Cloud Computing is revolutionizing today's business marketplace. While "learning the art of the possible", corporate executives today are struggling with the business and security challenges associate with this important transition. Just last month, Dell released its first Global Technology Adoption Index (GTAI) which indicated that 97% of organizations surveyed use or plan to use cloud. This high percentage is not surprising given that the data also showed a strong correlation between cloud use and company growth. Of those using cloud, 72 percent of organizations surveyed experienced 6 percent growth or more in the last three years, with just 4% experiencing zero or negative growth.
↧
Federal Tech Talk: Cloud Transition Challenges in Government and Industry
↧
ITIL in 7 Minutes!
What is ITIL & how can it benefit your organization? Learn the answers to these questions plus gain an understanding of the ITIL Service Lifecycle in this video.
↧
↧
Security Attacks and Countermeasures by @DrSandraKJ | @CloudExpo [#Cloud]
Cyber security is rapidly becoming a significant issue in the C-suite as well as the population at large. The results of Dell's Global Technology Adoption Index(GTAI) [1] show that security is a top concern for most of the 2000 global small and medium businesses surveyed. The outcomes further noted that such concerns create barriers to the adoption of critical technologies that drive value and growth: mobility, cloud and big data. In fact, many businesses are unprepared to address their potential security issues.
↧
Technology and the Evolving Workforce By @Kevin_Jackson | @CloudExpo [#Cloud]
According to a Greer Institute Workforce and Talent study, the 2020 workforce is both "the most educated and culturally diverse of any generation" and "notorious job-hoppers who dislike bureaucracy and distrust traditional hierarchies." Given this, it is crucial for leaders to understand how best to motivate and engage this 2020 workforce and win the war for top talent.
To prepare for the globally distributed, highly collaborative, always on-the-go 2020 workforce, leaders need to start building the kind of workplace that can harness all this new technology. One of the most impactful places to start changing the way your company plans for, hires, and engages its talent is by understanding what is already possible with today's cloud, mobile, and social technologies. The new workforce has a relentless consumer-grade expectation for mobile, social, and globally accessible tools with ubiquitous access to work. These expectations are challenging HR and IT leaders to deploy technology solutions to attract, retain, and manage their workforce while creating a collaborative, engaging employee experience.
↧
Cloud Security: Understanding the Cloud Computing Threat Landscape
In the last two years, IT security breaches have hit the White House, the State Department, the top federal intelligence agency, the largest American bank, the top hospital operator, energy companies, retailers and even the Postal Service. Melvin Greer, Senior Fellow and Chief Strategist Lockheed Martin, and author of numerous publications will detail the new cloud computing threat landscape.
↧
↧
Agile Is Not the Absence of ITIL By @JodiKohut | @DevOpsSummit [#DevOps]
ITIL (formerly known as the Information Technology Infrastructure Library) has been the best management practices framework of choice for world class IT Operations organizations. The 5 stage framework: Service Strategy, Design, Transition, Operation, and Continual Service improvement allows for structured processes that support Enterprise Architecture, Service Delivery, and Security initiatives. Structured and controlled planning and change are the bywords here.
↧
Invest in IT Security Culture Change By @Kevin_Jackson | @CloudExpo [#Cloud]
With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increase. Some 61% of over 1600 security expert respondents to a recent survey said "yes" that a major attack causing widespread harm would occur by 2025,according to the Pew Research study. The cold hard fact, however, is that fear of the cyberterrorist and hackers, while definitely valid, is mostly misplaced. I hold this contrarian view, because when you pull back the curtain on many of the recent breaches, you'll likely see a mirror.
↧
South Asia’s Biggest Tech Event
I am proud and honored to announce that I have been added as a speaker at SouthAsia's biggest tech event "Digital World 2015" , 9th - 12th February, 2015 at the Bangabandhu International Conference Center Dhaka, Bangladesh. The event will also be attended by the Honorable Prime Minister of Bangladesh Sheikh Hasina along with local and International Ministers.
↧
A Vets 360 Benefit
The Veterans 360 mission is to support our young combat veterans as they integrate into civilian life. In line with their four pronged approach (engagement, education, employment, and healing), and to help veterans get the skills necessary to obtain employment with a solid future, they leading the way with emerging technology courses.
↧
↧
CloudCamp Bangladesh In Dhaka! - February 11, 2015
Did you know that.....
- Goldman Sachs recognized Bangladesh as one of the Next Eleven (N-11) - a list of eleven countries having strong potential for becoming the world's largest economies along with BRIC (Brazil, Russia, India and China)?
- JP Morgan named Bangladesh as one of the `Frontier Five’ (along with Vietnam, Kazakhstan, Kenya and Nigeria), a group of selected emerging countries having promising macroeconomic performance and demographic trends?
- European Commission has included Bangladesh as one of the top 20 IT outsourcing destinations?
- Bangladesh has been enlisted in the Gartner’s report as one of the top 30 IT outsourcing destinations?
The line-up will include:
- The Open Source Cloud– Dave Nielsen
- Is MEAN Stack the new LAMP Stack?– Details and Comparison : Things we need to know
- Application in the Cloud– Shripad Nadgowda
- Building a Cloud for the Government : Agile, Scalable, Secured and Usable– Kevin Jackson
- A Cloud for the Government of Bangladesh – Rapidly Emerging, Growing and Evolving Panelist – Dave Nielsen, Kevin Jackson, Shripad Nadgowda, Ashraful Haque, Tarique Barkatullah
Moderated by Mohammad Zaman
( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2012)
↧
Learn How To Buy Cloud From GovLoop & ViON
"Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since the transaction doesn’t involve any physical entity, procedures and processes associated with the inspection, acceptance, inventory and management of IT may not apply. New parallel policies that apply to virtual the delivery of virtual services must, instead, be developed and put in place."
Do you know how to buy cloud?
- What are the common procurement misconceptions?
- What key terms you need to be looking for in a cloud?
- What are the common cloud procurement mistakes and how do we avoid them?
- How do we write cloud computing procurements?
- What are the different types of cloud and what are the best procurement methodologies for each?
- What is FedRAMP and what does it mean to me?
Date: Thursday, February 19, 2015
Time: 8:30 AM - 11:30 AM ET
Location: Renaissance Washington, DC Downtown Hotel
999 Ninth St, NW
Washington, DC 20001
( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2012)
↧
Mobile Device Security: A New Frontier for Hackers | @CloudExpo [#Cloud]
Recent security breaches have heightened our awareness of cybersecurity issues. The hack and other security breaches have resulted in unprecedented damages. However, the majority of mobile device users have yet to be sensitized to their personal and corporate security risks.
For example, a security study found that 69 percent of users store sensitive personal information on their mobile devices. Examples include banking information, confidential work-related items and provocative videos and photos. In addition, 51 percent of mobile device consumers share usernames and passwords with family, friends and colleagues. This in spite of the fact that 80 percent of such devices are unprotected by security software.
While mobile device security attacks are relatively small, they are the new frontier for hackers. Listed below are highlights from several mobile device surveys:
↧
2015 National Chief Information Security Officer Survey
Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO).
In order to better understand the challenges and concerns of this critical professional community, the 2015 National CISO Survey is now being conducted. Commissioned by the National Cybersecurity Institute at Excelsior College, this data will be used to develop and publish actionable information for use by the day to day cybersecurity professionals.
↧
↧
African-Americans and STEM Careers: Getting a Foot in the Door
Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realization of such promises has not benefited all segments of the U.S. population, including African-Americans. As we celebrate Black History Month, I share a few facts on this issue, suggest sources for solutions and profile African-American technology trailblazers.
↧
Circles Are Good for the Economy By @Kevin_Jackson | @CloudExpo [#Cloud]
Contrary to what your mother may have told you, going in circles is sometimes a good thing. When it comes to our economy, it is actually a great thing.
Throughout history, society has built itself up by transforming raw materials into finished, usable products. This manufacturing process has always been linear in that:
Materials (sand, iron, gold, etc.) are evaluated for purpose and taken from nature.
Modified and refined as necessary, these materials are combined and recombined into the services and products we use every day, until...
Their usefulness to society wanes and the everyday products and services are disposed of in a heap of useless trash.
↧
U.S. DOD Sets Cloud Security Guidelines By @JodiKohut | @CloudExpo [#Cloud]
Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines the security requirements that Department of Defense (DOD) mission owners must adhere to when procuring cloud-based services. While the document is very thorough and is required reading if you currently, or intend to provide, cloud-based services to the DOD, I wanted to cover some of the things that stood out to me.
↧
The Emerging Science of Digital Forensics | @CloudExpo [#Cloud]
Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal responsibilities associated with cybersecurity. The consumerization of IT and the adoption of cloud, mobile and social media by enterprise organizations is opening a new threat landscape and new threat vectors. Everyone is affected and everyone is talking about it, from senior executives to teenagers.
↧
↧
Introducing CloudTek University | @CloudExpo [#Cloud]
This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.
↧
Bangladesh: A Country Transforms with IT | @CloudExpo [#Cloud]
Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of 180 million is now on a mission to become a regional information technology powerhouse. Paralleling this focus, in February 2015 the government approved the National Information and Communication Technology policy, which seeks to establish clarity and accountability through the expansion of information and communication technology (ICT). This policy also aims at making Bangladesh a mid-income nation by 2021 and a developed nation by 2041.
↧
PlexHosted Unveils New Cloud Offerings to Enhance Collaboration
PlexHosted, a developer of robust managed cloud-hosting solutions for better enterprise collaboration, today unveiled enhanced cloud offerings solutions for business, ensuring the cloud is both practical and affordable to organizations of all sizes.
Cloud migration can be daunting for small and mid-sized businesses, especially when faced with expensive service offerings from large vendors and filled with capabilities they don't need. PlexHosted's new hosting solutions provide the same quality of management as larger vendors, but at a much more attractive price.
PlexHosted's new standalone farms start at $279 per month, which is 10% less than its nearest competitor. It's two-tier farms (from $628), three-tier farms (from $877), and HA farms (from $1,799) also all show significant savings from average market prices. Those fees include 24/7 server(s) and services monitoring as part of the service - there are no additional set-up and hourly support fees as found at many other vendors. PlexHosted delivers cloud IaaS solutions and manages the farm all at one low monthly price.
↧