TechNet Land Forces South
|
|
- Dortha Cook
- 8 years ago
- Views:
Transcription
1 TechNet Land Forces South Army Data Center Consolidation Plan (ADCCP) Overview COL Chris E. Miller MARCH Tucson, AZ Engagement Theater Session IV 28 March 2012/1600 hrs
2 Purpose To provide background on data center consolidation and the path which the Army is taking to meet Presidential Guidance and the Office of Management Budget s Federal Data Center Consolidation Initiative (FDCCI) while recognizing and adapting to processing realities in the field. 2
3 The Technology Dilemma We have to be better at being able to reach out, harness technology and get it into the hands of our soldiers quickly. GEN Peter W. Chiarelli, Former Vice Chief of Staff of the Army 5 March
4 Modernizing Army Systems the Army s sweeping network modernization effort, its number one priority in modernization, will require a fundamental cultural change Chief Information Officer CIO/G-6, LTG Susan S. Lawrence 4 4
5 Agenda Focusing on the End State Executive and Congressional Interest The Way Forward: Data Center Consolidation Application Rationalization Summary 5
6 Why Consolidate Our Data Centers? Presidential Memo 10 June 2010 Subject: Disposing of Unneeded Federal Real Estate Increasing Sales Proceeds, Cutting Operation Costs, and Improving Energy Efficiency Stop Expanding Data Centers in order to address the growth of data centers across the Federal Government, agencies shall immediately adopt a policy against expanding data centers beyond current levels, and shall develop plans to consolidate and significantly reduce data centers within 5 years. Agencies shall submit their plans to OMB for review by August 30,
7 Congressional Interest Limitations on Obligations of Funds (FY2012 NDAA Language) During the period beginning on the date of the enactment of this Act and ending on May 1, 2012, a department, agency, or component of the Department of Defense may not obligate funds for a data server farm or data center unless approved by the Chief Information Officer of the Department of Defense or the Chief Information Officer of a component of the Department to whom the Chief Information Officer of the Department has specifically delegated such approval authority. After May 1, 2012, a department, agency, or component of the Department may not obligate funds for a data center, or any information systems technology used therein, unless that obligation is in accordance with DOD wide performance plan required by the Act. Approvals for funding Prior to May 1, 2012 An approval of the obligation of funds may not be granted unless the official granting the approval determines, in writing, that existing resources of the agency, component, or element concerned cannot affordably or practically be used or modified to meet the requirements to be met through the obligation of funds. After May 1, 2012 An approval of the obligation of funds may not be granted unless the official granting the approval determines that: (1) existing resources of the Department do not meet the operation requirements to be met through the obligation of funds; and (2) the proposed obligation is in accordance with the performance standards and measures established by the Chief Information Officer of the Department in the DOD Performance Plans. Reports of Approvals Not later than 30 days after the end of each calendar quarter, each Chief Information Officer of a component of the Department who grants an approval based on the authority delegated by the Chief Information office of the Department during such calendar quarter shall submit to the Chief Information Officer of the Department a report on the approval or approvals so granted during such calendar quarter. Delegation of Authority memo is forthcoming. 7
8 The Magnitude of the Problem Over 435 Army data centers: Occupying more than 1.2 million square feet of floor space. Containing over 26,000 servers. Housing almost 9,000 racks (which, if placed side by side, would reach over 4 miles) Over 10,500 application records. And we know we don t know everything yet! As of 5 March
9 The Target for Data Center Closures Close 185 Army Data Center s by FY Data Centers by Category CAT 2 CAT 3 CAT 4 CAT 7 CAT 9 CAT 2: Sustain CAT 2 CAT 3 Close CAT 3 CAT 4: Deployed CAT OEF 4 CAT 7 CAT 7 Pending CAT 9 CAT 9 Recategorized Doing 1 task 185 times Close in FY FY11 FY12 FY13 FY14 FY15 Closed Series1 9
10 The Installation Approach To meet the Army's goal of 185 data center closures by FY2015, the CIO/G-6, NETCOM/9 th SC (A) and 7 th SC (T) have recommended taking an Installation Approach. The Installation Approach uses the Center of Excellence (CoE) Discovery teams more effectively by having them discover existing data center information including; capacity, facility, storage, network, and application level data on an installation concurrently, allowing commands to make more informed decisions to support a simultaneous, rapid collapse of the data centers on an installation. The Installation approach is not meant to move away from the command plans that were briefed at the ADCCP Summit in December 2011, or slow the pace of scheduled closures, but a means for our organizations to work together to best utilize resources and further the goals of data center consolidation. 10
11 Installation Approach Discovery Goals Across the installation, we are going to look at: Facility Infrastructure Utilized and Available Capacities Network and Storage Capacities Application level data Other Data Centers identified 11
12 Pre-Site Visit Prerequisites To be completed prior to Site Visit, Center of Excellence will coordinate with onsite POCs: High-level Installation Network Diagrams High-level individual data centers Network Diagrams Routers, switches and Firewalls Access Control Lists (ACL) Existing List of Network Management Systems(NMS) Review of current DISA topology 12
13 Onsite Discovery Activities Conduct Onsite In-Brief Representatives of all Commands with Data Centers on the Installation, Data Center Owners, IMCOM, DPW, Garrison Commander, HQDA CIO/G-6, and NETCOM Manual Data Collection (2 weeks) Physical Discovery Data Facility Condition, HVAC, Power, Cable Infrastructure, Floor/Rack Space, Network Connections, COOP, Physical Security, Environmental Factors, Technical support availability, Network traffic flows, Virtualization Services High Level Application Data: Functional Description, Technical High-Level Description, Storage Allocation, Ports and Protocols, High-Level Network Topology 13
14 Onsite Discovery Activities (cont d) Conduct Preliminary Analysis (1 week) Validation of tracking tool data Work with on-site experts to capture additional information required to support a recommendation for Installation Data Center Consolidation Identification of constraints/limitations with existing infrastructure Development of potential courses of action Conduct Onsite Out-Brief Representatives of all Commands with Data Centers on the Installation, Data Center Owners, IMCOM, DPW, Garrison Commander, HQDA CIO/G- 6, and NETCOM Will include a recommendation for Installation Data Center Consolidation Discussion of issues and challenges 14
15 Installation Approach: End State TRADOC FXXX_ST_TRA_02 NETCOM FXXX_ST_NEC_01 HQDA G3 FXXX_ST_HG3_01 TRADOC FXXX_ST_TRA_01 AMC FXXX_ST_AMC_01 AMC FXXX_ST_AMC_03 Single Installation Processing Node (Data Center) AMC FXXX_ST_AMC_02 ATEC FXXX_ST_ATC_01 15
16 Application Rationalization & Disposition Inventory BIN War Fighting Mission Area Business Mission Area Enterprise Information Mission Area Rationalize: Kill Retire Modernize Sustain Categorize ERP s SharePoint Exchange Mail MS Project Server AtHOC OCS RM Online Distance Learning ETC Manufacturing Syst C4IM Services Thin Client ETC AD Controllers Switches/Routers TLA DNS Servers IPS Print Servers SONET ETC Enterprise Servicing Applications Local Servicing Applications Local Servicing Infrastructure CBA Cost Utilization Architecture Bandwidth Risk Disposition Enterprise Servicing Applications CDAE DCCE MWR.COM.COM.ORG.EDU Consolidation Local Servicing Infrastructure White-Listed Apps 16
17 Rationalization and Categorization Timeline Task.5 Suspense 1. Rationalize Requirement: Identify each application as: kill, modernize, or sustain; and 2. Categorization Requirement: Identify each application as enterprise servicing or local servicing of Applications listed in the ADCCP Tracking Tool (C-1 List) which are hosted in data centers closing in FY Rationalize Requirement: Identify each application as: kill, modernize, or sustain; and 2. Categorization Requirement: Identify each application as enterprise servicing or local servicing of Applications listed in the ADCCP Tracking Tool (C-1 List) which are hosted in data centers closing in FY Rationalize Requirement: Identify each application as: kill, modernize, or sustain; and 2. Categorization Requirement: Identify each application as enterprise servicing or local servicing of Applications listed in the ADCCP Tracking Tool (C-1 List) which are hosted in data centers closing in FY Rationalize Requirement: Identify each application as: kill, modernize, or sustain; and 2. Categorization Requirement: Identify each application as enterprise servicing or local servicing of Applications listed in the ADCCP Tracking Tool (C-1 List) which are hosted in data centers closing in FY15. Complete Rationalization and Categorization of 100% Applications listed in the ADCCP Tacking Tool (C-1 List). 19 APR MAY MAY JUN JUN 2012 Notes: 1. The completion of Rationalization and Categorization is required for the Army s OMB report due to DOD in August. The elimination of applications is required to achieve the ADCCP efficiency goals. 17
18 Savings & Efficiencies Paths to Progress $ Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) $ Server Consolidation Cultural Change 18 18
19 The Paradigm Shift 19
20 Using ADCCP as the Path to the Cloud Infrastructure as a Service Platform as a Service Software as a Service DISA, Commercial, & IPN Hosting Enterprise Server Common Operating Environment Local applications Converted to Enterprise Applications 20
21 The Goal Army Application Hosting Transformation Application Hosting Business Management Army Common Operating Environments Application Portfolio Rationalization 21
22 Points of Contact CIO/G-6 ADCCP Team: COL Chris Miller/Mr. Neal Shelley/LTC Jeff Gribschaw (571) (703) (571) HQDA CIO/G-6 Cyber Directorate: Mr. William Biggs (703) Army Cyber Command: COL William Max Duggan (703) ADCCP Project Office (Software Engineering Center Support): Dan Andrew (443) ADCCP Links ADCCP Tracking Tool - ADCCP AKO Site: - ADCCP EXORD: MilboST: Closure Report Formats: 22
DoD s Efforts to Consolidate Data Centers Need Improvement
Inspector General U.S. Department of Defense Report No. DODIG-2016-068 MARCH 29, 2016 DoD s Efforts to Consolidate Data Centers Need Improvement INTEGRITY EFFICIENCY ACCOUNTABILITY EXCELLENCE INTEGRITY
More informationHow To Make A Theater Forest More Functional
Enterprise Directory Services & Authentication Information Exchange Forum Session: #2 EDS&A Robert Bachert NETCOM 9 th SC(A) G5 Will establish an Enterprise Directory Services and Authentication (EDS&A)
More informationBuild Capacity Cloud and Army Data Center Consolidation
Build Capacity Cloud and Army Data Center Consolidation Mr. Jeremy Hiers Project Director, PD ES 22 May 2013 UNCLASSIFIED B U I L D C A P A C I T Y C L O U D A N D A D C C P 1 UNCLASSIFIED Agenda UNCLASSIFIED
More informationFederal Data Center Consolidation Initiative (FDCCI) FAQs May 2012
Federal Data Center Consolidation Initiative (FDCCI) FAQs May 2012 1. What is the Federal Data Center Consolidation Initiative (FDCCI)? The Federal CIO Vivek Kundra established the FDCCI in a memo dated
More informationCore Data Center Reference Architecture
Core Data Center Reference Architecture DoD Enterprise Architecture Conference 2012 Office of the Chief Information Officer Topics Background DoD CIO Vision for Core Data Centers Core Data Center Reference
More informationChapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
More informationHow To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
More informationJoint Information Environment Single Security Architecture (JIE SSA)
Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz DISA JIE Special Assistant to the Mission Assurance Executive /JIE SSA Integrated Design Team Lead 12 May 2014 Problem
More informationFederal IPv6 Working Group Innovative IPv6 Implementation with Least Cost Funding
Federal IPv6 Working Group Innovative IPv6 Implementation with Least Cost Funding John L Lee, CTO Co-Chair, IPv6 Address Planning Team, ACT-IAC, Federal IPv6 Task Force Internet Associates, LLC A Certified
More informationEnterprise Services to the Edge
Enterprise Services to the Edge Mr. Jeremy Hiers Project Director, PD ES 22 May 2013 UNCLASSIFIED P D E S O V E R V I E W 1 UNCLASSIFIED Agenda UNCLASSIFIED Who is PD Enterprise Services? Concept for Enterprise
More informationSECRETARY OF THE ARMY WASHINGTON
SECRETARY OF THE ARMY WASHINGTON 2 2 JUN 2016 MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2016-18 (Divesting Legacy Information Technology Hardware, Software, and Services in Support of the
More informationEXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 March DD, 2016
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 March DD, 2016 M-16-NN MEMORANDUM FOR HEADS OF EXECUTIVE AGENCIES FROM: SUBJECT: Tony Scott Federal Chief Information
More informationAFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015
AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))
More informationCloud Computing - Advantages and Disadvantages
Could Computing: Concepts and Cost Considerations Arlene Minkiewicz, Chief Scientist PRICE Systems, LLC arlene.minkiewicz@pricesystems.com Optimize tomorrow today. 1 If computers of the kind I have advocated
More informationFederal Data Center Consolidation Initiative
Federal Data Center Consolidation Initiative 2011 Data Center Consolidation Plan & Progress Report (date) 1 Introduction... 2 2 Agency Goals for Data Center Consolidation... 2 3 Implementing Shared Services/Multi-tenancy...
More informationCommercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
More informationLessons Learned: Integrating EMS and Environmental Compliance Auditing
Lessons Learned: Integrating EMS and Environmental Compliance Auditing 2009 Environmental, Energy & Sustainability Symposium Pamela M. Klinger U.S. Army Environmental Command 6 May 2009 Our Mission: Lead
More informationArmy Cloud Computing Strategy
Army Cloud Computing Strategy MARCH 2015 Enterprise Architecture Division Army Architecture Integration Center HQDA CIO/G-6 Version 1.0 This page intentionally left blank. TABLE OF CONTENTS FOREWORD...
More informationCloud Computing. Introductions 10/20/2010
Cloud Computing An In-Depth Discussion Introductions Nathaniel Gates President of Cloud49, Anchorage AK Nathaniel Gates is a lifelong Alaskan who understands the unique challenges businesses face operating
More informationData Consolidation and Application Optimization (DCAO) Organization
Data Consolidation and Application Optimization (DCAO) Organization 11 February 2015 Presented to: DON CIO IT Conference San Diego Convention Center Mr. John Pope DCAO Director Space and Naval Warfare
More informationConnect with Addressing Intelligence to Automate IPv6 Planning, Transition & Cyber Security
2012 North American IPv6 Summit Connect with Addressing Intelligence to Automate IPv6 Planning, Transition & Cyber Security John L Lee, CTO Co-Chair, IPv6 Address Planning Team, ACT-IAC, Federal IPv6 Working
More informationCloud Computing & Sustainability. Virtualization, Cloud Computing & Green IT Summit. October 26, 2010
Cloud Computing & Sustainability Doug Bourgeois, Vice President, Federal Chief Cloud Executive Virtualization, Cloud Computing & Green IT Summit Proprietary October 26, 2010 2009 VMware Inc. All rights
More informationFederal Data Center Consolidation Initiative
Federal Data Center Consolidation Initiative United States Agency for International Development (USAID) 2011 Data Center Consolidation Plan & Progress Report September 30, 2011 1 Introduction...2 2 Agency
More informationCloud Computing and Enterprise Services
Defense Information Systems Agency A Combat Support Agency Cloud Computing and Enterprise Services Alfred Rivera Technical Program Director 29 July 2010 Peak of Inflated Expectations You Are Here Plateau
More informationSDN/Virtualization and Cloud Computing
SDN/Virtualization and Cloud Computing Agenda Software Define Network (SDN) Virtualization Cloud Computing Software Defined Network (SDN) What is SDN? Traditional Network and Limitations Traditional Computer
More informationNext Steps for Federal Data Center Consolidation Initiative
Next Steps for Federal Data Center Consolidation Initiative Presented to: GDI Conference April 28 2011 Creating Value, Delivering Results 2011 eglobaltech Incorporated. Tech, Inc. All rights reserved.
More informationNetwork Operations (NetOps)
Network Operations (NetOps) COL Debbie Theall Project Manager, PM I3C2 22 May 2013 UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 1 UNCLASSIFIED Agenda UNCLASSIFIED Context NetOps
More informationREPLACEMENT OF HVAC AND ELECTRICAL EQUIPMENT IN BUILDING W-143 NAVAL FACILITIES ENGINEERING COMMAND ~ MID-ATLANTIC AREA C AREA B AREA C AREA B AREA D
AREA B AREA C AREA B AREA A AREA C AREA D AREA A AREA D NAVAL FACILITIES ENGINEERING COMMAND ~ MID-ATLANTIC AREA B AREA A AREA C AREA D AREA A AREA D NAVAL FACILITIES ENGINEERING COMMAND ~ MID-ATLANTIC
More informationSTATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM
More informationReal Property Portfolio Optimization
Real Property Portfolio Optimization Improving and Modernizing Management of the Federal Real Property Portfolio to Optimize Space, Financial Resources and Energy Impact www.pwc.com/publicsector Contents
More informationSITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
More informationFujitsu Dynamic Cloud Bridging today and tomorrow
Fujitsu Dynamic Cloud Bridging today and tomorrow Contents Cloud Computing with Fujitsu 3 Fujitsu Dynamic Cloud: Higher Dynamics for Enterprises 4 Fujitsu Dynamic Cloud: Our Offering 6 High Security Standards
More informationUNCLASSIFIED TRANSFORMING CYBER WHILE AT WAR
KM Governance, Policies, Regulations, Resources, Including KM Career Track, Education and Training Programs Session: 1 Track 9: TRADOC CKO Mr. Joe Oebbecke, HQ TRADOC 2011-08-23 10:45 12:00 // KM Governance,
More informationDoD Needs an Effective Process to Identify Cloud Computing Service Contracts
Inspector General U.S. Department of Defense Report No. DODIG-2016-038 DECEMBER 28, 2015 DoD Needs an Effective Process to Identify Cloud Computing Service Contracts INTEGRITY EFFICIENCY ACCOUNTABILITY
More informationArmy Service Level Management/Information Technology (IT) Metrics
Army Service Level Management/Information Information Exchange Forum Session: #1 IT Metrics Thomas J. Berezny NETCOM/9 th SC(A) G-5 Regulatory Guidance Scope Background Where Does the Data Go? Relationship
More informationPartnering with Small Business
Partnering with Small Business Small Business Breakfast Ms. Essye Miller Director, Cyber Security, Army CIO/G-6 1 UNCLASSIFIED Army CIO/G-6 Organization CIO / G-6 Deputy, CIO / G-6 LTG Robert Ferrell Mr.
More informationStorage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies
Page 1 Storage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies Introduction This paper explains the concepts of Storage Area Network or SAN, iscsi technology and how
More informationArmy Telecommunications Division (ATD) Overview
Army Telecommunications Division (ATD) Overview Information Exchange Forum Session: 2 Telecommunications Jack Ratliff Army Telecommunications Division, NETCOM 9 th SC (Army) Manage Army s Worldwide Long-Haul
More informationData Center Consolidation Task Force DATA CENTER CONSOLIDATION TASK FORCE CHARTER
DATA CENTER CONSOLIDATION TASK FORCE CHARTER VERSION 1.3 -- 5/25/2011 Data Center Consolidation Task Forc Purpose... Scope... Governance...4 Rolesand Responsibilities...4 Members...4 OTHERPARTICIPANTS
More informationMigrating and consolidating even the simplest of data
CALIBRE An Employee-Owned Management and Technology Services Company 6354 Walker Lane, Suite 300, Metro Park Alexandria, Virginia 22310-3252 USA p. 703.797.8500 or 1.888.CALIBRE international p. 011.1.888.CALIBRE
More informationNETWORKING FOR DATA CENTER CONVERGENCE, VIRTUALIZATION & CLOUD. Debbie Montano, Chief Architect dmontano@juniper.net
NETWORKING FOR DATA CENTER CONVERGENCE, VIRTUALIZATION & CLOUD Debbie Montano, Chief Architect dmontano@juniper.net DISCLAIMER This statement of direction sets forth Juniper Networks current intention
More informationDEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549. Joint Interoperability Test Command (JTE) 7 Jan 15
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 7 Jan 15 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of
More informationUNCLASSIFIED UNCLASSIFIED
Agenda The Army CIO/G-6 Vision, Mission and Roles Core Mission Sets The Organization Staying Connected with the Army CIO/G-6 2 The Army CIO/G-6 She is the Army CIO and the Army G6 As the CIO She Fights
More informationUnified Capabilities (UC)
Unified Capabilities (UC) Andres J. Bryczek Unified Capabilities Development 6/11/2015 2:20 PM 18 Jun 2015 Unified Capabilities --What Do We Mean? Unified Capabilities Consolidate Phone Switches Streamline
More informationHow To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
More informationEssential Next Steps for the U.S. Government in the Transition to IPv6
Essential Next Steps for the U.S. Government in the Transition to IPv6 An Executive Summary for Agency Chief Information Officers of the Latest Federal Policies and Guidance for Continuing the Enterprise
More informationUnderstanding Virtualization and Cloud in the Enterprise
Understanding Virtualization and Cloud in the Enterprise James Staten Vice President, Principal Analyst Forrester Research Virtualization is evolving toward cloud but won t be subsumed by it 2 What s different
More informationProgram Manager Information Systems & Infrastructure. Mr. Dan Corbin
Program Manager Information Systems & Infrastructure Mr. Dan Corbin 22 SEPTEMBER 2015 1 MARCORSYSCOM PEO Land Systems Staff Staff Deputy Commander Resource Management Deputy Commander SIAT Assistant Commander
More informationMicrosoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
More informationMHS Health Information Technology Transformation March 1, 2016
MHS Health Information Technology Transformation March 1, 2016 Colonel Richard Chip Terry Acting Military Health System Chief Information Officer Defense Health Agency Conflict of Interest Richard N. Terry,
More informationDoD s Strategic Mobility Vision: Needs & Challenges
DoD s Strategic Mobility Vision: Needs & Challenges Greg Youst DISA Chief Mobility Engineer October 22, 2014 Agenda DoD Mobility Strategy Overview End-State Visions Implementation Challenges: A Reality
More informationThe Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
More informationTactics, Techniques, and Procedures for Manual Exporting of ARMY Knowledge Online (AKO) Email Data to Department of Defense Enterprise Email (DEE)
Tactics, Techniques, and Procedures for Manual Exporting of ARMY Knowledge Online (AKO) Email Data to Department of Defense Enterprise Email (DEE) Version 1.0 24 August 2012 This document is not to be
More informationDigital Advisory Services Professional Service Description Network Assessment
Digital Advisory Services Professional Service Description Network Assessment 1. Description of Services. 1.1. Network Assessment. Verizon will perform Network Assessment services for the Customer Network,
More informationOptimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
More informationThe Cloud at 30,000 feet. Art Ridgway Scripps Media Inc. Managing Director Newspaper IT Operations
The Cloud at 30,000 feet Art Ridgway Scripps Media Inc. Managing Director Newspaper IT Operations Survey: Where s home? How many using cloud computing now? How many thinking of using cloud computing? How
More informationAudit of the Data Center Consolidation Initiative at NARA. OIG Draft Audit Report No. 12-09. May 10, 2012
Audit of the Data Center Consolidation Initiative at NARA OIG Draft Audit Report No. 12-09 May 10, 2012 Table of Contents Executive Summary... 3 Background... 4 Objectives, Scope, Methodology... 7 Audit
More informationA Combat Support Agency
Department t of Defense (DoD DoD) Enterprise Email May 9, 2012 v2 Agenda Purpose: Create awareness of Department of Defense (DoD) Enterprise Email and increase AGENDA understanding of the service ss benefits
More informationVirginia National Guard. The Commonwealth s Guardian
Virginia National Guard The Commonwealth s Guardian Objective To understand the origins, constitutional and legal underpinnings of the National Guard To understand the roles, missions, and capabilities
More informationAPPENDIX 8 TO SCHEDULE 3.3
APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE
More information2014 Defense Health Information Technology Symposium Service Desk Strategy for the Defense Health Agency
Mr. Wayne Speaks - Acting Branch Chief Mr. Bill Novak - Acting Branch Chief of Operations DHA Infrastructure and Operations 2014 Defense Health Information Technology Symposium Service Desk Strategy for
More informationIntroduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
More informationIT Service Management in the JIE and the DoD Enterprise Service Management Framework
IT Service Management in the JIE and the DoD Enterprise Service Management Framework Office of the Chief Information Officer/ Defense Information Systems Agency Office of the Chief Information Officer
More informationInformation Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014
QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location
More informationThree Areas of Focus. * Infrastructure * Systems * Processes
IT Three Areas of Focus * Infrastructure * Systems * Processes Adding Wireless * FCS core network to Millstream Tech Center * Admin building * Wireless in Millstream Tech Center Cellular * Infrastructure
More informationMicrosoft Office Communications Server 2007 R2
Microsoft Office Communications Server 2007 R2 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: Sept. 2009 For the most up-to-date version of the Scale to a Load Balanced
More informationMaking Leaders Successful Every Day
Making Leaders Successful Every Day Why & How Enterprises Are Adopting the Cloud James Staten, VP, Principal Analyst The bottom line 1. Public cloud adoption is driven by the business, not IT Empowered
More informationControl Tower for Virtualized Data Center Network
Control Tower for Virtualized Data Center Network Contents 1 Virtual Machine Network Environment Analysis...3 2 "Control Tower" Must Have an Overall Picture of the Network...4 3 Virtual Machine Migration
More informationAttachment 1 DATA SERVERS AND DATA CENTERS APPROVAL PROCESS
Attachment 1 DATA SERVERS AND DATA CENTERS APPROVAL PROCESS 1. AF Data Center Infrastructure Management. Under the Federal Data Center Consolidation Initiative (FDCCI), OMB defines a data center as a closet,
More informationDoD Mobility Kim Rice
DoD Mobility Kim Rice Mobility PMO Contact: 301-225-5670 17 Jun 2015 DoD Mobility PMO Concept Vision: Secure, reliable and responsive infrastructure and services for the mobile users across the DoD. Mission:
More informationNetwork Architecture & Topology
Network Architecture & Topology Coleman Kane Coleman.Kane@ge.com August 25, 2014 Cyber Defense Overview Network Architecture & Topology 1 / 12 For the sake of this course, we will focus on switched (or
More informationFederal Data Center Consolidation Initiative
Federal Data Center Consolidation Initiative Department of the Treasury Data Center Consolidation Plan September 2011 Update 1 Introduction... 2 2 Agency Goals for Data Center Consolidation... 3 2.1 Cost
More informationHow To Get The Most Out Of A Pon From Commscope
Passive Optical Network (PON): Solutions for Federal Government Deployments Operational Efficiency Solutions Passive Optical Network (PON) solutions for federal government networks Discover opportunities
More informationVirtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
More informationSUBJECT: Privileged Access to Army Information Systems and Networks. a. Army Regulation (AR) 25-2, Information Assurance (IA), 23 March 2009.
DEPARTMENT OF THE ARMY OFFICE OF THE SECRETARY OF THE ARMY 107 ARMY PENTAGON WASHINGTON DC 20310-0107 Office, Chief Information Officer/G-6 SAIS-CB AUG 11 2014 MEMORANDUM FOR SEE DISTRIBUTION 1. References.
More informationReport via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief
More informationCLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS (COMPLETE ANALYSIS USING RETAIL APPLICATION TEST DATA)
CLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS (COMPLETE ANALYSIS USING RETAIL APPLICATION TEST DATA) Abhijeet Padwal Performance engineering group Persistent Systems, Pune email: abhijeet_padwal@persistent.co.in
More informationGovernment-wide Real Property Management. April 15, 2015
Government-wide Real Property Management April 15, 2015 Roadmap for Today s Discussion (1) History of Real Property Management (1) Historic Executive Branch Actions: EO 13327 Civilian Property Realignment
More informationJoint Training Enterprise Architecture
Joint Training Enterprise Architecture WJTSC M&S WG 19 September 2012 Mandate for Change Reduce JLVC Operating & Sustainment Costs Keep pace with the operating environment Joint Force 2020 CE2T2 Program
More informationChapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1
Chapter 9 Internet Copyright 2011 John Wiley & Sons, Inc 10-1 Outline 9.2 - How the Internet Works - Basic Architecture - Connecting to an ISP - Internet Today 9.3 - Internet Access Technologies - DSL
More informationFederal Cloud Computing Initiative Overview
Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing
More informationFDCCI is your mission. CommScope is your answer. Performance, security and efficiency that meet your targets. Data Center Solutions
FDCCI is your mission. CommScope is your answer. Performance, security and efficiency that meet your targets Data Center Solutions } FDCCI is changing how the government manages data A challenge and an
More informationENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
More informationHow To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
More informationSummitStack in the Data Center
SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution that Extreme Networks offers a highly virtualized, centrally manageable
More informationData Center Optimization Plan. Federal Data Center Consolidation Initiative Public Release 9.30.11
Data Center Optimization Plan Federal Data Center Consolidation Initiative Public Release 9.30.11 Federal Data Center Consolidation Initiative Department of Energy Data Center Optimization Plan Public
More informationCybersecurity for Energy Delivery Systems 2010 Peer Review. William H. Sanders University of Illinois TCIPG: Network Access Policy Tool (NetAPT)
Cybersecurity for Energy Delivery Systems 2010 Peer Review Alexandria, VA July 20-22, 2010 William H. Sanders University of Illinois TCIPG: Network Access Policy Tool (NetAPT) (Joint work with David Nicol,
More informationTesting & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
More informationFederal Data Center Consolidation Initiative (FDCCI)
Federal Data Center Consolidation Initiative (FDCCI) Final Data Center Consolidation Plan U. S. Office of Personnel Management Office of the Chief Information Officer Update 9/30/2011 1 Introduction...
More informationNetwork Topology. White Paper
White Paper Network Topology JANUARY 2015 This document describes the benefits of Cisco Meraki s Network Topology technology and how you can use it to visualize and troubleshoot your network. In addition,
More informationCloud-Based dwaf A Real World Deployment Case Study. OWASP 5. April 2012. The OWASP Foundation http://www.owasp.org
Cloud-Based dwaf A Real World Deployment Case Study Alexander Meisel Riverbed Technology alex AT meisel DOT cc 5. April 2012 Copyright The Foundation Permission is granted to copy, distribute and/or modify
More informationOUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL
United States Army Special Operations Command (USASOC) Special Operations Forces Information Technology Enterprise Contracts (SITEC) OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL Prepared by:
More informationAPPENDIX 8 TO SCHEDULE 3.3
EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.
More informationHow T-Systems Solved Its Data Center Challenges to Offer Dynamic Services to the U.S.
Case study How T-Systems Solved Its Data Center Challenges to Offer Dynamic Services to the U.S. The Company T-Systems, part of Deutsche Telekom Group (DT), delivers Information and Communication Technologies
More informationFrom: Caroline Boyd, Whitney Hewson, Kimberly Hubbard, Stephanie Majercik, and Steve O Keeffe, MeriTalk Data Center Exchange
May 14, 2012 VIA EMAIL To: MeriTalk Data Center Exchange April 26 Meeting Participants From: Caroline Boyd, Whitney Hewson, Kimberly Hubbard, Stephanie Majercik, and Steve O Keeffe, MeriTalk Data Center
More informationArmy Golden Master (AGM) Microsoft Products
Army Golden Master (AGM) Microsoft Products Information Exchange Forum Session: 1 Army Golden Master Program Tina Hernandez NETCOM 9 th SC (A) G5 PP&A UNCLASSIFIED Program Overview / Objectives UGM Baseline
More informationCloud Computing Strategy
Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 This page intentionally left blank EXECUTIVE SUMMARY In the current political, economic, and technological landscape,
More informationUsing EAI in the Defense Integrated Military Human Resources System
Using EAI in the Defense Integrated Military Human Resources System COL Lawrence Sweeney, USAF DIMHRS Joint Program Manager SPAWAR ITC University of New Orleans Research and Technology Park Agenda DIMHRS
More informationSDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network
SDN AND SECURITY: Why Take Over the s When You Can Take Over the Network SESSION ID: TECH0R03 Robert M. Hinden Check Point Fellow Check Point Software What are the SDN Security Challenges? Vulnerability
More information