Welcome!

Government Cloud Authors: Elizabeth White, Liz McMillan, Gopala Krishna Behara, Raju Myadam, Kevin Jackson

Related Topics: Open Source Cloud, Cloud Security, Government Cloud

Open Source Cloud: Article

How Does the DoD Fight Terrorism Despite Budget Cuts?

Open source technologies – a viable alternative to closed, proprietary software products

United States military contractors are under unprecedented pressure to find ways to cut costs for their federal government customers despite the interest in developing new technologies to fight the war on terrorism. Gone are the days when contracts would swell exponentially without any regard for initial quote figures or recourse from their customers. The federal deficit debt-reduction plan, which includes massive defense spending cuts, recently put the contracting community on notice that it has to change the way it does business, become more accountable for cost overruns and find ways to do more with less. Those who don't meet this mandate will find themselves on the outside looking in.

Getting the military contractor community to radically change the way it does business is akin to trying to turn around an oil tanker with an oar. It's a daunting challenge, but not an entirely impossible one. The answer may be easier to find than many would expect: open source technologies. By using open source software (OSS) and Government off-the-shelf (GOTS) technologies, contractors can offer quality products and services that are significantly more flexible and cost-effective than proprietary systems, and can be reused indefinitely and shared with other federal agencies without additional cost.

Open source technologies enable contractors to get unique emerging technologies and operational prototypes quickly into theater, using GOTS products that nearly all Department of Defense (DoD) IT personnel are familiar with and can easily manipulate and upgrade in the future. These systems are far easier to integrate into government IT frameworks and don't require massive annual license renewal costs since the federal government owns the software. Vendors that use OSS are leveraging open source libraries to provide functionality so that they can decrease the development timeline and costs for the government and allow it to essentially have unrestricted rights to use the software as it needs to.

The price tag and overall total cost of ownership for OSS is dramatically lower than commercial products. Proprietary software is traditionally far more costly up front, and requires annual maintenance fees for updates and revisions that can sometimes cost millions of dollars in large defense programs.

Proprietary software companies, perhaps to protect their market, will often argue that OSS is not secure. On the contrary, in many cases it is more secure than private commercial offerings. OSS is based on a mass community of developers who are constantly working to fix any vulnerabilities and bugs that may arise, providing a far larger and more aggressive effort to ensure a secure software product. Earlier this year, the DoD published a 68-page manual, entitled "Open Technology Development: Lessons Learned and Best Practices for Military Software," to offer development and security guidance for military agencies considering the use of OSS. Any concerns about the security of OSS today are really unfounded.

The federal government has clearly bought into this way of doing business. OSS systems are being used by U.S. military branches all around the world. Virtually all branches of the U.S. military rely on OSS for critical information networks. Intelligent Software Solutions, a small contractor based in Colorado Springs, developed an open source software development product that is used by more than 100 United States government organizations for everything from command and control systems for the Air Force to analysis of all the vessels coming into the United States on either coast for the Coast Guard. This is but one of a handful of companies offering OSS solutions to the federal government. Imagine if more, larger contractors adopted this business model?

As a result of the improvements in and the popularity of open source technologies, the U.S. government now has a viable alternative to closed, proprietary software products. Imagine entrusting a critical, multi-billion dollar military computer network to one software vendor that restricts access to its code (and has to come in and make updates and fixes at additional costs every time), or using open source software that can be accessed by the government itself and distributed to other government users, without additional charges. Which do you think makes more sense?

More Stories By Carl Houghton

As vice president of strategic initiatives at Intelligent Software Solutions, Carl Houghton oversees the integration of technologies across business units in the company. He also leads the company's Advanced Technology Division, responsible for advanced research and development of cutting edge technologies. He has led many software teams designing and developing applications for government customers. His previous experience includes 15 years of active duty service in the United States Air Force flying in combat missions in various places around Europe and the Middle East. More information on Intelligent Software Solutions can be found at www.issinc.com.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal ...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
"The Striim platform is a full end-to-end streaming integration and analytics platform that is middleware that covers a lot of different use cases," explained Steve Wilkes, Founder and CTO at Striim, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...