Blueprint 2020: Key Interface Requirements to Develop a Knowledge Sharing Infrastructure for the Public Service Workplace

Size: px
Start display at page:

Download "Blueprint 2020: Key Interface Requirements to Develop a Knowledge Sharing Infrastructure for the Public Service Workplace"

Transcription

1 December Blueprint 2020: Key Interface Requirements to Develop a Knowledge Sharing Infrastructure for the Public Service Workplace Main Text Word Count: 2,327 Matthew Fallon, Sanwara Bilkis, Connor Macdonald, PADM5117: Public Management Carleton University

2 Executive Summary Modern workplaces require effective methods for sharing knowledge and information, both within and outside of the organization. The Government of Canada should take steps to modernize its information and communication technology, and develop a cloud-based storage and file sharing system. Furthermore, simple guidelines on data secrecy and employee accessibility must be developed to ensure the benefits of cloud based solutions are used responsibility and to their fullest potential. Primary risks include maintaining data security, effectively training employees, and encouraging or enforcing employee adoption. These risks are easily manageable and a number of solutions are proposed. II

3 Contents Executive Summary... II 1. Introduction Issue Option Analysis Recommended Solution Guidance for Security Accessibility Usability... 6 A. File Sharing... 6 B. Discussion Forum... 6 C. Project Tracking Risk Assessment Summary... 7 Bibliography... 8 III

4 1. Introduction In an increasingly interconnected world, quick access to digital information is considered paramount for the successful functioning of large organizations. This includes cloud based networking solutions to provide public servants with on-demand access to a centralized pool of computer resources, on which to collaborate, develop, and share information products, in real time, and across hardware platforms. While the Government of Canada is taking several initiatives to modernize its networking infrastructure, (ITAC 2015) such as the creation of GCconnex and GCpedia, these tools have not been universally adopted, and much work remains to utilize the technology to its fullest potential (Treasury Board of Canada, 2010). One of the four key visions for Blueprint 2020 is A modern workplace that makes smart use of new technologies to improve networking, access to data and customer service; (Clerk of the Privy Council 2015). Therefore, the objective of this paper is to define the key requirements for an effective knowledge sharing infrastructure, to define accessibility and usability requirements, and finally to provide a user guide to educate public service employees on proper file sharing guidelines. Without modernizing public service communication tools, our government cannot remain on the forefront of organizational efficiency, productivity, and effectiveness. The rest of the paper is organized as follows: Section two illustrates the current issues and challenges in the public workplace related to knowledge sharing, section three analyzes available options and what other jurisdictions are doing, section four describes the recommended solutions, section five highlights the risks, and finally, section six concludes the paper. 2. Issue One of the essential issues in the public service is file sharing among employees and groups, both within and outside of the organization. Currently, file sharing is usually conducted via attachments (owncloud 2015) or by leaving large files in a shared network drive with highly restricted access. However, this method is difficult to control and comes with an inherent risk of data breaches, making based file sharing methods undesirable to most IT (information technology) departments. In response, IT experts tend to impose constraints on attached file sizes (owncloud 2015). Furthermore, access to vital file directories is frequently a concern due to ambiguity surrounding the level of data secrecy and privacy requirements. In most Federal organizations the definition of secrecy levels for 1

5 internal vs. external sharing tends to be confusing, and employees are often unclear or misinformed on what data, research, and documents are allowed to be shared, and exactly whom can be given access. In some federal organizations, initiatives were previously taken to encourage employees to inter-connect with each other via social media tools, or to develop discussion framework among employees using web-based tools such as wiki (Wallace 2008), GCconnex, and GCpedia. However, these initiatives remain underutilized, largely due to a lack of guidance, effective employee training, adequate tools which met the organizational context, and most importantly, confusion surrounding the classification of data secrecy. In the 21 st century, knowledge sharing is considered one of the most essential instruments to develop a learning infrastructure within an organization. Efficient generation, preservation and distribution of internal knowledge as well as learning opportunities from outside sources are considered a prerequisite for succeeding in innovations and in the evolution of organizations to overcome the new challenges (Gressgård, et al. 2014). Knowledge sharing also plays an important role in increasing employee job satisfaction by contributing to performance improvements, employee motivation, and workplace skills, translating into many organizational rewards and significantly reducing employee retention problems (Kim and Lee 2005, Wei, et al. 2013, Reychav and Weisberg 2009). While employees in private organizations are using state-of-the-art tools for knowledge collaborating and leveraging the benefits of modern technology, the absence of fully adopted tools is hurting the performance of public service employees at all levels. As a result, completed research works are frequently remaining locked within specific groups or individuals, preventing other employees within the organization from taking advantage of pre-existing work. In this sense, valuable human resources and time are getting wasted. Similarly, external researchers, students, and academia could have potentially benefited from many of the internal research work, and other projects completed by federal employees, that could have presented a wide range of public-private collaboration opportunities. 3. Option Analysis To overcome the existing knowledge sharing constraints, the Federal Government should invest resources in developing and improving current file sharing and management systems for public service employees. In terms of implementing such a concept, cloud-computing based file sharing methods appear to be one of the latest technologies that many other countries such as the United Stated have implemented. (King 2015). According to the National Institute of Standards and Technology (NIST), cloud 2

6 computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (ITAC 2015). Cloud-computing is considered as one of the most agile, flexible, and cost-effective options by the technology experts in this field (owncloud 2015, ITAC 2015), where every file can be saved and indexed, and puts IT experts back in control of data and services. Such data can be shared and accessed by any person with approved credentials, from any location around the world, and from any set of network accessible devices (such as Smartphones or computers). However, this does not mean that cloud systems always have to be global or public. Such file sharing clouds can be constrained within an organization with restricted access (private cloud), with the general public with open user access (public cloud), or can take the form of a hybrid model with a mix of content that is shared between private and public cloud infrastructures (ITAC 2015). In the United Kingdom, the government employs a highly fragmented internal communications system with most Central and Local government departments choosing their own method of interaction. However, they do have access to a service called Knowledge-Hub that is an online, cloud based, social networking and collaboration platform, which offers many of the advanced features required in a modern workspace (Capacitygrid 2015). Unfortunately, adoption of this service has been slow, and its effectiveness has been questioned (Marsh 2013). This is not a system Canada should emulate. The Australian government has taken much more successful steps to enable and promote online knowledge sharing initiatives for public servants and government contractors. Their primary web application tool is called Govdex, which provides online, centrally hosted, cloud based solutions such as collaborative spaces, discussion forums, task trackers and resource banks (Govdex 2015). Govdex also updates and integrates traditional communication methods such as and provides flexible and adaptable security options to keep sensitive data safe, with restricted access if necessary. This feature allows external contractors to integrate Govdex into their existing ICT frameworks without compromising the security of the database as a whole and ensuring administration permissions are maintained by the relevant government organization (Govdex 2015). 3

7 4. Recommended Solution Since the Government of Canada is interested in a quick and cost effective data sharing system, improving and upgrading the existing private cloud solution, GCconnex, is considered the best option. By simplifying the user interface, clarifying data secrecy, improving functionality, and insuring employee adoption, this modern technology can be used to its greatest potential. Initially, the government should implement this solution within departments with reduced or relatively minor security concerns. Once the private cloud infrastructure is successfully integrated and adopted, the recommendation will be to move forward on enhancing the infrastructure and developing a hybrid model to start sharing data with other communities and organizations, rather then keeping the entire database and social networking tool private. While the government is paying more attention to upgrading the underlying computing technology to aid public servants in an efficient way, it is equally important to clearly define the requirements for applications (apps) that employees will use in their daily jobs to access the data, files, and services. More importantly, these applications will have to be designed to keep the organizational context and needs in focus, or risk wasting or under-utilizing any investment on upgrading underlying computing technologies. Keeping knowledge sharing as the key focus, the requirements proposed in this paper are primarily divided into three main categories: (1) recommendations for security, (2) accessibility, and (3) usability, which are further illustrated below (in Figure 1). Security Guidance PRIVATE File Sharing PUBLIC Usability Discussion Forum Accessibility Project Tracking Organizational Context Matters! Without proper interface, investment on computing would not sustain Figure 1: Knowledge sharing interface requirements 4

8 4.1. Security Recommendations The definition of secrecy levels for available information and documents needs to be clarified so that employees can quickly determine which documents can be shared internally vs. externally. For example, based on the information content, the level of secrecy can be assigned as (a) high, (b) medium, (c) low, or (d) open. An example of such data content is highlighted in Table 1. While employees will be uploading files using the new computing technology, the requirement has to be in place to allow the user to define the type of the document and its secrecy level so that the file can be automatically saved, and indexed at the proper cloud-level. Without clear and easy-to-use guidance, employees will remain confused and the advantage of a knowledge sharing infrastructure cannot be properly realized. Table 1: Data Sharing Guidance Level High Medium Low Open Content Data or information involving national security, info related to citizens or organizations or so on. Background research materials, high level project progress updates Applicable To Cloudcomputing model 4.2. Accessibility Restricted to approved employees only in specific organizations Private with restricted access; maintained either federally or by the organization Project works, business reports, research works containing confidential data points, contents from different surveys. Organizational level Private and maintained by the organization Federal level Private and maintained in federal level Research papers, results from surveys and pilot experiments (without disclosing confidential contents), policy updates, white papers etc. Open to Public Public-Private partnership Secure and simplified accessibility is one of the key requirements that the Government has to satisfy while looking for new technologies. Such requirements should include: 1. Local and remote accessibility to all services, with minimum steps of authentication for security. 2. Minimal or automated approval process to reduce employees access time. 5

9 4.3. Usability Simple, well-organized and innovative must be the focus behind the usability requirements for any knowledge sharing tools interface. Without a usable and simplistic interface, most employees will find the tools too complicated and will avoid using them in daily work settings. Based on potential use cases, the usability requirements are split into three key categories: A. File Sharing Internally sharing data amongst employees within an organization is one of the primary starting points for developing a knowledge sharing base. To comply with such demands 1. There must be simple instructions, tutorials for uploading documents and files, and unlimited file sizes. 2. Structured, organized, and intuitive file directories for departments, groups, or projects. 3. Google-like searching capabilities based on keywords with enhanced filtering options. 4. User tags with each file so that they can be contacted by other employees if necessary. B. Discussion Forum A dedicated interface for an employee based discussion forum can be a useful way of sharing knowledge and files among public servants. Over time, information on different topics can develop into an internal self-learning infrastructure. Such information can potentially include any social, political, technical, or public issue, including new project ideas, research topics, feedback on any organizational issues, general complains about tools and services etc. C. Project Tracking Many departments run several projects, pilot experiments, and research papers on wide variety of ideas that employees within that same organization remain relatively unaware of. It often appears that multiple groups are using the same policy instrument (e.g. nudge) to solve issues without sharing their experiences with each other. Such issues could have been explicitly avoided if employees could see what other groups are doing. In addition, having a dedicated interface to track project progress can be very useful to high level management. To highlight some key requirements, such interface should support: defining project frameworks, important dates, deadlines, groups/people involved, their associated tasks; defining project requirements and tracking the progress; simplified digital approval process for documents, proposals, budgets; evaluation over the time, highlighting risks and so on. 6

10 5. Risk Assessment Although cloud computing comes with tremendous benefits, there are risks and considerations which must be addressed in order to get the most out of this new way of organizing information. One major concern is that of data security. This concern is mitigated by having private networks where sensitive information is concerned. By having a private cloud, only those within the specific department have the ability to access files in that cloud (Lord 2015). Another security concern is that of mobile devices. If devices such as laptops, tablets, and smartphones can connect to a private cloud, it is paramount that those devices remain in the hands of the owners. If these devices were to be stolen, non-authorized personnel could potentially access the private cloud network. A proper channel must be put in place for employees to report lost or stolen devices that have access to the cloud network. As well, there must also be a proper way to dispose of these mobile devices when new ones are acquired. Furthermore, to make the most out of the cloud network, employees must be trained on how to thoroughly use the network and all related tools. This can include the creation of online video tutorials to be used by employees to train themselves on accessing, using and editing files as necessary. Clearly communicating the benefits of file sharing via the cloud must also be integral to the training process in order for public servants to be motivated to use the new system. Moreover, there has to be organizational mandate to adapt the new solutions in employee work settings. Overall, training employees to use the cloud will certainly take time, but it is the only way to make sure the cloud is fully utilized. 6. Summary In conclusion, the government should improve the existing data sharing and networking tool, GCconnex, by clarifying data secrecy requirements, improving functionality, insuring employee adoption, and opening select non-secret information for public use. This will be beneficial for the Government of Canada, as it allows for greater collaboration, organizational efficiency, productivity, and effectiveness in the public service. The focus should be kept on making sure the cloud networking tool remains secure while remaining relatively simple and easy-to-use. Overall, a properly implemented cloud based system would keep Canada at the forefront of innovation and ensure a modern workplace with the ease of smart technologies. 7

11 Bibliography Capacitygrid. "Knowledge Hub Data Sheet." Capacitygrid. n.d (accessed Nov 26, 2015). Clerk of the Privy Council. "Destination 2020." Clerk of the Privy Council. Mar 05, (accessed Nov 22, 2015). Govdex. "Govdex: Features." Government of Australia. n.d (accessed Nov 27, 2015). Gressgård, L. J., O. Amundsen, T. Merethe, and A. Hansen. "Use of information and communication technology to support employee-driven innovation in organizations: a knowledge management perspective." Journal of Knowledge Management, 2014: January, Volume18 (Issue4); pp ITAC. "Cloud Computing: Transforming the Government of Canada for the Digital Economy." ITAC Enterprise Working Group Position Paper. Aug Transforming-the-Government-of-Canada-for-the-Digital-Economy.pdf (accessed Nov 22, 2015). Kim, S., and H. Lee. "Employee Knowledge Sharing Capabilities in Public & Private Organizations: Does Organizational Context Matter?" Proceedings of the 38th Annual Hawaii International Conference on System Sciences, HICSS '05.. Hawaii, January 2005, pp.249a - 249a. King, R. "U.S. Department of Justice taps Box for cloud services." ZDNET. May 27, (accessed Nov 27, 2015). Lord, N. Communicating the Data Security Risks of File Sharing & Cloud Storage. Sep 28, (accessed Nov 22, 2015). Marsh, S. "What you re saying about the future of the Knowledge Hub." The Guardian. 30 May, (accessed Nov 26, 2015). owncloud. owncloud for Government and Public Sector. Nov 22, (accessed Nov 22, 2015). Reychav, I., and J. Weisberg. "Good for workers, good for companies: How knowledge sharing benefits individual employees." Knowledge and Process Management, 2009: October, Volume16 (Issue4) pp Treasury Board of Canada. "Government of Canada Web 2.0 and Social Media", National Executive Forum of Public Property. May 14, (accessed January 21, 2015). Wallace, J. "Using Wikis for Internal Documentation." Mar (accessed Nov 22, 2015). Wei, Y.(Susan), H. O Neill, R. P. Lee, and N. Zhou. "The Impact of Innovative Culture on Individual Employees: The Moderating Role of Market Information Sharing." Journal of Product Innovation Management, 2013: Sep, Vol. 30 Issue 5, pp Wouters, W. Blueprint Jun 24, (accessed Nov 22, 2015). 8

How cloud computing can transform your business landscape.

How cloud computing can transform your business landscape. How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about

More information

When Enterprise Content Goes Mobile

When Enterprise Content Goes Mobile When Enterprise Content Goes Mobile How OpenText Tempo Reinforces Information Governance in the Cloud Geoffrey E. Bock, Principal April 2012 How OpenText Tempo Reinforces Information Governance in the

More information

SCADA Cloud Computing

SCADA Cloud Computing SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

How cloud computing can transform your business landscape

How cloud computing can transform your business landscape How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not

More information

Data Management Session: Privacy, the Cloud and Data Breaches

Data Management Session: Privacy, the Cloud and Data Breaches Data Management Session: Privacy, the Cloud and Data Breaches Annelies Moens Head of Sales and Operations, IIS President, iappanz IACCM APAC Australia Sydney, 1 August 2012 Overview Changing privacy regulation

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

How To Understand Cloud Usability

How To Understand Cloud Usability Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,

More information

ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0

ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0 ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright

More information

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate Current & Future Mobile Landscape Number of mobile

More information

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

It s a Brave New Virtual World. Cloud Computing 101: Brought to you by:

It s a Brave New Virtual World. Cloud Computing 101: Brought to you by: It s a Brave New Virtual World Cloud Computing 101: Brought to you by: Table of Contents Introduction What is Cloud Computing? Types of Cloud Computing Why Cloud Computing for Small Business Data Security

More information

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and, Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already

More information

Privacy, the Cloud and Data Breaches

Privacy, the Cloud and Data Breaches Privacy, the Cloud and Data Breaches Annelies Moens Head of Sales and Operations, Information Integrity Solutions Legalwise Seminars Sydney, 20 March 2013 About IIS Building trust and privacy through global

More information

Guideline 1. Cloud Computing Decision Making. Public Record Office Victoria Cloud Computing Policy. Version Number: 1.0. Issue Date: 26/06/2013

Guideline 1. Cloud Computing Decision Making. Public Record Office Victoria Cloud Computing Policy. Version Number: 1.0. Issue Date: 26/06/2013 Public Record Office Victoria Cloud Computing Policy Guideline 1 Cloud Computing Decision Making Version Number: 1.0 Issue Date: 26/06/2013 Expiry Date: 26/06/2018 State of Victoria 2013 Version 1.0 Table

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

Bring-Your-Own-Device Freedom

Bring-Your-Own-Device Freedom Bring-Your-Own-Device Freedom Solutions for federal, state, and local governments Increasingly, IT organizations in federal, state, and local agencies are embracing consumerization with the understanding

More information

Cloud Computing. What is Cloud Computing?

Cloud Computing. What is Cloud Computing? Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited

More information

Cloud Based E-Government: Benefits and Challenges

Cloud Based E-Government: Benefits and Challenges Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North

More information

AGIMO and whole-of-government ICT Policy

AGIMO and whole-of-government ICT Policy AGIMO and whole-of-government ICT Policy Overview DAMA Canberra July 2013 Meeting Brian Catto Andrew McGalliard James Woods ICT Policy Team AGIMO 1 Agenda Who are AGIMO? What is AGIMOs role? APS ICT Strategy

More information

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013 CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

Mobile and BYOD Strategy

Mobile and BYOD Strategy Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring

More information

Session 2. The economics of Cloud Computing

Session 2. The economics of Cloud Computing Session 2. The economics of Cloud Computing Cloud computing is the next step in the on-going evolution of Information Technology. From a technical standpoint, very little that currently is done on cloud

More information

A VIRTUAL DIGITAL FORENSICS LABORATORY

A VIRTUAL DIGITAL FORENSICS LABORATORY Chapter 8 A VIRTUAL DIGITAL FORENSICS LABORATORY Philip Craiger, Paul Burke, Chris Marberry and Mark Pollitt Abstract This paper discusses the concept of a virtual digital forensic laboratory, which incorporates

More information

Federal Cloud Computing Initiative Overview

Federal Cloud Computing Initiative Overview Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

How Nokia deployed AirWatch MDM for Nokia Lumia

How Nokia deployed AirWatch MDM for Nokia Lumia How Nokia deployed AirWatch MDM for Nokia Lumia Case Study 2 Contents 1 Challenge...3 1.1 AirWatch MDM pilot...3 1.2 Challenge of full MDM deployment...4 2 Preparing for deployment...6 2.1 Lessons learned

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale. Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in

More information

MatchPoint Benefits with SharePoint 2013

MatchPoint Benefits with SharePoint 2013 MatchPoint Benefits with SharePoint 2013 MatchPoint Fact Sheet 25.01.2013 Colygon AG Version 2.0 Disclaimer The complete content of this document is subject to the general terms and conditions of Colygon

More information

Designing Enterprise Mobility

Designing Enterprise Mobility Designing Enterprise Mobility Cortado Corporate Server M Work beyond your desk, simply & efficiently Productivity: Work on the go just as easily as from a desktop PC Usability: Mobile access to corporate

More information

Mobile multifactor security

Mobile multifactor security Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security A revolution in authentication and digital signing Smartphones will continue to ship in high volumes,

More information

BYOD BEST PRACTICES GUIDE

BYOD BEST PRACTICES GUIDE BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create

More information

CCBE GUIDELINES ON THE USE OF CLOUD COMPUTING SERVICES BY LAWYERS

CCBE GUIDELINES ON THE USE OF CLOUD COMPUTING SERVICES BY LAWYERS CCBE GUIDELINES ON THE USE OF CLOUD COMPUTING SERVICES BY LAWYERS CCBE guidelines on the use of cloud computing services by lawyers TABLE OF CONTENTS I. INTRODUCTION... 3 1. Scope of the guidelines...

More information

Cloud Services. More agility. More freedom. More choice.

Cloud Services. More agility. More freedom. More choice. Cloud Services More agility. More freedom. More choice. What is cloud computing? No longer on the horizon: the cloud has come to business computing. Why consider moving to a cloud model? Why now? Cloud

More information

Unified Device Management Allows Centralized Governance of Corporate Network Devices

Unified Device Management Allows Centralized Governance of Corporate Network Devices Unified Device Management Allows Centralized Governance of Corporate Network Devices Published July 2013 The recent bring your own device trend that allows employees to use devices they own for business

More information

Cloud Computing Policy 1.0 INTRODUCTION 2.0 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Policy 1.0 INTRODUCTION 2.0 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Policy Effective Date: July 28, 2015 1.0 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

Security and Employee Monitoring Security and

Security and Employee Monitoring Security and Security and Employee Monitoring 2 Security & Employee Monitoring Firewalls and anti- virus solutions are fine for protecting your perimeter, but they won t help if your Employees let your business get

More information

Considerations for Outsourcing Records Storage to the Cloud

Considerations for Outsourcing Records Storage to the Cloud Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage

More information

BYOD: Moving toward a More Mobile and Productive Workforce

BYOD: Moving toward a More Mobile and Productive Workforce Montana Tech Library Digital Commons @ Montana Tech Business & Information Technology Faculty Scholarship 2013 BYOD: Moving toward a More Mobile and Productive Workforce D. Lance Revenaugh, Ph.D. Montana

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Managing PHI in the Cloud Best Practices

Managing PHI in the Cloud Best Practices Managing PHI in the Cloud Best Practices Executive Whitepaper Recent advances in both Cloud services and Data Loss Prevention (DLP) technology have substantially improved the ability of healthcare organizations

More information

Enabling the University CIO Strategic Plan 2013-2018. Vision for 2020. Mission

Enabling the University CIO Strategic Plan 2013-2018. Vision for 2020. Mission Enabling the University CIO Strategic Plan 2013-2018 NDU will create exceptional and innovative solutions and services that enable advanced joint education, leadership and scholarship (NDU Strategic Plan

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY

CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY 1 CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY Torrell Griffin 2 Cloud Technology Implementation/Risk Mitigation The purpose of this report, in essence, is to define cloud technology as well as describe some

More information

Mobile Cloud Computing Security Considerations

Mobile Cloud Computing Security Considerations 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications

More information

F5 and Microsoft Exchange Security Solutions

F5 and Microsoft Exchange Security Solutions F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application

More information

Enterprise 2.0 Knowledge Management Development Trends

Enterprise 2.0 Knowledge Management Development Trends 2012 International Conference on Economics, Business Innovation IPEDR vol.38 (2012) (2012) IACSIT Press, Singapore Enterprise 2.0 Knowledge Management Development Trends Dimiter Velev 1 + and Plamena Zlateva

More information

Software as a Service Flexible Service Delivery for Your Health Insurance Exchange

Software as a Service Flexible Service Delivery for Your Health Insurance Exchange Software as a Service Flexible Service Delivery for Your Health Insurance Exchange SaaS Health Insurance Exchanges Improving Services through More Cost-Efficient Delivery States are charged with making

More information

Flexible Workforce Management System for Call Center: A case study of public sector

Flexible Workforce Management System for Call Center: A case study of public sector Asia Pacific Management Review (2007) 12(6), 338-346 Flexible Workforce Management System for Call Center: A case study of public sector Jun Woo Kim a, Sang Chan Park a,* a Department of Industrial Engineering,

More information

CARTES 2012 Demo presentation. Secure Cloud Storage

CARTES 2012 Demo presentation. Secure Cloud Storage CARTES 2012 Demo presentation Cloud Computing: NIST Framework Public Private Hybrid Deployment model Infrastructure as a service (IaaS Platform as a service (PaaS) Software as a service (SaaS) Service

More information

City of Des Moines Brings CRM to the Public Sector

City of Des Moines Brings CRM to the Public Sector Case Studies, W. Janowski Research Note 20 November 2002 City of Des Moines Brings CRM to the Public Sector Implementing customer relationship management in the public sector reflects a unique challenge.

More information

Implementing SharePoint 2010 as a Compliant Information Management Platform

Implementing SharePoint 2010 as a Compliant Information Management Platform Implementing SharePoint 2010 as a Compliant Information Management Platform Changing the Paradigm with a Business Oriented Approach to Records Management Introduction This document sets out the results

More information

Cost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA

Cost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA Cost effective methods of test environment management Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA 2013 Agenda Basic complexity Dynamic needs for test environments Traditional

More information

Investigation of Cloud Computing: Applications and Challenges

Investigation of Cloud Computing: Applications and Challenges Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,

More information

Tuesday, June 5, 12. Mobile Device Usage

Tuesday, June 5, 12. Mobile Device Usage Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.

More information

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 Keynote by Vivek Kundra Federal Chief Information Officer The Economic Gains of Cloud Computing Good morning and

More information

Acronis 2002-2014 BRING YOUR OWN DEVICE

Acronis 2002-2014 BRING YOUR OWN DEVICE Acronis 2002-2014 BRING YOUR OWN DEVICE Introduction With over a billion smartphones and tablets at arms length, a majority of your global workforce already possesses the technology needed to better connect

More information

FOR THE FUTURE OF DATA CENTERS?

FOR THE FUTURE OF DATA CENTERS? WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? A WHITEPAPER BROUGHT TO YOU BY SEI WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? files via the Internet to a hard drive located in a

More information

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models. Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,

More information

ESS, LLC Cloud Sync White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync

ESS, LLC Cloud Sync White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync ESS, LLC Cloud Sync White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync July 2015 Copyright 2015 Eagle Secure Solutions, LLC Introduction The rapid adoption of consumer-grade

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

Government of Canada (GC) Cloud Computing: Information Technology Shared Services (ITSS) Roadmap

Government of Canada (GC) Cloud Computing: Information Technology Shared Services (ITSS) Roadmap EDRM 1102023 v6 Government of Canada (GC) Cloud Computing: Information Technology Shared (ITSS) Roadmap Jirka Danek, Chief Technology Officer Information Technology Branch Public Works and Government Canada

More information

Cloud Computing Overview

Cloud Computing Overview Cloud Computing Overview Mark Troester CIO/IT Product Marketing 1 WHY CLOUD COMPUTING? The cloud computing model can significantly help agencies grappling with the need to provide highly reliable, innovative

More information

Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University.

Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University. Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University P a g e 1 P a g e 2 Table of Contents Abstract... 3 Introduction... 3 Previous

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

Office of the Chief Information Officer

Office of the Chief Information Officer Office of the Chief Information Officer Online File Storage BACKGROUND Online file storage services offer powerful and convenient methods to share files among collaborators, various computers, and mobile

More information

PRIORITIES AND POLICIES FOR IT ASSET MANAGEMENT

PRIORITIES AND POLICIES FOR IT ASSET MANAGEMENT The Define/Align/Approve Reference Series PRIORITIES AND POLICIES FOR IT ASSET MANAGEMENT Value added IT depends on accurate information regarding the use, location and configuration of every asset, from

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

Introduction. Save time. Develop Talent Pools. increase candidate care

Introduction. Save time. Develop Talent Pools. increase candidate care Introduction Most professionals agree that employees are an organisation s greatest asset. It therefore stands to reason that the business of attracting, screening and appointing these people (i.e. recruitment)

More information

2014. All Rights Reserved. Information and Communications Technology

2014. All Rights Reserved. Information and Communications Technology Defense-in-Depth has Become Extinct or Information Security in the Post-Enterprise World BSides Ottawa 2014 Dr. Lawrence G Dobranski P.Eng. Director ICT Security University of Saskatchewan 1 The University

More information

Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems

Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems eenviper White Paper #4 Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems 1 Executive Summary Cloud computing could revolutionise public services

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

New Mexico Utility Modernizes Communication and Collaboration with Cloud Services

New Mexico Utility Modernizes Communication and Collaboration with Cloud Services Microsoft Office 365 Customer Solution Case Study New Mexico Utility Modernizes Communication and Collaboration with Cloud Services Overview Country or Region: United States Industry: Government Customer

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Endpoint Virtualization for Healthcare Providers

Endpoint Virtualization for Healthcare Providers WHITE PAPER: xxxxxx BEST PRACTICES [00-Cover_Bar] FOR HEALTHCARE Endpoint Virtualization for Healthcare Providers Confidence in a connected world. White Paper: Best Practices for Healthcare Endpoint Virtualization

More information

A guide to enterprise mobile device management.

A guide to enterprise mobile device management. WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an

More information

Putting the cloud to work for your organization. A buyers guide to cloud solutions.

Putting the cloud to work for your organization. A buyers guide to cloud solutions. Putting the cloud to work for your organization. A buyers guide to cloud solutions. What s in this guide for you? If you re thinking about bringing the cloud into your business but aren t sure where to

More information

Samsung School 2.0 Taps the Cloud to Enhance its Classroom Technology Solution

Samsung School 2.0 Taps the Cloud to Enhance its Classroom Technology Solution WHITE PAPER Samsung School 2.0 Taps the Cloud to Enhance its Classroom Technology Solution Lowers Cost, Embraces Parents, Administrators via The Cloud During the past 30 years, computing and communications

More information

How Cloud Computing Will Change The Aviation Maintenance Operation

How Cloud Computing Will Change The Aviation Maintenance Operation White Paper How Cloud Computing Will Change The Aviation Maintenance Operation Building Safer Operations and Increasing Productivity with Cloud-Based Information Services CONTENTS Introduction: What is

More information

Recordkeeping Policy

Recordkeeping Policy Public Record Office Victoria Standards and Policy Recordkeeping Policy Cloud Computing: Implications for Records Management Version Number: 1.0 Issue date: 04/04/2012 Closing for comments: 31/05/2012

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Monetizing the Cloud: XaaS Opportunities for Service Providers Sponsored by: EMC Brad Nisbet March 2011 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

www.coremedia.com CoreMedia 6

www.coremedia.com CoreMedia 6 COREMEDIA 6 PRODUCT BROCHURE www.coremedia.com CoreMedia 6 COREMEDIA 6 PRODUCT BROCHURE CoreMedia 6: Because contextualization is about people CoreMedia 6 empowers your Marketing, Business and IT teams,

More information

How To Get The Most Out Of Vdi

How To Get The Most Out Of Vdi A GUIDE TO IMPLEMENTING VDI AS A SERVICE CREATIVE-ITC.COM OVERVIEW After years of promise, Virtual Desktop Infrastructure (VDI) is finally hitting the mainstream as a desktop management solution suitable

More information

EMAIL ARCHIVING. What it is, what it isn t, and how it can improve your business operations

EMAIL ARCHIVING. What it is, what it isn t, and how it can improve your business operations EMAIL ARCHIVING What it is, what it isn t, and how it can improve your business operations OVERVIEW: Why businesses are turning to email archiving As your business grows, communication between you and

More information

Shaping Your IT. Cloud

Shaping Your IT. Cloud Shaping Your IT Cloud Hybrid Cloud Models Enable Organizations to Leverage Existing Resources and Augment IT Services As dynamic business demands continue to place unprecedented burden on technology infrastructure,

More information

Potential of Cloud Storage Application as Knowledge Management System

Potential of Cloud Storage Application as Knowledge Management System Potential of Cloud Storage Application as Management System T. Gunadham Abstract This study discusses the results of analysis on cloud storage application in the term of facilitating knowledge management.

More information

ITAC Enterprise Working Group Position Paper. Cloud Computing: Transforming the Government of Canada for the Digital Economy

ITAC Enterprise Working Group Position Paper. Cloud Computing: Transforming the Government of Canada for the Digital Economy ITAC Enterprise Working Group Position Paper Transforming the Government of Canada for the Digital Economy Release Date: August 2015 As Canada s national ICT business association, the Information Technology

More information

Policy Outsourcing and Cloud Based File Sharing

Policy Outsourcing and Cloud Based File Sharing Policy Outsourcing and Cloud Based File Sharing Version 3.1 TABLE OF CONTENTS Outsourcing Policy... 2 Outsourcing Management Standard... 2 Overview... 2 Standard... 2 Outsourcing Policy... 3 Policy Statement...

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION Laserfiche for Federal Government MEET YOUR AGENCY S MISSION HOW ENTERPRISE CONTENT MANAGEMENT Serves Civilian and Defense Agencies Whether a federal agency supports farmers in the field, soldiers overseas

More information

Kent State University s Cloud Strategy

Kent State University s Cloud Strategy Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology

More information