Air Force and Army Clouds Debate: Commercial or Gov’t?

Air Force and Army Clouds Debate: Commercial or Gov’t?

It is now official: cloud computing now has serious gov cred. We recently learned that the Air Force was strongly considering the possibility of leaping into the cloud, as a strategy to slash the girth of maintenance and operations in their budget, as well as to tighten security measures. Many readers will wince at that last aim; cloud computing and great security are hardly synonymous, they will muse. The Air Force has nevertheless honed in on several of the cloud’s virtues from a military perspective.

These advantages may lie in cloud’s capacity for “zero” and “thin clients;” the former entails the classic cloud computing setup of just a keyboard, monitor, and mouse, no additional processor to be found. A “thin client” expands on the “zero client” with the addition of an integrated processor, ideal for graphics and media — which might come in handy for an everyday military operation, we think. (Wink, wink.)

Both the cloud’s “zero” and “thin” clients would actually enhance security. The lack of physical processing power prevents someone from uploading software, reducing the risk of virus contraction. Updating these computing units is a snap via the cloud, since one click can disseminate a major change to all relevant units. The clients would also liberate Air Force personnel to flit between computer terminals more quickly, since their data would be stored — and protected — up yonder.

Word recently broke that the Army has also worked up a notion to hop aboard the cloud. The imposing military branch presented nine cloud-enabled companies with contracts, including Hewlett Packard, IBM, and Northrop Grumman. Like the Air Force, the Army is seeking to slim down and economize. Unlike the Air Force, the Army appears to have already decided to focus on the possibilities of a commercially nurtured cloud. The airborne military branch continues to waver in a decision between a commercial or government cloud provider.

Commercial cloud computing, the Air Force holds, would offer a greater amount of monetary savings. A government cloud proposal, in contrast, could lead to more taut barriers vis-a-vis data protection and security. It’s a choice of frugality against frugality over defense, both of which are key aims that the military at large looks to espouse.

We leave it to you readers: if you were heading the Air Force, which type of cloud structure would you select?

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

One Response to Air Force and Army Clouds Debate: Commercial or Gov’t?

  1. Jeff, great article. I was wondering if you had any insight into why the Air Force believe commercial cloud computing would be less expensive. What type of competitive edge do firms like IBM have over incumbents like Raytheon and Lockheed?

On Demand With The Gig Economy

On Demand With The Gig Economy

The Gig Economy By now, you’ve probably heard the phrase Gig Economy or seen services offered as “on-demand”. If you’re like 90 million Americans, then you’ve participated in this freelance workforce revolution as either a client or provider. The rise of apps connecting professional services, goods, and lodging directly to consumers via their smartphone is…

5 Cloud-Based Customer Service Trends

5 Cloud-Based Customer Service Trends

Customer Service Trends Customer service has become the new battleground in today’s marketplace. In fact, 97 percent of customers around the world now say that customer service makes a key difference in whether they decide to go with a brand or not, Microsoft reports. Many of the biggest changes in today’s customer service landscape center…

Conquering Disease with Artificial Intelligence and IBM Watson

Conquering Disease with Artificial Intelligence and IBM Watson

Artificial Intelligence and IBM Watson Artificial Intelligence, or AI, is growing increasingly pervasive in today’s modern world. Perhaps the most publicized and recognizable application of AI to date, IBM’s Jeopardy-winning computer, Watson, is now being used to help cure cancer. IBM announced the development of Watson for Genomics on Wednesday at the National Cancer Moonshot…

The Fundamentals of Predictive Analysis

The Fundamentals of Predictive Analysis

Predictive Analysis  Article sponsored by SAS Software and Big Data Forum Analytics is playing an increasingly important role in our lives thanks in large part to internet of things (IoT) developments and a greater appreciation of Big Data. With solutions that range across business productivity, health care, individual and national security, new insights are regularly…

Clouding Around With The Unicorns

Clouding Around With The Unicorns

The Social Unicorn Early investors and technology consumers alike love the poignantly named “Unicorn” companies, or private startups that reach the $1 billion valuation. The most recent unicorn spotting is social media game-changer Snapchat, which was recently valued at $16 billion. According to a recent infographic from Alexa discovered via Adweek, Snapchat also proves to…

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it is the rainy period. Unfortunately Sao Paulo is very dependent on its rain as a majority of its power is generated from large dams. No water, no energy. Difficult situation for a city of some…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Verizon Cloud Report Enterprises using the cloud, even for mission-critical projects, is no longer new or unusual. It’s now firmly established as a reliable workhorse for an organization and one that can deliver great value and drive transformation. That’s according to a new report from Verizon entitled “State of the Market: Enterprise Cloud 2016.” which…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…