas for consideration. Defense Secretary Robert Gates recently stated that the agency is reviewing how to reform how it currently uses IT, which costs the agency approximately $37 billion annually. DoD is in the process of consolidating hundreds of data centers and utilizing cloud computing in this shift, and the fact that the defense community is beginning to explore cloud computing through various smaller-scale projects is promising to proponents. For intelligence professionals, the use of cloud computing can not only make the automation of the interpretation of documents and translation of data into operationally relevant entities and events possible, but it enables real-time continuous processing of the now digital document flow of our adversaries. This commodity also removes the human from this tedious task, allowing intelligence professionals to apply higher order professional analysis and insight. For intelligence professionals, the use of cloud computing can not only make the automation of the interpretation of documents and translation of data into operationally relevant entities and events possible, but it enables real-time continuous processing of the now digital document flow of our adversaries. The human-based documentation exploitation process has led to a reliance on “operationally proven” processes and filters. Instantiated by the use of multi-page structure query language (e.g., Boolean) and the ubiquitous goal of obtaining an appropriate “working set” of data, these processes were born from the need to meet critical decision timelines within a computationally inadequate environment. Cloud techniques and technologies can now be used to work on all the data. And with an ability to leverage the power of a supercomputer at will, the working set requirement is now an anachronism and critical decision timelines can now be more easily met. Cloud computing can uniquely address important issues associated with mission support— particularly related to its ability to remove information silos among various organizations that have joined forces on the same mission. Moving IT operations to the cloud assists in enhanced collaboration to meet mission needs. It is critical to our national defense. As a bonus, cloud computing also can improve IT enterprise efficiencies and incur marked cost savings during project lifecycles to alleviate some of the pressure of budget reductions for the defense and intelligence agencies. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 3
  • 4. Introduction Cloud computing is a new approach in the provisioning and consumption of information technology (IT). While technology is a crucial component, the real value of cloud computing lies in its ability to enable new capabilities or in the execution of current capabilities in more efficient and effective ways. Although the current hype around cloud computing has focused on expected cost savings, the true value is really found in the mission and business enhancements these techniques can provide. When properly deployed, the cloud computing model provides greatly enhanced mission and business capability without a commensurate increase in resource (time, people or money) expenditures. Cloud Computing: Changing the Game The use of commodity components, coupled with highly automated controls, enable cloud computing.1 These characteristics also enable the economic model that makes it so disruptive to the status quo. As an example, the software-as-a-service cloud delivery model typically does not require any advance usage commitment or long-term contractual arrangements. SaaS not only changes the typical software vendor business model, but also radically changes the strategy, budgeting, buying and management options for the buyer. When Salesforce.com proved the viability of SaaS, the software subscription model was instantly endangered as a profitable business model. Amazon Web Services is similarly attacking data center hosting with its Virtual Private Datacenter Infrastructure as a Service (IaaS) offering. Different cloud computing deployment models are actually changing what it means to be an IT professional … This transition puts the enterprise IT professional into a service management role, responsible for helping his or her internal customers better use externally provided IT services. Looking at this phenomenon from another angle, different cloud computing deployment models are actually changing what it means to be an IT professional. Since the days of the first computer, IT workers have prided themselves in their ability to design, build, operate and fix the enterprise hardware and software components that comprise the IT lifeblood of organizations—both in the public and private sectors. These tightly knit teams worked hard to keep these custom-made platforms updated, patched and ready to meet daily business and mission requirements. In the cloud computing world, IT infrastructure that is not delivering differentiating value is viewed as worthless cost. Critical business applications like email, Customer Resource Management (CRM), Human Resource Management and Enterprise Resource Planning are being routed to more capable cloud providers of these same services. This transition puts the enterprise IT professional into a service management role, responsible for helping his or her internal customers better use externally provided IT services. The new enterprise IT department is more a services organization than the traditional delivery organization. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 4
  • 5. The new cloud economic model also radically changes the view of what’s actually possible. Traditional IT procurement and provisioning processes have historically driven timelines associated with the delivery or fielding of improved information and data processing capabilities. Multiple threads of development, test, training and maintenance can also tax an organization’s short- and long-term financial resources. IaaS and Platform as a Service options can not only eliminate or limit capital expenditures, but can reduce or eliminate the expectation of operations and sustainment costs. The time required to realize mission or business value also is substantially reduced. With these differences, the impossible can suddenly become not only possible, but often can lead to new mission capabilities or brand-new cloud-enabled, revenue-generating businesses. Challenges of Cloud Computing Despite the myriad benefits of cloud computing solutions, several challenges still exist. Being a young industry, there are few tools, procedures or standard data formats or service interfaces in place to guarantee data, computer application and service portability. As evidenced with the recent situation involving the services failure of Amazon’s Elastic Compute Cloud, outages can be a potential risk—and can have widespread implications for consumers of cloud services. This risk becomes even more severe if a mission-critical environment could be impacted. A benefit as well as a challenge, security concerns have also slowed the widespread adoption of cloud computing. A variety of security concerns exist. According to the article, “Three Cloud Computing Risks to Consider,” in Information Security Magazine (June 2009), “the logging and auditing controls provided by some [cloud] vendors are not yet as robust as the logging providing within enterprises and enterprise applications,” which can put critical and sensitive data and information at risk. Security, of course, becomes increasingly critical in defense and intelligence IT environments. For the government market, the lack of regulations and compliance standards are also cause for concern. Currently, no federal regulations are in place to govern cloud computing, and according to an April 2011 Information Systems Audit and Control Association survey of 1,800 Chief Information Officers (CIOs), compliance is a top risk. Approximately 30 percent of the CIOs surveyed said that “compliance projects are the biggest driver for IT risk-related projects”—particularly in public clouds. Specific to federal environments, data sovereignty is a challenge. According to a speech given by former Federal CIO Vivek Kundra at an April 7, 2010, National Institute of Standards and Technology (NIST) forum," [Data sovereignty] is not going to be a question of technology. [Data sovereignty] is going to be a question of international law, and treaties that we will need to engage in the coming years.” CIO Kundra later added: “We've got a very diverse interpretation and a very diverse perspective when it comes to privacy or international security, if you look at our neighbors—Canada or Mexico—versus what's happening in the European Union.” NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 5
  • 6. Cloud Computing and the Federal Government The Obama administration has identified cloud computing as a means to achieve savings in IT budgets across federal agencies—across the board—and to address various other challenges (e.g., delays to capabilities and other inefficiencies) that have negatively impacted IT implementations. In his Fiscal Year (FY) 2011 budget, President Barack Obama ordered a three-year freeze in spending for non-defense, intelligence and national security programs and the trimming of the budgets of some federal agencies by five percent. At a July 1, 2010, House subcommittee hearing, CIO Kundra testified: “To do more than less [in terms for federal spending], we need game changing technologies. Cloud computing is one such technology.” The federal government is in the early stages of a decade-long process to “move to the cloud,” but has taken definitive steps in its adoption. Several key milestones have been achieved during the past two years in support of this effort:  2009: Establishment of the General Services Administration (GSA) Cloud Computing Program Office to coordinate the government’s cloud computing efforts; assembly of a public-private sector Industry Summit to discuss the benefits and risks of cloud computing; and creation of Security and Standards Working Groups to encourage collaboration and discussion on cloud computing by federal agencies  2010: Commencement of the development of federal security certification and accreditation processes for cloud services; convening of a NIST-hosted, public-private sector “Cloud Computing Forum and Workshop” to collaboratively develop cloud standards; release of 25-point federal IT reform plan; announcement by GSA and Federal Chief Information Officers Council on the requirements for the Federal Risk and Authorization Management Program, a standard approach for the federal government to access and authorize secure cloud-computing services and products  2011: Release of the Federal Cloud Computing Strategy (per the Obama administration’s 25-point IT reform plan) and award of 12 GSA IaaS blanket purchase agreements The Obama administration adopted a “cloud-first” policy as part of its earlier referenced 25- point federal IT reform plan. This plan was developed after extensive review of federal IT projects with a particularly hard eye on 26 large-scale projects at risk due to being over budget and behind schedule. This policy is part of the 2012 budget process. Source: 25-Point Implementation Plan to Reform Federal One of the first steps in the “cloud-first” Information Technology Management, February 2009 adoption is the requirement for every federal agency to develop and implement one cloud-based solution by December 2011 and three cloud-based solutions by June 2012. As of April 2011, agencies are making progress in this endeavor. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 6
  • 7. During a special White House event, CIO Kundra said that CIOs from 15 agencies have already informed the Office of Management and Budget that they will evolve to cloud-based email solutions by the December 2011 deadline. Cloud computing also has been identified by the Obama administration as a viable solution to the administration’s challenge to cut the federal budget via the consolidation of 800 of the government’s 2,094 data centers by 2015. CIO Kundra has specifically identified cloud computing as a central measure to reduce the costs and increase the efficiencies of federal data centers. Cost savings are already being achieved. At an April 12, 2011 Senate subcommittee hearing, Dave McClure, Associate Administrator, GSA Office of Citizen Services and Innovative Technologies, testified that the consolidation of just 12 data centers to three will save $2 million a year. Mr. McClure also testified that GSA’s move to a cloud-based email system will save $15 million over the Source: “Federal Cloud Computing Strategy,” Office of the U.S. next five years. Chief Information Officer, Executive Office of the President of the United States, Feb. 14, 2011 So, whether or not federal agency CIOs support cloud computing, the evolution to the cloud in their specific IT environments is not something to consider in the future: it is something to undertake today—and is mandated. Therefore, the way the federal government conceives of IT operations must change from traditional practices and operating systems to new enterprise resource controls, standards and business processes and operations. With the computing stacks functioning as a utility within the infrastructure as a platform and new business processes in place, highly automated resources provide the extensible platform needed to meet agency or mission needs. Cloud Transition Lessons Learned While the benefits and value of the federal cloud computing policy can be debated, the world’s transition to cloud computing as an integral component of any IT infrastructure cannot be denied. The prudent government executive should, therefore, heed the lessons learned from the many private industry corporations that already have miles behind them on this journey. When identifying a potential cloud computing project, one should always count on a multi-year transition. Organizations should always use a consistent cloud opportunity identification process to reduce the risk of project failure by leveraging data from successful cloud implementations. Clients need to determine set metrics (economic, operational and service) with direct linkage to specific mission requirement(s). Use of a gate-driven cloud adoption process designed to terminate failed projects early in the project lifecycle and deliver measurable capabilities within a quick timeframe (weeks—not years) is highly recommended. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 7
  • 8. A risk mitigation plan also must be formalized that addresses each of the following concerns:2  Loss of Governance. When moving to a cloud environment, clients relinquish control to the CP on a number of security-related issues. A gap in security defenses may also exist as service level agreements may not adequately address CP-related security requirements.  Portability. Issues related to provider lock in are outlined in the Challenges section of this white paper on page 5.  Isolation Failure. Multi-tenancy and collaboration are at the core of cloud computing. Resource isolation failure addresses mechanisms separating storage, memory, routing and reputation among different clients on the same cloud (e.g., guest-hopping attacks). However, it must be noted that attacks on these mechanisms are not as pervasive and much more difficult to attempt versus attacks on traditional operating systems.  Compliance Risks. Investments in certifications (e.g., industry standard or regulatory requirements) may be compromised or lost when moving to the cloud.  Management Interface Compromise. Security is an issue with client management interfaces with the public cloud provider. The reason? These services are provided via the internet and permit access to a larger set of resources than traditional operating systems. Security risk can dramatically increase when this is combined with remote access and web browser vulnerabilities.  Data Protection. It may be difficult for clients to effectively check the data-handling practices of their CPs to ensure critical and sensitive data is handled lawfully and ethically. This problem can be aggravated in cases of multiple transfers of data (e.g., between federated clouds). However, it must be noted that some CPs share information on their data-handling practices with clients and others offer certification summaries on their data processing and data security activities and their various security controls (e.g., Statement on Auditing Standards 70 Certification.  Insecure or Incomplete Data Deletion. As with most operating systems, when a request to remove a cloud resource is made, a true erase of data may not happen. Adequate or timely data deletion also may not be feasible (or undesirable from a client perspective) because extra copies of data are stored but not readily available or the disk to be destroyed also houses other data from other clients. When multi-tenancies and the reuse of hardware resources are added to the mix, this risk can increase.  Malicious Insider. Cloud architectures necessitate the creation of certain staff positions (e.g., CP system administrators and managed security service providers) that can be extremely high risk in terms of internal security threats. Frequently observed signs for failure should be avoided  Lack of formal planning process  Missing or poor IT governance  Poor or missing responsibility matrix  Neglecting the human resource management challenges  No established program/project management office  Missing inventory of assets  Lack of executive oversight  Lack of established service level agreements (especially in multiple cloud provider scenarios) NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 8
  • 9. Creating a Cloud Computing Roadmap for Federal Agencies First Steps According to, GovCloud: Cloud Computing for the Business of Government, when a government agency is ready to undertake the implementation of a cloud-based solution, it must determine which IT services, business functions and processes to deploy in the cloud environment. A five-year roadmap should be created that includes the desired order to move each of the services to the cloud for each year during that time period.3 Requirements for each service to be deployed in the cloud should be developed and a cost/benefits analysis performed to establish the rationale why each targeted service should move to the cloud. Implementation of a Low-Risk Test Case A low-risk test case should be implemented prior to undertaking a wholesale transfer of services to the cloud.4 This is harder than it may sound as some IT services that may seem simple to deploy to the cloud are not so easy. Four questions should be asked (and answered) to decide which IT services are best suited to live in the cloud5: 1. Can compliance requirements be balanced with other IT prioirities? 2. Is this an IT function or service the agency has mastered? 3. Can the agency use a standardized service? 4. Is the test case easily implementable? A misconception may exist that just because an application or service being deployed to the cloud isn’t mission critical, the process will be simple and straightforward. This is not always true. If the agency is new to the cloud and wishes to establish a private cloud it will take time to determine the appropriate split of responsibilities between the service provider and the agency’s IT team.6 Compliance and liability issues can also be tricky, as defining compliance conditions and establishing liability for intellectual property protection with cloud vendors reach well beyond the IT world—and, as such, with so many moving parts may take time to properly address and resolved.7 NIST has launched the U.S. Government Cloud Computing Business Case Working Group to assist agencies with the development of cloud-compatible user cases. Email, geospatial data exchange and services management are among the first user cases currently in development. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 9
  • 10. Additional Recommendations The authors of GovCloud: Cloud Computing for the Business of Government also offer seven recommendations that must be considered during the development and implementation of an agency’s cloud roadmap:  Own the information, even if you own nothing else. An agency must claim its right to own the information even if it doesn’t own the infrastructure, application or service associated with that information. Any agency is liable for its information—regardless of where it lives—and some education will likely be needed about this fact among its IT team. While it may be unrealistic to prevent departments from provisioning their own cloud application, the agency must institute policies and procedures to ensure it can monitor how information deployed to the cloud is managed. As it is often hard to envision future uses of information, it also is recommended that agencies make sure cloud-dwelling data can be brought back into the enterprise if needed.  Don’t take terminology for granted. It is vital to ensure that important terminology is defined in the same way by the agency and the cloud service provider—room for different interpretation always exists. A review of information governance policies must take place to identify the areas of highest risk so authoritative definitions for vocabulary in these areas can be developed and adopted.  Hope for standards, but prepare to integrate. In short, the cloud is young and isn’t established enough to have developed standard specifications for platform interoperability and data exchange. Strategic groundwork for future data integration needs to be laid in the early stages of any movement to the cloud. Agencies must insist that their cloud service providers provide clear documentation on the data formats and schemas used for information storage in their systems.  Control cloud platform proliferation. Agencies should minimize the number of different cloud platforms that require support to limit information fragmentation and decrease the chance of a future huge integration effort. To the greatest extent possible, an agency’s IT team should help departments look for shared requirements in standardized business functions. The team can identify cloud platforms that meet these needs and consolidate the agency’s services on them, when possible. Not only will the ability to share information increase, this will result in greater leverage when negotiating contract terms and pricing.  Make the information “cloud ready.” Agencies that organize their data sets well enough for use across multiple platforms will be best positioned to take advantage of cloud services, and will be better able to deploy enterprise information to the cloud more easily.IT teams need to get into the habit of encrypting data into one common format (probably XML)—a process even more important if data moves through externally operated resources to the cloud.  Master solution integration. The shift to the cloud requires IT professionals to change their focus from owning and operating enterprise systems to becoming master information service integrators. In addition to linking legacy databases to SaaS, IT teams need to connect their private and public clouds to create a seamless technology environment that works like a single cloud custom-made for their specific enterprises. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 10
  • 11. Cloud Computing for Defense and Intelligence The defense and intelligence communities are not immune to cloud computing. Arguably more than any other government agencies, their missions require a fabric of utility computing that scales on demand and enables self discovery and self-service access to secure, timely and relevant information in support of mission: individual or shared. The traditional IT model requires system engineering that binds most software to the hardware and does not provide an enterprise suite of functionality or allow for increased flexibility and a governed lifecycle of services. Designing software independence from the hardware allows an operating system, applications and data to “live” across the enterprise and is fundamental to the transformation of compute, storage and network functionality. Designing software independence from the hardware allows an operating system, applications and data to “live” across the enterprise and is fundamental to the transformation of compute, storage and network functionality. Defense is dealing with a $78 billion budget cut—the first since September 11, 2001—and another $100 billion in other cost-cutting measures over a five-year period commencing in FY 2012. Defense Secretary Robert Gates is directing that the budget be cut from agency administrative and structural areas (e.g., the Office of the Assistant Secretary of Defense for Network Intelligence and Information, the Business Transformation Agency, and the Joint Forces Command are in the process of being eliminated or disestablished with some essential functions transferred to other organizations with the Pentagon). In an official statement on the proposed budget costs provided on January 6, 2011, Secretary Gates said: “First, reforming how the department uses information technology, which costs us about $37 billion a year. At this time all of our bases and headquarters have their own separate IT infrastructure and processes, which drive up costs and create cyber vulnerabilities. The department is planning to consolidate hundreds of data centers and move to a more secure enterprise system, which we estimate could save more than $1 billion a year.” Department of Defense Chief Information Officer Terry Takai also publically commented about the potential IT budget cuts at an April 21, 2011, INPUT event, stating DoD’s support of the move of some of its IT operations to the cloud—particularly data centers. DoD has begun to explore cloud computing through several smaller-scale projects; some of these are outlined in the “Examples of Successful Federal Cloud Solution Implementations” on page 13. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 11
  • 12. Cloud Computing and Mission Support Information is often the decisive discriminator in modern conflict. Studies of recent mission failures highlighted this fact, finding that many of these failures were caused by:  Existence of data silos  Human-based document exploitation process  Reliance on “operationally proven” processes and filters typically used to address the lack of computational power or decision time Also disturbing is that in most of these cases, the critical piece of information necessary for mission was in possession. The failure wasn’t in obtaining the information, but in locating and applying it to the mission at hand. Cloud computing uniquely addresses all of these important issues. Data silos evolved from a system-centric IT procurement policy and an almost reflexive reliance on relational database technology. In developing early data processing systems, the high cost of memory and storage led to a premium being placed on the efficiency of application data access and retrieval. Relational database technology effectively addressed this need, which in turn led to its pervasive use across government. In modern IT system development, memory and storage are cheap—and getting cheaper—which has led to internet-scale storage and search paradigms that are the stuff of everyday use today. The world’s largest databases cannot, in fact, be searched quickly using a relational database management approach. Today’s ability to search multi-petabyte data stores in milliseconds virtually eliminates the need for data silos. This capability is realized in cloud-based storage. Source: United States Army Intelligence and Security Command NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 12
  • 13. Documents are the persistent records of human activity. As such, they are used to provide insight into the societal structure and processes of our opponents. Conflict, however, is entity and event centric. The intelligence professional must, therefore, interpret documents and translate that data into operationally relevant entities and events. The time and resource intensive nature of this skillcraft is perfectly suited for the precision search and analytic capabilities of the modern compute cloud. The use of highly standardized and virtualized commodity infrastructure, not only make the automation of this function possible, but it enables real-time continuous processing of the now digital document flow of our adversaries. This commodity also removes the human from this tedious task, allowing intelligence professionals to apply higher order professional analysis and insight. The human-based document exploitation process led directly to an institutional reliance on the aforementioned “operationally proven” processes and filters. Instantiated by the use of multi-page structure query language and the ubiquitous goal of obtaining an appropriate “working set” of data, these time-honored processes were born from the need to meet critical decision timelines within a computationally inadequate environment. Cloud techniques and technologies can now be used to work on all the data. And with an ability to leverage the power of a supercomputer at will, the working set requirement is now an Source: United States Army Intelligence and Security Command anachronism and critical decision timelines can now be more easily met. Cloud computing is unique in its ability to address these critical defense and intelligence mission needs. That’s why cloud computing is critical to our national defense. As a bonus, cloud computing offers defense and intelligence agencies the ability to increase efficiencies and incur marked cost savings during their lifecycles to alleviate some of the pressure of budget reductions. Moving IT operations to the cloud also will assist in enhanced collaboration. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 13
  • 14. Examples of Successful Cloud Implementations Army Experience Center Pilot Program, United States Army Solution Benefits  Fewer recruiters required to Two years ago, the United States Army initiated a pilot handle the workload of the five program to explore how to better utilize new technologies traditional recruiting centers in support of its marketing and recruiting work. The Army that the AEC replaced Experience Center (AEC) in Philadelphia, PA, uses a variety  Faster application upgrades  Dramatic reduction in hardware of exciting technology—touch-screen career exploration and IT staff expenses kiosks, virtual reality simulators and social networking  Significant increase in staff tools to educate potential recruits about the Army and help productivity them make informed decisions about enlisting. As part of the center operations, the Army needed a customer relationship management system to track prospect engagement (virtual and in person) to help personnel better manage the recruitment and enlistment process. Despite constant updates over the years, the Army’s legacy data system could not be modified to meet the new requirements of the AEC, specifically social networking and other web 2.0 applications, data access from multiple platforms including mobile devices, the tracking of AEC visitor information and the amalgamation of marketing and recruiting data. After reviewing bids from both traditional and “non-traditional” IT vendors, the Army chose a customized version of Salesforce for the pilot program. The annual cost of the pilot is only $54,000—compared to the proposed operational costs from traditional vendors of $500,000 to $1 million a year. This cloud-based, mobility solution CRM tool allows the Army to track potential recruits as they participate in the different virtual activities in the AEC, and recruits can remain engaged with recruiters after they leave the center through social media and email. Due to the mobility of the platform, recruiters also can access potential recruit information anytime and anywhere. Rapid Access Computing Environment, Defense Information Systems Agency Solution Benefits  Avoidance of high start-up costs and The Defense Information Systems Agency made the leap additional ROI through software reuse to the cloud by establishing the Rapid Access Computing  Savings of between $200,000 and $500,000 Environment in 2008. RACE is the agency’s secure, per project due to rapid project start-ups at stable, private cloud that utilizes virtual server lower costs technology to provide on-demand server space for  An estimated $15 million in cost avoidance development teams. RACE is made up of several virtual by using open source software that provides servers co-located in a single physical server. for software reuse and collaborative development—in addition to lower funds for licensing and support  Improved software for agency users by providing version control and traceability NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 14
  • 15. RACE, which uses virtual server technology to provide on-demand server space for development teams, aims to be more secure and stable than a traditional public cloud. RACE consists of many virtual servers inside a single physical server. Within this virtual environment that meets DoD security standards, customers use a self-service portal to provision computing resources in 50 GB increments. The cost for RACE access is reasonable and can be established with an approved government-issued credit card. RACE offers the same level service and availability as a traditional server environment. Since RACE was implemented, hundreds of military applications, including command and control systems, convoy control systems and satellite programs have been developed and tested on this cloud-based solution. Forge.mil Program, DISA Solution Benefits  Cost savings by dividing the costs of Forge.mil is the secure software development provisioning and operating one environment established by DISA designed to provide physical server among several DoD with tools and services to rapidly develop, test and virtual servers deploy new software and systems. CollabNet provided  Rapid provisioning of functional DISA with a cloud-based software development platform server space to users (24 hours), to allow customers to reuse and collaborate on software compared to a traditional dedicated code. To date, forge.mil manages more than 5,000 users server environment (three to six with more than 300 open source projects, 500 file weeks) release posts and 30,000 downloads.  Improved security through built-in application separation controls so all applications, databases and web Forge.mil hosts an array of projects for different DoD servers are separated, and a strict agencies, including the Army, Navy, Air Force, Marine data cleaning process Corps and the Joint Chiefs of Staff. Personnel Services Delivery Transformation, Air Force Personnel Center Solution Benefits: Due to the mandated manpower reduction initiative, the  Savings of $4 million annually Air Force Personnel Center had to find a new, viable way to  Seventy percent increase in deliver human resource tools and services, while customer engagement in the improving customer experiences by providing self-service knowledge base solutions and the ability to track customer needs. AFPC  Reduction on the time required for decided that the SaaS solution by RightNow was the customers to find answers from solution necessary for improved knowledge management, more than 15,000 documents on case and contact center tracking and the ability to meet file: from 20 minutes to only two client survey mission requirements. minutes. After implementation of the RightNow solution, customer searches on the knowledge base have risen to nearly 2 million per week. This cloud-based platform also provides the ability to scale services to meet fluctuating demand without any impact to customer experience. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 15
  • 16. Appendix 1: References 1. Mell, Peter, and Grance, Timothy. “The NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards and Technology.” January 2011. Jackson, Kevin L., and Philpott, Don. GovCloud: Cloud Computing for the Business of Government: Desk Reference, March 2011 2. “Cloud Computing: Benefits, Risks and Recommendations for Information Security.” European Network and Information Security Agency. November 2009. 3. Jackson, Kevin L., and Philpott. Don. GovCloud: Cloud Computing for the Business of Government: Desk Reference, March 2011. 4. Jackson, Kevin L., and Philpott. Don. GovCloud: Cloud Computing for the Business of Government: Desk Reference, March 2011. 5. Jackson, Kevin L., and Philpott. Don. GovCloud: Cloud Computing for the Business of Government: Desk Reference, March 2011. 6. Jackson, Kevin L., and Philpott. Don. GovCloud: Cloud Computing for the Business of Government: Desk Reference, March 2011. 7. Jackson, Kevin L., and Philpott. Don. GovCloud: Cloud Computing for the Business of Government: Desk Reference, March 2011. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 16
  • 17. Appendix 2: Cloud Computing Resources Info.apps.gov (http://www.info.apps.gov/node/19) Federal Cloud Computing Initiative (http://www.info.apps.gov/node/2) Federal Risk and Authorization Management Program (FedRAMP) – (http://www.info.apps.gov/content/federal-risk-and-authorization-management-program- fedramp) Cloud Computing Resources (http://www.info.apps.gov/node/14) “Cloud Musings by Kevin L. Jackson” (http://kevinljackson.blogspot.com/) “Cloud Musings on Forbes” (http://blogs.forbes.com/kevinjackson/) “Government Cloud Computing on Ulitzer”(http://govcloud.ulitzer.com/) NIST Business Use Case Template (https://collaborate.nist.gov/twiki-cloud- computing/bin/view/cloudcomputing/businessusecasescall03) NIST Computer Security Division, Computer Security Resource Center, Cloud Computing (http://csrc.nist.gov/groups/SNS/cloud-computing/) NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 17
  • 18. About the Author Kevin Jackson is General Manager, Cloud Services, at NJVC. Before joining the company, Mr. Jackson served in various senior management positions with Dataline, LLC; Cryptek, Inc.; IBM; and JP Morgan Chase. Recently, he was named a “Cyber Security Visionary” by U.S. Black Engineer and Information Technology magazine. Mr. Jackson is the founder and author of “Cloud Musings” (http://kevinljackson.blogspot.com) and “Cloud Musings on Forbes” (http://blogs.forbes.com/kevinjackson), a Forbes magazine online blog dedicated to public sector cloud computing. He is also founder and editor of “Government Cloud Computing on Ulitzer“ electronic magazine (http://govcloud.ulitzer.com ). His first book, GovCloud: Cloud Computing for the Business of Government was released in spring 2011. Mr. Jackson has been deeply involved in the broad collaborative effort between industry and the U.S. National Institute of Standards and Technology on the federal government’s adoption of cloud computing technologies. He is the Network Centric Operations Industry Consortium’s Cloud Computing Working Group Chairman. About NJVC NJVC is one of the largest information technology solutions providers supporting the U.S. Department of Defense. We provide innovative and high-quality IT solutions to the government and commercial organizations, and specialize in supporting highly secure IT enterprises, particularly for the intelligence and defense communities. To learn more, visit www.njvc.com. NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 18
  • 19. Headquarters 8614 Westwood Center Dr Suite 300 Vienna, VA 22182 703.556.0110 www.njvc.com NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. © 2011 NJVC, All Rights Reserved 19