Welcome!

Agile Computing Authors: Peter Silva, Elizabeth White, Pat Romanski, Gerardo A Dada, Liz McMillan

Related Topics: IBM Cloud, @CloudExpo

IBM Cloud: Article

Government IT & Cloud Computing: Themes for Discussion

I will definitely highlight this dialog and will also leave a listing of all comments for Mr. Kundra's review

Cloud Musings

A little over a week ago I put out a request to my readers to help me with my meeting with Vivek Kundra.  The response has been awesome!Thank you for your suggestions and recommendations, both public and private. Below, in purely random order, are just some of the comments I've received. If you want to add your voice to the choir, I'll be taking comments through Tuesday evening, May 26th.  During my meeting, I will definitely highlight this dialog and will also leave a listing of all comments for Mr. Kundra's review.

-----------------------------------------------------------------------------------------------

Lewis Shepherd:

Let me just suggest a little thing I'd like Vivek to keep in mind as a guiding principle for open government: Choice.

What do I mean? Government agencies, as they modernize to approach the agility and performance of great commercial IT shops, will be looking to cloud-solution (and other) providers for "business value and choice in a mixed-source world," in the words of Microsoft's Teresa Carlson. The agency CIOs and CTOs whom Vivek leads need the flexibility to choose the best tools to accomplish their mission regardless of platform. I'd hate to see a "one-size-fits-all" prescribed solution (even if it were based on Microsoft products!), and I think we'll all benefit from a balanced approach with appropriate choice and flexibility reserved for smart CIOs.

Jason Matthew McNutt:

I think in order for the govt to adopt such a broad technology there needs to be standards set for interoperability and security first. We all know that standards boards tend to lag behind real world implementations. But in this case the consequences of not going forward with agreed upon security and interop standards is very dangerous.

What has worked with other technologies is lighting a torch underneath the vendors to get together and provide a set of standards before any govt contracts are let. Sometimes providing that carrot (big carrot) is essential to get everyone in the same room. Good luck with your meeting, very cool!

AJ Malik:

I believe a frank discussion on open source initiatives, with respect to Grid Computing, will be productive. For example, the Open Grid Services Architecture (OGSA), a product of the Grid community at large, represents an evolution towards a Grid system architecture based on Web services concepts and technologies. Furthermore, Data Access and Integration Services (DAIS) is another emerging standard (e.g. WS-DAIR, WS-DAIX) to access and integrate data, within a grid environment, that could drive a unified federated data architecture. All have limited implementations, but are "shovel ready."

Pollock:
  • Does he plan to provide additional mandates related to IPv6 - will he take the next step?
  • Is there a Federal Wide Cloud computing strategy to optimize and outsource government run IT shops.
  • Does he plan to implement BAA compliance in addition to TAA compliance for IT monies in the stimulus package? (at the fed level)
  • Any plans to align government with industry best practices to improve service delivery to the public? Agencies should be creating a roadmap for the network infrastructure that will allow them to rapidly deploy new applications to improve business processes and provide quality public services.
  • Does each agency have a network infrastructure that is capable of handling the applications needed to improve operational efficiency anywhere, anytime, anyplace in support of the mission? This is job number one, every agency must have an agile mission fabric, none of the other things that follow will work well without it.
  • Who is best to provide oversight, implementation, and ongoing maintenance for a given application? We should always be asking the WHO question, modeling industry, and avoiding business as usual.
Alex Stobart:

From the UK there are some open source business processes designed and operating between citizen and government. The main issue with most of our ICT in government is that hitherto procurement has been proprietary ( Oracle ; Microsoft ; EDS ), expensive and completely un-scalable. Each agency has bought its own set.
  • A NGO called mysociety did most of the open source, rich content and user-friendly work http://www.mysociety.org/
  • There is a petitions site to the Prime Minister which has had over 9 million votes
  • There is a fantastic process to write to your elected representative ( local, state , federal ) http://www.writetothem.com/
  • There is a method to report any issue to your local government ( poor street lighting ; graffiti etc.) http://www.fixmystreet.com/
These are all shovel ready and would be immediately transferable to the USA

The other process that you might wish to replicate, or suggest, involves re-coding government data. It was called the Re-Wired State, and a list of projects is here - http://rewiredstate.org/projects

The projects listed demonstrate the intent. How successful you can be will depend on how much data the government lets go.

Other suggestions - facebook for jobs ( after all it is just a market with bids and offers ) ;

You won't manage to have comparable financials across agencies until you have a standardised General Ledger ( something the health service in UK has battled with since 1948 )

Sun's star office suite never took off ; in the UK not many people use pbwiki in government but it seems really successful and ning we use a lot. We are looking at how mental health service users might create ning groups to exchange content, information and collaborate. Their carers or families could also be involved, as eventually might employers and state agencies. To start with, it is the service users only as they are the most motivated to help one another.

Andrew H. LaVanway:

If only the problems here were technology problems. This model has been called a lot of different things over the last decade, but it always seems to fail at SLAs, security, and the unwillingness of leadership to give up their own IT infrastructures. If the PM office tackles just the first two, it will be major progress but still a little short of the change that needs to happen.

Now might be just the right time for a mandate - the business case here is off the charts.

Adam Arthur:

I don't understand why they can't arrange the data to "scatter" across the cloud. If someone hacked into one node, they would only get a "piece" of the information. You would have to be given admin permissions to accurately "piece" the whole picture together. We are doing this with the public health grid at the NCPHI lab at CDC. Seems pretty safe to me.

Guy Martin:

I'd suggest you take a look at what DISA has done with the RACE (Rapid Access Computing Environment) effort they are bringing online, as well as its companion application development environment (http://disa.mil/forge).

While these are specific examples, I think you'll find interesting information to help you in your meeting with Mr. Kundra. DISA has already been thinking a lot about this already.

Ari Herzog:

[Does Mr. Kundra think] the goal should be to build and adopt new technological standards to gain efficiency/effectiveness or to amend current infrastructure and rewrite policies so such technologies have an easier chance of adoption.

[W]here does he stand on the notion of a "one web" solution for the entire executive branch, i.e. instead of individual departments acting like silos with their own social technologies, shouldn't there be an Administration-wide direction and initiative in one?

Deb Lavoy:

[H]ow about working on giving more support to adoption of collaborative and social media tools within the agencies - encouraging the technical, legal and cultural issues that agencies need to get over.

Susan Clizbe:

I would second Ms. [Deb] Lavoy, and add what to me is almost embarrassingly basic: an immediate solution to the ban on thumb drives. Perhaps the ban itself can't be resolved that quickly, but surely there is some way to train and trust people who truly need this technology to do their jobs every day. We in Public Affairs are hampered by the inability to move photos from camera to computer, and I have read about med techs with handheld computers in the field whose issue is not just job-critical but life-critical to their patients.

Savitha Manohar:

Driving innovation and standardization with a view to improving efficiency is a lofty goal. But change is painful- especially for the folks that have to practice this in their work everyday. Compliance can be enforced, but in order to ensure that folks understand the strategy and are committed to realizing the efficiencies, the human component has to be taken into account. It is challenging to change a culture where every agency/department is used to following their own standards to have to now start adhering to a new centralized standard. Pilot initiatives have to go beyond the notion of "one size fits all". Will there be plans to make sure that the resources that have to use this are on board?

Khürt:

There is more to securing "cloud computing" than a bunch of policies and directives. What is your disaster recovery and continuity plan for when the cloud service suffers a failure? Since the data lives in the "cloud", can you be assured that you know "where" it it? I guess the answers depend on your definition of "cloud".

 


( Thank you. If you enjoyed this article, get free updates by email or RSS - KLJ )

More Stories By Kevin Jackson

Kevin Jackson, founder of the GovCloud Network, is an independent technology and business consultant specializing in mission critical solutions. He has served in various senior management positions including VP & GM Cloud Services NJVC, Worldwide Sales Executive for IBM and VP Program Management Office at JP Morgan Chase. His formal education includes MSEE (Computer Engineering), MA National Security & Strategic Studies and a BS Aerospace Engineering. Jackson graduated from the United States Naval Academy in 1979 and retired from the US Navy earning specialties in Space Systems Engineering, Airborne Logistics and Airborne Command and Control. He also served with the National Reconnaissance Office, Operational Support Office, providing tactical support to Navy and Marine Corps forces worldwide. Kevin is the founder and author of “Cloud Musings”, a widely followed blog that focuses on the use of cloud computing by the Federal government. He is also the editor and founder of “Government Cloud Computing” electronic magazine, published at Ulitzer.com. To set up an appointment CLICK HERE

@ThingsExpo Stories
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, discussed how VPaaS enables you to move fast, creating scalable video experiences that reach your aud...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effici...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...