Cloud Computing The Nexus for Information Synchronization Haden A. Land Vice President, Engineering & CTO Lockheed Martin Corporation May 8, 2013 1
Agenda Cloud Computing Benefits Characteristics & Delivery/Deployment Models Business & Technology Inflection Point Lockheed Martin Approach & Timeline Lessons Learned Future Context Internet of Things Advanced Use Cases Take Aways 2
The Dream of Cloud Computing Lower costs of hardware efficient and elastic Lower admin costs automation and selfservice Innovation accelerator on-demand access Agility and speed enabler easier app development Improved performance automated scale and micro clouds to the edge Power efficiency/green IT workload management Scalability scale or redirection of resources Security full control overall all assets The Potential is Great The Value Is Just Starting to be Realized One Nugget at a Time 3
Cloud Computing: More than Technology Cloud Characteristics 1. On-Demand Self-Service* 2. Ubiquitous Network Access* 3. Location Independent Resource Pooling* 4. Rapid Elasticity* 5. Measured Service* 6. NEW Business Models Pay for What You Need and Others *US NIST Definitions Federal Risk & Authorization Management Program (FedRAMP) Deliver Models Software As A Service Traditional & Cloud APPs Cloud API Cloud API Computer As A Service Storage As A Service Enterprise Mgmt As A Service Security As A Service Network As A Service Deployment Models Public Cloud is accessible over the public internet for general consumption Community Cloud Cloud is accessible over the public internet for specific groups/purpose Hybrids Solution As A Service Virtual Private Cloud is deployed at providers facility and dedicated to a specific customer Private Cloud is deployed behind customer firewall on customer presence More of a Business Model than Technology and Still Evolving 4
At Work, At Home, In the Cloud 5
Secure Mobile Apps and Smart Devices as Control Points Securing & Supporting The Digitally Connected 6
Where We Are Where We Are Headed Skype SSL VPN Yahoo Twitter Wikipedia iphone Pager Open Source ipad Facebook Cloud Computing YouTube Camera blackberry Cyber APT itunes laptop Google HPC Bing Key Trends Mobile Users Privacy vs. Function Information Growth Social Fusion Device Explosion STEM/STEAM Demographics Digital Natives BYOD Avatars When we change the way we communicate, we change society Clay Shirky Prezi Glogster NFC Big Data Augmented Reality LTE Nexus 7 SOHO 3-D Printing Mobile Always On Hyper Connectivity Personal SA Machine Learning Hybrid Clouds ipad3 Invisible Offerings Note iphone 5 Smart Infrastructure Adaptive Systems Immersive Gaming Klout Global 4G 7
Lockheed Martin Cloud Computing Strategy Strategy Build Foundation Holistic Offering with Flexible Components Disrupt Ourselves New Cloud Service and Operating Model Innovate for Growth Enable Customer Missions Mobility, Big Data Value Proposition Customized Mission Support Solutions Leveraging Mission and Domain Expertise Three-Prong Approach Secure Cloud, Green IT, and Energy Optimization Simplicity, Speed, and Deployment Flexibility Pre-integrated Infrastructure, Readiness Assessment Secure Cloud Delivery (Private, Community, Public, Hybrid) PEOPLE (Our Domain Expertise) USAF; USN/USMC; USA; Intel; ISR; Health; Energy; Financial; Homeland Security; Aviation PROCESS (Best Practices) SOA; LM21, EAI; CMMi; ITIL; TECHNOLOGY (Cloud Discriminators) Cloud Fabric; Cyber Security + Governance, + Practice and Partner Ecosystem, = Thundercloud Design Cloud Brokerage SYSTEMS INTEGRATION CLOUD SOLUTIONS Customer Focused Cloud Solution Provider 8
Visionary Strategic Tactical Case Study: SolaS TM (Cloud Computing) Tactical Strategic SolaS-I Community Cloud operational Implementations: JPL;FTC; EPA; NIH; FERC; TSA; DOE; DOJ; ATF; PGC Cloud Computing Centers & Mission Apps Chimera, Zero Client, Social Collaboration Gartner s Case Study on SolaS in 2011 CIO Agenda Report Visionary SolaS Virtual Private Cloud Public; GovernmentExchange.com; ThunderCloud Innovation Center(s) Investment to support SolaS Enhancement Starfire and Black Cloud Pre-integrated Clouds Cyber and Cloud Computing Alliances SolaS Virtualization and Foundation for Cloud - 1 st Cloud Implementation for Federal Customer Cloud Computing Strategy Definition & Development 2009 2013 9
Beyond A Single Cloud: Lessons Learned / Challenges What You See What You May Not See On demand Self Service Flexible, Elastic Usage Models Broad Network Access Pay For What You Use Finance, Security, Portfolio Management Continuous Security and Compliance Management Defense of Cyber APT Acquisition Contracts Vendor Lock In and interoperability Performance SLAs and Mission Support Green Eco-Friendly Legacy Application Support and Migration Financial Integration Change Management DR/BC/COOP Focusing On Value & Differentiation While Commoditizing The Completion 10
Convergence & Integration Challenges ABI PED Result of human behavior, which creates a technology-immersed environment Interact & reinforce one another and are associated through complex dependencies Decreases the gap between idea and action. Leverage this convergence; but requires rethinking design, build, and delivery of systems 11
Technology Trends CLOUD Commercial By 2016, 50% of global 1,000 companies will have stored customer sensitive data in the public cloud. Source: Gartner, 2012 Federal 100% of Fed agencies experimenting with cloud, targeting $20B in IT spend Source: Federal CIO Council, 2012 MOBILE 96% of the US population has a mobile phone, 40% now own a smartphone. Source: Google, 2012 35% of Fed Workers use smart phones, 43% by 2013 62% of Fed Agencies allow BYOD Source: CDW Federal Mobility Report, 2012 42% of respondents agree that Cloud computing is extremely risky 54% of respondents agree that mobile platforms are extremely risky Source: IBM Global Risk Study 12
Industry View of Cloud Computing Futures 3D Printing Platform as a Service Cloud-Based Recovery Services Cloud Management Platform Browser Client OS Cloud Email Board of Directors Communications Systems Cloud Testing Tools and Service Cloud Collaboration Services Communications Service Providers as Cloud Services Brokerages BYOD IaaS Container Encryption Integration PaaS Cloud Parallel Processing IDaaS Hybrid Cloud Computing Social Analytics Private Cloud Computing Aggregation Brokerage Hypervisor Security Protection High Assurance Hypervisors Cloud BPM CSB Integrated Billing Application PaaS Application Stores Packaged Integration and Cloudstreams Cloud Management Platforms HTML5 Database Platform as a Service (DbPaaS) Enterprise Internet Reputation Management SECAAS for Consumer Cloud Services Cloud Application Development Services Cross-Agency Case Management Cloud Access Security Brokers Personal Cloud Private Platform as a Service Customization Brokerage Community Cloud PurePlay CSBs IT Distributors as CSBs Internal CSB BPaaS IaaS + Middleware Application Service Governance CSB Single Sign-On Big Data Data Center Storage Encryption Virtual Machine Resilience Crowdsourcing Cloudbursting Mobile Device Management Services Cloud Encryption Gateways Internet of Things Cloud Security and Risk Standards Mobile Robots OAuth Autonomous Vehicles Hybrid IT Cloud-Based Data Identification MDM Solutions in the Cloud Cloud Services Brokerage Cloud-Based Multienterprise Processes Cloud-Optimized Application Design Natural-Language Question Answering High-Assurance Public Identity Provider Augmented Reality Virtual Machine Recovery Tokenization Elastic Multitenancy Real time Infrastructure Cloud-Based Security Services NFC Cloud-Based Security Services Application Security as a Service Multisourcing Service Integrator Cloud Computing In-Memory Analytics Integration Brokerage Secure Web Gateways Public Cloud Storage Text Analytics CloudWeb Platforms Home Health Monitoring Mobile OTA Payments Open ID Media Tablets Virtual Worlds Hosted Virtual Desktops Virtual Data Rooms Methods Predictive Analytics Cloud Advertising Idea Management Federated Identity Management Virtualization Speech Recognition Consumer Telematics Sales Force Automation SaaS Consumerization Email Encryption Infrastructure as a Service (IaaS) Biometric Authentication Methods Software as a Service (SaaS) Enhanced Network Delivery Identity Proofing Services IAM Managed and Hosted Services 2 to 5 years 5 to 10 years More than 10 years Obsolete before plateau Phone-as-a-Token Authentication Dedicated Email Services DevOps Persona Management Automatic Content Recognition Traditional IT Services Providers as CSBs Volumetric and Holographic Displays IT Manufacturers as CSBs SaaS Delivery of Treasury and Trading Services Quantum Computing Federated Help desk for CSBs OpenID Connect Human Augmentation Source: Gartner, Lockheed Martin 13
Establish Future Context Today s technology = yesterday s magic = tomorrow s given 19 th century = more scientific growth than previous centuries First 20 years of 20 th century eclipsed all of the 19 th First 12 years of the 21 st century on target to eclipse ALL of the 20 th That s 50,000 + years of human progress eclipsed in < 2 decades World Population - 1804=1B, 2012=7B, 2083=10B, 2030=India#1, 2050=Nigeria#3 Life expectancy - now advancing 100+ days / year; already in the 80 s for much of the world Human genome - already decoded and starting to be used for disease prevention; 90 years sooner than was expected Energy Smart Cities & Alternative fuels, key drivers include Coal~2040, Gas ~2070, US=4 to 8 Tkwh by 2100 IT Transformation Business Models, Data Layer, SMEs, C-Level Information In 2013 the global society will generate over 3 zettabytes of new information; in 2020 that number is forecasted to be 30+ zettabytes Any sufficiently advanced technology is indistinguishable from magic Arthur C, Clarke 14
The Internet of Things: How Can It Be Secured Remote sensing of objects and environment Over 50% of Internet connections are things 2011: 15+ billion permanent, 50+ billion intermittent 2020: 30+ billion permanent, >200 billion intermittent Audio Building & Infrastructure Management New routes to market via intelligent objects Cameras and microphones widely deployed Everything has a URL Content and services via connected products LTE Higher-resolution display Augmented reality Flash Situational decision support GPRS Wi-Fi NFC 15
Cyber Fractology VOS - On Demand Virtualized Operating Systems Internet of Things Sensor Swarms Trusted Foundry Semantic Gateways Anti-APT Autonomic guards Brokered Objects Reconnaissance Weaponization Delivery Exploit 16 Biometric Certificates MIA - Metadata Integrity Analytics Compromise C2 Exfiltration Digital Safe Zones / Islands 16
Community Connected Personal Assistants Life Coach Pushes priority data Protects privacy Eventual BCI Posts interests Pulls information 17
Cloud Computing Advanced Use Cases Personalized Cures Intelligent Clouds Quantum Biology Energy Efficiency Green IT Cyber Plectics Big Data Gamification Reality Augmented Swarm Intelligence 18
Take Aways Cloud Computing Benefits Characteristics & Delivery/Deployment Models Business & Technology Inflection Point Lessons Learned Cloud Convergence & Synchronization Advanced Use Cases 19
Thank You Imagination. Innovation. Impact. 20