[Blog Post] Revolutionizing Government Military IT

  • By Chris Haddad
  • 11 Jun, 2014

While spending time in Washington DC meeting with various gov-mil teams, I have been relying on the following resources to describe how to:

A) Enhance mission situational awareness and improve information transfer efficiency

B) Build information hubs with Attribute Based Access Control (ABAC)

C) Deliver high quality solutions on faster spirals

The Revolution in Military Affairs 2.0: Information Dominance and the Democratization of Information Technology

The goal of transforming legacy, industrial age military organizations to agile, responsive information age forces has eluded much of the world’s defense organizations. Even in countries with large defense budgets, the perception of associated time and expense has often frustrated modernization efforts. As a result, military forces continue to operate in a manner emphasizing decomposition, specialization, hierarchical organization, process optimization, deconfliction, centralized planning/decentralized execution and to organize in a manner that creates capability and information silos and promotes the acquisition of non-interoperable combat and information systems. All of this results in forces that are less and less capable of addressing 21st century security requirements.

Secure Information Sharing

In Pursuit of Secure Efficiency: Achieving Operational Agility and Fiscal Benefits Through Secure Multiple Classification Level Information Sharing

Secure multilevel information sharing is both a technical and operational problem that has long frustrated both government and industry. This white paper both clearly articulates the problem and outlines an innovative solution that leverages open standards such as the eXtensible Access Control Markup Language (XACML) and open source products including the Apache Accumulo database and the WSO2 Identity Server.

Building an Ecosystem for API Security

Enterprise API adoption has gone beyond predictions. APIs have become the ‘coolest’ way of exposing business functionalities to the outside world. Both your public and private APIs need to be protected, monitored, and managed. This white paper focuses on API security. There are many options available that could be very confusing. When should you select one over another is a question that frequently comes up – and you need to cautiously identify and isolate the tradeoffs.

Faster Spirals

Integration Platforms and App Factories: The Transformation of Legacy Defense Systems

For the better part of two decades, sustainment burdens associated with legacy defense and intelligence software systems have been rising. Many of the cost drivers are inherent to fundamental decisions taken at the time the systems were designed. Service oriented architecture (SOA) principles provide conceptual solutions for these cost drivers.

The Path to Responsive IT

IT teams desire to gain an edge and improve their ability to grow business revenues, improve customer retention, and deliver timely and cost effective solutions. Often, outdated IT infrastructure, processes, and tooling impede efficient IT delivery; increases project delivery times, and inhibits business model flexibility. With disruptive technologies (i.e. Cloud, mobile, social, Big Data, APIs), IT teams have a solid technology foundation that can transform business agility and build a more responsive organization.

Application Services Governance: Automate IT Best Practices and Enforce Effective and Safe Application Service Delivery

Application Services Governance is a mechanism to achieve business agility, build a responsive IT organization, and optimize IT effectiveness. Effective governance automates IT best practices, improves service levels, and facilitates safe, rapid iterations. Governance facilitates safe and rapid change by mitigating risks and reducing uncertainty when teams evolve IT systems. When enhancing governance effectiveness, successful teams smartly remixes IT skills, tooling, and processes; development and operation teams adopt agile processes, introduce automation tooling, and streamline collaboration.

Choosing a Technology Partner

Engagements: The Role of the Middleware Vendor in the Defense Industry

By serving as a knowledge base and tailoring their approaches, middleware vendors can mitigate risks associated with transformation and help to ensure program success. This white paper discusses the defense sector’s unique organizations, skill sets and operating modes and recommends paths that middleware vendors can take to best serve this community.

Click here to refer to Chris's blog.