Welcome!

Cloud Computing for the Government

Kevin Jackson

Subscribe to Kevin Jackson: eMailAlertsEmail Alerts
Get Kevin Jackson via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Kevin Jackson

E-book: Educate Yourself with Dell Insight Partner Views on Cybersecurity Data security breaches and hacker attacks on private businesses, health organizations and government agencies in the U.S. have grabbed headlines with increasing frequency, it seems. There is zero doubt about the damage these events cause. Cybercriminals and hackers walk away with customers’ payment card information and employee data while companies and federal authorities investigate the source of the leaks and spend millions of dollars to repair the harm. Some see these breaches as a threat to national security and in response, the U.S. government has launched the “30-day Cybersecurity Sprint” as a tactic designed to beef up cybersecurity protocols. According to media reports, specific program steps include: Immediately fixing any cybersecurity vulnerabilities Tightening policies and practic... (more)

Cloud Computing Price-Performance By @Kevin_Jackson | @CloudExpo #Cloud

Cloud Computing Price-Performance Could Vary by 1000%! Yes, you read that right. The price/performance of your cloud computing infrastructure could vary as much as 1000 percent depending on time and location. High levels of variability have actually been seen within the same cloud service provider (CSP) processing the exact same job. This also means that the cost to you of processing the exact same job in the cloud could vary by this much as well. This surprising result was discovered by a Rice University group, headed by Dr. T. S. Eugene Ng, that has been focusing on cloud comp... (more)

Is Social Media Right for Your Small Business? By @Kevin_Jackson | @CloudExpo #Cloud

Everyone from pre-teens to granddads does social media today. With Twitter, Instagram, Facebook and many newer ways to stay in the know popping up every day, picking the right platform can be a difficult task. While the personal value of this modern convenience seems obvious to most, the task of proving the channel’s worth to a business can be very challenging. With this said up front, many larger companies have taken the plunge anyway. According to a recent eMarketer survey, 88 percent of U.S. companies with 100 or more employees that were surveyed are using social media for mark... (more)

African-Americans and STEM Careers: Getting a Foot in the Door

By Sandra K. Johnson Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realization of such promises has not benefited all segments of the U.S. population, including African-Americans. As we celebrate Black History Month, I share a few facts on this issue, suggest sources for solutions and profile African-American technology trailblazers. Silicon Valley's most innovative technology co... (more)

The CISO Role in Cybersecurity By @Kevin_Jackson | @CloudExpo [#Cloud]

The CISO Role in Cybersecurity: Solo or Team Sport? The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days, according to Gregory Touhill, deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. What could happen to your company during that eight-month period? Could your company survive? This alarming statistic is just one of the reasons why the National Cybersecurity Institute at Excelsior College (NCI) undertook the task of surveying ... (more)