Air Force and Army Clouds Debate: Commercial or Gov’t?

Air Force and Army Clouds Debate: Commercial or Gov’t?

It is now official: cloud computing now has serious gov cred. We recently learned that the Air Force was strongly considering the possibility of leaping into the cloud, as a strategy to slash the girth of maintenance and operations in their budget, as well as to tighten security measures. Many readers will wince at that last aim; cloud computing and great security are hardly synonymous, they will muse. The Air Force has nevertheless honed in on several of the cloud’s virtues from a military perspective.

These advantages may lie in cloud’s capacity for “zero” and “thin clients;” the former entails the classic cloud computing setup of just a keyboard, monitor, and mouse, no additional processor to be found. A “thin client” expands on the “zero client” with the addition of an integrated processor, ideal for graphics and media — which might come in handy for an everyday military operation, we think. (Wink, wink.)

Both the cloud’s “zero” and “thin” clients would actually enhance security. The lack of physical processing power prevents someone from uploading software, reducing the risk of virus contraction. Updating these computing units is a snap via the cloud, since one click can disseminate a major change to all relevant units. The clients would also liberate Air Force personnel to flit between computer terminals more quickly, since their data would be stored — and protected — up yonder.

Word recently broke that the Army has also worked up a notion to hop aboard the cloud. The imposing military branch presented nine cloud-enabled companies with contracts, including Hewlett Packard, IBM, and Northrop Grumman. Like the Air Force, the Army is seeking to slim down and economize. Unlike the Air Force, the Army appears to have already decided to focus on the possibilities of a commercially nurtured cloud. The airborne military branch continues to waver in a decision between a commercial or government cloud provider.

Commercial cloud computing, the Air Force holds, would offer a greater amount of monetary savings. A government cloud proposal, in contrast, could lead to more taut barriers vis-a-vis data protection and security. It’s a choice of frugality against frugality over defense, both of which are key aims that the military at large looks to espouse.

We leave it to you readers: if you were heading the Air Force, which type of cloud structure would you select?

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…