The memorandum provides guidance for Navy and Marine Corps commands on using emerging web tools, called Web 2.0, to facilitate collaboration and information sharing. It endorses the secure use of Web 2.0 tools like wikis, blogs, and RSS feeds to improve communication, processes, and productivity. Commands are encouraged to use these tools if consistent with security and privacy policies, and should contact information assurance and privacy officials for implementation advice. Content must be appropriately classified and commands are responsible for monitoring content.
Accelerate your websites and Web applications with unmatched performance and real-time control, through Cotendo’s integrated suite of CDN and Site Acceleration services. Cotendo Advanced DNS (Domain Name Service) reduces latency, scales seamlessly for every audience size and geography, and enhances service availability. Cotendo’s distributed service model provides another layer of security for your website and web applications. DNS queries can be flexibly handled based on rules (location, time) and real-time conditions.
A Smarter Content Delivery System To Accelerate Complex Contentgyanendra1
Traditional CDNs were designed to accelerate static objects on a website by architecting the site to store the static objects in a different host location, away from the main site, CNAME-ing only that host to the CDN provider. This separation was crucial, as the CDN handled only the static pages, and the non-cacheable objects were served directly from the origin server. However, this approach is inherently inefficient, as it requires modification of the existing site. It is also error prone as links–internal or external–may still direct to the original host.
A quick view of Atlanta copywriter and marketing communications consultant Dawn Richerson's portfolio. Samples for corporate, nonprofit, and small business clients and past employers.
The RestFS is an experimental project to develop an open-source distributed filesystem for large environments. It is designed to scale up from a single server to thousand of nodes and delivering a high availability storage system with special features for high i/o performance and network optimization for work better in WAN environment. The Restfs is pure-python, but several of the libraries that it depends upon use C extensions (sometimes for speed, sometimes to interface to pre-existing C libraries). The Project is on the beginning stage, with some technology previews released.
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell
File-based data is growing faster, consuming more space and being retained longer than ever before. Attend this session to find out how you can tame the file storage beast! You'll be introduced to the unique new offering from Novell, Novell File Management Suite, and how it can help you reduce storage infrastructure costs, save man hours, enhance existing investments in storage hardware and software, and improve compliance.
Accelerate your websites and Web applications with unmatched performance and real-time control, through Cotendo’s integrated suite of CDN and Site Acceleration services. Cotendo Advanced DNS (Domain Name Service) reduces latency, scales seamlessly for every audience size and geography, and enhances service availability. Cotendo’s distributed service model provides another layer of security for your website and web applications. DNS queries can be flexibly handled based on rules (location, time) and real-time conditions.
A Smarter Content Delivery System To Accelerate Complex Contentgyanendra1
Traditional CDNs were designed to accelerate static objects on a website by architecting the site to store the static objects in a different host location, away from the main site, CNAME-ing only that host to the CDN provider. This separation was crucial, as the CDN handled only the static pages, and the non-cacheable objects were served directly from the origin server. However, this approach is inherently inefficient, as it requires modification of the existing site. It is also error prone as links–internal or external–may still direct to the original host.
A quick view of Atlanta copywriter and marketing communications consultant Dawn Richerson's portfolio. Samples for corporate, nonprofit, and small business clients and past employers.
The RestFS is an experimental project to develop an open-source distributed filesystem for large environments. It is designed to scale up from a single server to thousand of nodes and delivering a high availability storage system with special features for high i/o performance and network optimization for work better in WAN environment. The Restfs is pure-python, but several of the libraries that it depends upon use C extensions (sometimes for speed, sometimes to interface to pre-existing C libraries). The Project is on the beginning stage, with some technology previews released.
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell
File-based data is growing faster, consuming more space and being retained longer than ever before. Attend this session to find out how you can tame the file storage beast! You'll be introduced to the unique new offering from Novell, Novell File Management Suite, and how it can help you reduce storage infrastructure costs, save man hours, enhance existing investments in storage hardware and software, and improve compliance.
Eric and Alain review the past year, and the key improvements for Nuxeo. They review main technical changes, new customers and results for the company in 2014.
Presentation to Local Government GIS Officers on the Potential for Open Source in GIS. Its a huge one.. grasp it with open arms.. think about standards... standards... standards..
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
The Technology adoptions in the Cloud are overwhelming . The global shift towards the Cloud is also overwhelming! It is important to build the stronger walls of Security around the Cloud.......
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
TWCSIRT is a full member of FIRST and mainly focuses on the protection of NARLabs, TANet and TWAREN. We are defense cyber-attack from internet and according to government policy to handling incident every day. I am a research fellow with National Center for High-performance Computing and lead cyber security team to operation security operation center to handling incident in Taiwan Academic Network.
In our research project from government, we are deployed the biggest honeynet in Taiwan and used over 6000 IP address to detection malicious network attack come from internet.
We have published our malware knowledge base to sharing malware samples and reports for many researchers, students, research center and sharing our data set for deep tracking about cyber security.
There are many new types of cyber-attack that’s is include ransomware, website mining, DDoS and hybrid malicious attack.
Main Points:
- What’s TWCSIRT Mission and Scope
- How to coordinate in National level with ISAC, CERT and SOC
- Cyber-attack and threat hunting in Taiwan Academic Network
- How to develop cyber security platform for incident handling
- How to do red team and blue team training by CDX
OpenStack and Cloud Foundry - Pair the leading open source IaaS and PaaSDaniel Krook
OpenStack is the leading open source Infrastructure-as-a-Service, and Cloud Foundry has become the leading open source Platform-as-a-Service. Deploying them together is a natural fit for your next generation systems of engagement.
This special joint meetup of the OpenStack NY and NYC Cloud Foundry communities will give both audiences an introduction to these popular open source IaaS and PaaS projects.
The presentation will describe the compelling advantages of each technology, and then explain how they can be integrated, optimized, and scaled to provide a complete cloud application hosting solution.
Eric and Alain review the past year, and the key improvements for Nuxeo. They review main technical changes, new customers and results for the company in 2014.
Presentation to Local Government GIS Officers on the Potential for Open Source in GIS. Its a huge one.. grasp it with open arms.. think about standards... standards... standards..
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
The Technology adoptions in the Cloud are overwhelming . The global shift towards the Cloud is also overwhelming! It is important to build the stronger walls of Security around the Cloud.......
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
TWCSIRT is a full member of FIRST and mainly focuses on the protection of NARLabs, TANet and TWAREN. We are defense cyber-attack from internet and according to government policy to handling incident every day. I am a research fellow with National Center for High-performance Computing and lead cyber security team to operation security operation center to handling incident in Taiwan Academic Network.
In our research project from government, we are deployed the biggest honeynet in Taiwan and used over 6000 IP address to detection malicious network attack come from internet.
We have published our malware knowledge base to sharing malware samples and reports for many researchers, students, research center and sharing our data set for deep tracking about cyber security.
There are many new types of cyber-attack that’s is include ransomware, website mining, DDoS and hybrid malicious attack.
Main Points:
- What’s TWCSIRT Mission and Scope
- How to coordinate in National level with ISAC, CERT and SOC
- Cyber-attack and threat hunting in Taiwan Academic Network
- How to develop cyber security platform for incident handling
- How to do red team and blue team training by CDX
OpenStack and Cloud Foundry - Pair the leading open source IaaS and PaaSDaniel Krook
OpenStack is the leading open source Infrastructure-as-a-Service, and Cloud Foundry has become the leading open source Platform-as-a-Service. Deploying them together is a natural fit for your next generation systems of engagement.
This special joint meetup of the OpenStack NY and NYC Cloud Foundry communities will give both audiences an introduction to these popular open source IaaS and PaaS projects.
The presentation will describe the compelling advantages of each technology, and then explain how they can be integrated, optimized, and scaled to provide a complete cloud application hosting solution.
1. DEPARTMENTOFTHENAVY
CHIEF INFORMATION OFFICER
1000 NAVY PENTAGON
WASHINGTON DC 20350-1000
20 October 2008
MEMORANDUM FOR DISTRIBUTION
Subj: WEB 2.0 - UTILIZING NEW WEB TOOLS
Encl: (I) Example Web 2.0 Tools and Uses
The purpose of this memorandum is to provide initial guidance for all Navy and Marine
Corps commands regarding the use of emerging web tools to facilitate collaboration and
information sharing in the Department of the Navy (DON). These tools, described in enclosure
(I), include wikis, blogs, mash ups, web feeds (such as, Really Simple Syndication and Rich Site
Summary (RSS) feeds), and forums, which are often referred to as components of "Web 2.0" and
can significantly enhance mission effectiveness through collaboration.
The Department endorses the secure use of Web 2.0 tools to enhance communication,
collaboration, and information exchange; streamline processes; and foster productivity
improvements. Use ofthese tools supports Department of Defense (DoD) and DON goals of
achieving an interoperable, net-centric environment by improving the warfighter's effectiveness
through seamless access to critical information. Web 2.0 tools are useful in a global enterprise,
such as the DON,' as they enable widely dispersed commands and personnel to more effectively
collaborate and share information. The gains in productivity, efficiency, and innovation can be
significant. Commands are encouraged to use Web 2.0 tools, consistent with applicable laws,
regulations, and policies. Policy regarding the use of Web 2.0 components on public facing
websites is promulgated by the Chief ofInformation and can be found in Secretary of the Navy
Instruction (SECNAVINST) 5720.47.
While these collaborative tools present many useful opportunities, their application must
not compromise data confidentiality and integrity. SIPRNET provides a secure environment to
operate Web 2.0 tools; however, NIPRNET is exposed to external threats that could adversely
impact Web 2.0 tool operation and data integrity. Therefore, extra care must be taken when
implernenting Web 2.0 technologies or integrating these tools into the DON environment.
Commands must adhere to existing information assurance (lA) and privacy policy, guidance, and
best practices. To assist in identifying risks associated with implementation and providing
advice on secure implementation, please contact, the appropriate IA Manager and Privacy Act
Official. In addition, DON personnel must contact their appropriate Designated Accrediting
Authority (DAA) for a final risk acceptance decision, prior to production implementation.
Commands are reminded that web-based collaboration is intended for information
sharing within the DON and that content not approved for public release must be conducted on
sites that are restricted to users with DoD Public Key Infrastructure (PKI) certificates and
approved external PKI certificates, as appropriate, to support authentication procedures. Web
2.0 solutions and sites must be authorized, monitored/moderated, and data must be appropriately
classified/tagged for privacy and confidentiality, including Controlled Unclassified Information
(CUI) and national security classification. As the content owners, commands are responsible for
2. Subj: WEB 2.0 - UTILIZING NEW WEB TOOLS
monitoring and maintaining web content. Users are responsible for posting and using content in
accordance with applicable ethics, lA, and privacy laws, regulations, and policies. Information
intended for public release will be approved first by the Command's release authority, usually
the Public Affairs Officer.
Web 2.0 tools can significantly improve warfighter communication and effectiveness
through a suite of web-based tools that are robust and resistant to compromise. Additional policy
and guidance regarding Web 2.0 emerging technologies is forthcoming. The DON Chief
Information Officer (CIO) point of contact for Web 2.0 is Mr. Brian Burns, Deputy CIO for
Emerging Technology who can be reached at Brian.P.Burns@Navy.mil or 703-602-6545.
@el.;
Distribution:
Immediate Office of the Secretary (ASN(M&RA), ASN(RD&A), ASN(I&E), ASN(FM&C),
AAUSN)
Dept of the Navy Staff Offices (OPP A, JAG, OLA, CHINFO, AUDGEN, CNR, NAVINSGEN)
GC
CNO (N09, DNS, N091, N093, N095, N097, Nl, N2, N3/5, N4; N6, N8)
CMC (ACMC, ARI, M&RA, I, I&L, PP&O, C4, P&R)
COMUSFLTFORCOM
COMUSNAVEUR
COMPACFLT
USNA
COMUSNAVCENT
COMNAVRESFORCOM
COMNAVAIRSYSCOM
BUMED
NETC
COMNAVSEASYSCOM
FLDSUPPACT
COMNAVSUPSYSCOM
DIRSSP
CNIC
COMNAVLEGSVCCOM
NAVPGSCOL
COMNAVFACENGCOM
COMNAVSAFECEN
BUPERS
NAVWARCOL
COMUSNAVSO
2
3. Subj: WEB 2.0 - UTILIZING NEW WEB TOOLS
Distribution: (continued)
ONI
COMNAVSPECWARCOM
COMSPAWARSYSCOM
COMNAVDIST
NAVHISTCEN
NAVY BAND
COMOPTEVFOR
COMNAVNETWARCOM
COMMARFOREUR
COMMARCORSYSCOM
COMMARFORPAC
COMMARFORLANT
COMMARFORRES
MCNOSC
MCCDC
3
4. Example Web 2.0 Tools and Uses
Note: DON CIa does not endorse the use or imply preference for any vendor commercial
products or services.
Technolozv Definition Examnle Common Use
Web 2.0
Technologies
Web 2.0 - While many definitions of • Remote Access
Web 2.0 exist, it is consistently (Telework, Pandemic,
characterized as the collection of Web Active Duty Station)
tools that facilitate collaboration and
information sharing. Although open
access is cousidered a hallmark of Web
2.0, within the context of the DON
mission, these tools must be utilized in
a restricted environment.
Blog Blog provides the ability to • STRATCOM SKYWEB • Customer Relationship
disseminate a message or information • OGC Online Management
to a worldwide audience (or a
command)
• ProcessIrnproveDlent
• Organizational
Assessment
• Information Sharinz
Cloud Cloud Compnting -Uses Internet • Google Docs (vendor) • Unlimited common
Computing hosted applications rather than locally uses
installed annlications
Mash Up Mash Up - Web application that • DHS Virtual Alabama • Collaborative Analysis
combines data and/or functionality • Business.gov • Geographical data
from multiple sources, such as • Google Earth (vendor) • Trend Analysis
geographical map data with other • Google Maps (vendor)
lexical data and images • WikiCrimes (vendor)
Podcast Podcast ~ Digital media files • CNO Podcast • News and Current
distributed over the Internet using • Navy/Marine Corps Video Events
syndication feeds for playback on News • Broadcasts
portable media players and computers.
(source:
• All Hands Radio News • Training
http://en.wikipedia.orgiwiki/Podcast)
• Navy Vidbits • Information Sharing
RSS Feed RSS Feed - Really Simple Syndication • All Hands Television • News and Current
and Rich Site Summary publish • Every Day in the Navy Events
frequently updated (syndicated) works • Headline News • Alerts
to multiple venues • Images of the Day • Subscription Topics
• Top Stories
• Navy Times
• Marine Corns Times
Social Social Networking - Tool used to • Defense Knowledge Online • Knowledge
Networking COIU1ect people who share the same (DKO) Management
professional interests and activities • Defense Connect Online • Subject Matter
through the use of web-based services (DCa or Button 2) Expertise
• E-Collaboration Center • File Sharing
(eCollabCenter or Button I) • Training
• Navy Knowledge Online • References
(NKO) • Data Sharing
• OGC Online
• Max.OMB.Gov
Enclosure (1)
5. • Adobe ConnectNow
(vendor)
o Facebook (vendor)
• Flickr vender)
• MySpace (vendor)
• Twitter(vendor)
• YouTube (vendor)
Wiki Wiki- • Intellipedia • Document Management
Web application for collaborative
development of documents such as
• Wikipedia (vendor) (and Development)
• Adobe Buzzword (vendor) • File Sharing
policies and presentations
• Records Management
• Correspondence
Tracking
• Workflow
• Knowledge
Management
• On-Line Forms
0 Organizational Charts
0 Training
Enclosure (1)