Heroes Of The Cloud – Part 9

Heroes Of The Cloud – Part 9

Heroes of the Cloud – Part 9Cloud Heroes

A study of Cloud Computing should include not only the companies and entrepreneurs who have raised the Cloud from a concept to “the next big thing” in Information Technology. The study should also include those who have come to depend on the power of the Cloud.

Earlier in our look at the pioneers of Cloud Computing… (1 2 3 4 5 6 7 8) we partially defined “The Cloud” as a metaphor for the Internet. Another very workable definition would be that the Cloud is a tool for handling Big Data. Big Data is loosely defined as data sets that include from a few dozen terabytes to several petabytes. How much information is that? If you carry your contacts, pictures, music, games and files on an 8G microSD card in your smart phone, then 131,072 of your friends would need to combine their phones to equal a single terabyte.

Spy movies and James Bond gadgets aside, the national intelligence services are built around information, that is to say data. To perform their mission, a huge amount of information must be gathered, stored, analyzed, and eventually disseminated to the proper parties. At every stage, the information must also be protected ion the interest of national security.

While all of the intelligence services are in the information business, perhaps the most data intensive is the National Reconnaissance Office. The NRO develops and operates “overhead reconnaissance systems”. In other words, the NRO runs spy satellites.

The NRO is a hybrid organization composed of military members, Central Intelligence Agency staff, and DoD Civilian personnel. The NRO’s Chief Information Officer, , was recently awarded a Life Time Achievement “Legacy” Award from CloudNOW.

CloudNOW (Network of Women) is a non-profit consortium of leading women in Cloud Computing. The award was announced in conjunction with the March 2013 Women’s History Month Celebration.

Ms. Singer has held a number of Senior IT Leadership positions in the Federal Government. Previous to joining the NRO, she was Deputy CIO with the CIA, responsible for ensuring that the Agency had the Information Infrastructure necessary to accomplish its mission. Ms. Singer also served the State Department as the Director of Diplomatic Telecommunications Services.

With her background in the Intelligence service, Ms. Singer is intimately familiar with Cloud Security concerns. She writes Recent trends in cloud computing demonstrate the architecture has matured and offers distinct advantages for cyber security defense.

By Peter Knight

Sorry, comments are closed for this post.

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…