Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Cloud computing, managed services, and IT security
Tuesday - 11/19/2013, 7:36pm EST
With a name like "Akamai" one would think of a company originating in Japan.
Akamai Technologies was founded in 1998 by a student and his professor at MIT. They wanted a distinctive name, so they selected a word from Hawaii that conveyed a meaning of smart or intelligent. Very similar to the origin of the term "wiki."
Akamai Technologies takes a look at network systems and develops algorithms to speed up transfer of information.
The system they developed is generally classified under the phrase, "managed service." A federal information professional would normally consider using a managed service like this for dynamic allocation of resources.
A good example might be FEMA during a serious storm like Sandy.
It is hard to predict when a system will be stressed, when you have the option of using a system that expand with your requirements means less downtime and improved service to citizens.
During the interview, Ruff discusses a survey they had commissioned to gather perceptions of systems security from actual federal users.