IBM Awarded 10 Year $1 Billion Foundation Cloud Hosting Services Contract

IBM AWARDED 10 YEAR $1 BILLION FOUNDATION CLOUD HOSTING SERVICES CONTRACT TO ASSIST US DEPARTMENT OF INTERIOR’S MOVE TO CLOUD COMPUTING

AUGUST 14, 2013 — ARMONK, NY – IBM today announced it will work with the United States Department of the Interior (US DOI) as the Department embarks on a decade long transformation of their information technology (IT) systems to a cloud computing model. As part of an indefinite delivery/indefinite quantity (IDIQ) contract, valued for IBM up to $1 billion, the Department may use IBM cloud computing technologies, services and hosting as the foundation of their next generation infrastructure.

IBM’s solution for the DOI is based on the company’s secure and high availability Federal Data Center capabilities using open computing and process standards. The US DOI will leverage IBM expertise in data storage, secure file transfer, virtual machines, database, web hosting, development testing and SAP Application Hosting. The Department will also be able to tap IBM’s Smart Cloud for Government hosted at the IBM Federal Data Center, the Smart Cloud for Enterprise (SCE) commercial offerings and the very cost competitive IBM AIX Cloud.

IBM has been delivering trusted and secure cloud services to business and government clients for decades, and working with virtualization technologies for more than 40 years,” said Anne Altman, General Manager, IBM US Federal. “Our Cloud offerings are backed by a long history of successful work in hardware, software and services wrapped in world renowned security offerings, unmatched R&D, and secure supply chains. We’re committed to infusing these capabilities, proven security and reliability, and leading-edge technology into our work with the US Department of the Interior over the next decade.”

Other US government agencies can also gain access to these IBM Cloud solutions via the DOI Foundation Cloud Hosting Services vehicle. The vehicle also allows request for quotes/task orders to be issued on behalf of other government customers including both civilian agencies and the Department of Defense.

The US DOI is the steward of 20 percent of the Nation’s land. On these 500 million acres are 397 units of the national park system, 556 national wildlife refuges, 21 national conservation areas and 16 national monuments. In addition, the Department is the largest supplier and manager of water in 17 states overseeing 476 dams and 348 reservoirs; manages the land, subsurface rights and offshore areas that produce approximately 24% of the Nation’s energy; and maintains relationships with 566 federally recognized Native American tribes with a population of 1.7M people.

The sixteen Bureaus and Offices that manage this mission spend in excess of $1B a year on IT. In a period of declining budgets the Department is shifting to a management model for IT that moves from fixed to variable, assets to services and mission impact instead of IT service metrics. The Department has a public commitment to save $100M a year from 2016 to 2021 and then use those savings to fund investments in new business capabilities and applications.

About IBM Cloud Computing

IBM has helped thousands of clients adopt cloud models and manages millions of cloud based transactions every day. IBM assists clients in areas as diverse as banking, communications, healthcare and government to build their own clouds or securely tap into IBM cloud-based business and infrastructure services. IBM is unique in bringing together key cloud technologies, deep process knowledge, a broad portfolio of cloud solutions, and a network of global delivery centers.

For more information about cloud offerings from IBM, visit http://www.ibm.com/smartcloud

 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…