Microservices Expo Authors: Liz McMillan, Pat Romanski, Carmen Gonzalez, Elizabeth White, Jason Bloomberg

Related Topics: Cloud Security, @CloudExpo, Government Cloud

Cloud Security: Blog Feed Post

Enterprise Architecture Key to Avoiding Cloud Computing

AFCEA Federal Cloud Computing Environment Forum

GovIT at Cloud Expo

Attendance at today's Armed Forces Communications and Electronics Association (AFCEA) Bethesda Chapter Breakfast Series entitled "Federal Cloud Computing Environments – Modernizing IT Systems" was very heavy, as viewed from the Blackstone Technology Group sponsored table.

The panel discussion and DC Federal IT community networking conversation revolved around the push to promote and adopt cloud computing as part of the Obama administration’s effort to modernize the government’s information technology systems, and to help reduce the $75 billion annual budget for Federal IT in the process.

The event panelists held an informative and rigorous discussion about how cloud computing is enabling IT professionals (government and industry) to rethink the packaging, delivery and operation of government services, and is changing the landscape of government IT infrastructure management and streamlining system, network and storage management.

Panelists included Casey Coleman (Moderator - Chief Information Officer, General Services Administration), Chris Kemp (CIO, NASA Ames Research Center), Alfred Rivera (Director - Computing Services Directorate, Defense Information Systems Agency or DISA), Keith Trippie (Executive Director - Enterprise System Development Office (ESDO), Office of the CIO, Department of Homeland Security), and Peter Tseronis (Associate CIO, Department of Energy).

Quite a bit of conversation centered on the precept that Enterprise Architecture is absolutely critical for Cloud Computing success.

EA helps translate OMB’s IT Investment guidance and Component mission business models into an operational language that more effectively guides IT retooling to support cloud computing concepts such as self-provisioning, software-as-a-service (SaaS), and shared SOA services.

Whether a Cloud Computing program and infrastructure is implemented to provision infrastructure for laboratory scientists (e.g. NASA’s Nebula Program), or for enabling rapid self-provisioning of elastic, scalable, and virtual services to front-line Warfighters (e.g. DISA’s Rapid Access Computing Environment, or “RACE” Program

); the business and socialization challenges are similar.

According to the panelists, many Federal programs aren’t yet able to operationalize their Enterprise Architecture, by executing coordinated, efficient IT procurements informed by an enterprise-wide, standards-based, comprehensive and easily understood business case. “This is Enterprise Architecture’s time”…and EA is key to avoiding cloud proliferation, sprawl or otherwise redundant IT governance and investments (and finding ways to leverage existing, underutilized infrastructure investments as GFE in new cloud-computing acquisition strategies).

While most discussion centered on the “brutal standardization” required for cloud-based IT Infrastructure Management and Services, additional conversation developed concerning more customer-centric and application-oriented objectives, i.e. "Software as a Service" or SaaS. In particular, the DHS ESDO is embarking on a major initiative to fulfill DHS objectives for delivering customer-centric applications and information services on demand, governed by the Department's rapidly evolving Services-Oriented Architecture (SOA) Enterprise Architecture and Homeland Security Information-Sharing initiatives (Federal EA SOA ESB governance initiatives that Blackstone Technology Group is helping to drive across the Department.)

Conversation also addressed issues relating to Security Certification & Accreditation (C&A) challenges – particularly the rapidly-growing tension between “consumerism of IT” (i.e. user expectations that government services offer commercial features and public data) and information or application sensitivity. Currently mandated security processes and controls aren’t necessarily compatible with the “elastic” properties of cloud implementation, i.e. the on-demand utilization or release of IT resources through dynamic infrastructure configuration. Also, perceived risks far more often stand in the way of cloud-computing security policies, vs. actual risks – this therefore requires much more effort on the part of “translators” bridging the gap between business and technology, i.e. the Enterprise Architects.

Read the original blog entry...

More Stories By Ted McLaughlan

Summary: Currently a Federal Enterprise Architect with Oracle, Ted has over 25 years in Commercial and Government Information Technology with University of Virginia, EDS, Accenture, KME Internet Marketing, Blackstone Technology Group, NavigationArts and CSC; additional focus recently on Interactive Design, Web 2.0 Internet Marketing, SEO, Social Media and Advertising. Specialties: Enterprise Architecture and Information Management, SOA/ESB, Enterprise Integration, Business Intelligence, Internet Safety and Security, Family Content Networks, Knowledge Management and Collaboration, User-Defined Operational Pictures/Common Operating Pictures (UDOP/COP), Situational Awareness, Portals, Internet Marketing and Search Engine Optimization (SEO), Website Design/Development and Optimization - Certified Systems Engineer - Certified Enterprise Solution Architect

Microservices Articles
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, will discuss why containers should be paired with new architectural practices such as microservices ra...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin, ...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lav...
Many organizations are now looking to DevOps maturity models to gauge their DevOps adoption and compare their maturity to their peers. However, as enterprise organizations rush to adopt DevOps, moving past experimentation to embrace it at scale, they are in danger of falling into the trap that they have fallen into time and time again. Unfortunately, we've seen this movie before, and we know how it ends: badly.
TCP (Transmission Control Protocol) is a common and reliable transmission protocol on the Internet. TCP was introduced in the 70s by Stanford University for US Defense to establish connectivity between distributed systems to maintain a backup of defense information. At the time, TCP was introduced to communicate amongst a selected set of devices for a smaller dataset over shorter distances. As the Internet evolved, however, the number of applications and users, and the types of data accessed and...