Heroes Of The Cloud – Part 9

Heroes Of The Cloud – Part 9

Heroes of the Cloud – Part 9Cloud Heroes

A study of Cloud Computing should include not only the companies and entrepreneurs who have raised the Cloud from a concept to “the next big thing” in Information Technology. The study should also include those who have come to depend on the power of the Cloud.

Earlier in our look at the pioneers of Cloud Computing… (1 2 3 4 5 6 7 8) we partially defined “The Cloud” as a metaphor for the Internet. Another very workable definition would be that the Cloud is a tool for handling Big Data. Big Data is loosely defined as data sets that include from a few dozen terabytes to several petabytes. How much information is that? If you carry your contacts, pictures, music, games and files on an 8G microSD card in your smart phone, then 131,072 of your friends would need to combine their phones to equal a single terabyte.

Spy movies and James Bond gadgets aside, the national intelligence services are built around information, that is to say data. To perform their mission, a huge amount of information must be gathered, stored, analyzed, and eventually disseminated to the proper parties. At every stage, the information must also be protected ion the interest of national security.

While all of the intelligence services are in the information business, perhaps the most data intensive is the National Reconnaissance Office. The NRO develops and operates “overhead reconnaissance systems”. In other words, the NRO runs spy satellites.

The NRO is a hybrid organization composed of military members, Central Intelligence Agency staff, and DoD Civilian personnel. The NRO’s Chief Information Officer, , was recently awarded a Life Time Achievement “Legacy” Award from CloudNOW.

CloudNOW (Network of Women) is a non-profit consortium of leading women in Cloud Computing. The award was announced in conjunction with the March 2013 Women’s History Month Celebration.

Ms. Singer has held a number of Senior IT Leadership positions in the Federal Government. Previous to joining the NRO, she was Deputy CIO with the CIA, responsible for ensuring that the Agency had the Information Infrastructure necessary to accomplish its mission. Ms. Singer also served the State Department as the Director of Diplomatic Telecommunications Services.

With her background in the Intelligence service, Ms. Singer is intimately familiar with Cloud Security concerns. She writes Recent trends in cloud computing demonstrate the architecture has matured and offers distinct advantages for cyber security defense.

By Peter Knight

Sorry, comments are closed for this post.

Did The FBI Make A Mistake In Publicly Fighting Apple?

Did The FBI Make A Mistake In Publicly Fighting Apple?

Dropping The Gloves: The FBI vs Apple Unless you live in a completely disconnected bubble, you’ve heard all about the recent battle between Apple and the FBI. You’ve heard the arguments from different sides —you’ve probably even debated on one side or the other. Some argued that Apple was right because nothing should come above…

Connecting To Information With Cyber Physical Systems

Connecting To Information With Cyber Physical Systems

CPS Device Trends On The Rise It isn’t, “Do you remember who starred in XYZ Movie?” It’s, “Can you look it up please?” “Did you ever think you would sit at the dinner table, and when a question came up, someone would look up the answer and share it with everyone?” The words echoed at…

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise There is no longer any subjectivity in this statement: security is at the top of list for all CIOs. Every meeting I’ve attended over the last three months has been dominated by the topic of security and when it’s injected into the conversation, it’s not necessarily by my team, but the…

What Technology Can Displace The Password?

What Technology Can Displace The Password?

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some people might say that multi-factor authentications or ID federations will do it. It is not…

The True Power And Potential Of Wearables

The True Power And Potential Of Wearables

The Power of Wearables The potential of wearable computing for efficiency and innovation is enormous. For business leaders and CIOs, wearable technology represents an opportunity to find more intelligent solutions to real problems and to leverage these devices for the benefit of the organization. But before wearables can successfully realize these expectations, there remain basic…

The Evolution Of The Connected Cloud

The Evolution Of The Connected Cloud

The Connected Cloud Cloud computing is interesting first, but not only, because of the prevalence of cloud projects. There are many of them launched every day. Some have lofty expectations for business benefits (cost saving of 20 percent or more) and others carry even more intriguing goals. In 2005 “the cloud” was new. Shared computing…

From Startup To Becoming Enterprise Grade

From Startup To Becoming Enterprise Grade

Becoming Enterprise Grade How can an emerging business make a successful transition from selling to SMB customers that fueled their early growth to the enterprise customers that enable long-term profitability? What works with SMB customers often won’t get you a seat at the enterprise table. To make deep inroads into enterprise accounts, you have to…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor