Welcome!

Government Cloud Authors: Elizabeth White, Liz McMillan, Gopala Krishna Behara, Raju Myadam, Kevin Jackson

Related Topics: Government Cloud, Microservices Expo, Containers Expo Blog, Agile Computing, @CloudExpo, Cloud Security

Government Cloud: Blog Feed Post

Selling to Government (Especially DoD) – It’s Not All About YOU!

My job is all about finding commercial solutions that will solve government problems

By

My job is all about finding commercial solutions that will solve government problems. Some of my favorite work experiences have been when I can connect a new technology to an existing government problem! Talk about satisfying! Although every company is unique in what it offers, the process is often similar. First, I strive to understand what the company can do. Then, I translate that ability into something that is applicable to DoD. And finally, I look for the place within DoD where that solution is needed. That may sound obvious, but from the perspective of DoD, it’s 100% backwards. And that difference in perspective can often derail the process. So bear with me while I explain.

sellingDuring my years on Active Duty, I concentrated on requirements and capabilities. I knew that defining my requirements was the first essential step that would lead to my success as a war fighter. It was often tempting to jump ahead on the process and start listing the solutions I needed. But I knew that I would never get far that way.

First, I knew that I was usually several generations behind on what the “art of the possible” was. As much as the movies like to show DoD with up to date capabilities, what we actually had in the field was way behind. Given that DoD spends a fraction of what Industry spends on R&D, that makes sense. Keeping my requirements clear and factual ensured that I didn’t self-select a lower-grade solution.

Secondly, the acquisition folks would never let me get away with writing specifications based on anything but my basic, actual requirements. There are plenty of examples where military “requirements” went uncontested and after the acquisition process completed, the final purchase was for something MUCH more expensive than it needed to be. That’s a big NO-NO in DoD and there is lots of oversight to prevent that from happening. Now more than ever!

Linking these requirements to the resulting war fighting capability is the piece of the process that is most important when trying to get funding. As a C5ISR expert, I had to learn how to make my seemingly endless list of requirements make sense to the folks that had decision-making power over the funding. These folks are mostly interested in what these requirements bring to the fight: the capabilities that will be achieved. Getting my message across depended on linking my requirements to the capabilities that would enable success in a military mission.

Now, overlay on the above Company X, who is really good at making Widget Y. Widget Y does something really cool, and Company X wants to sell Widget Y to DoD. I learn about Company X and how to use Widget Y, and I find a place in DoD where they might need that capability. A meeting is set up, and Company X visits the warfighter and gets their chance to showcase Widget Y. But Company X can’t get the message across! Because Company X is so in love with Widget Y they can’t stop and look at the requirement objectively and offer their educated inputs on how to satisfy that requirement to achieve the capability that is needed.

Every parent that drops off their 5 year old on the first day of kindergarten truly believes that they have just done something really wonderful for that school. It’s not until the first parent-teacher conference that it even occurs to them that their child might not be a perfect, 100% value-added addition to the class! So it is for Company X. But unlike the parent, Company X is not guaranteed a seat in the class!

DoD really and truly wants to hear from Company X, because they know that Company X is smarter than they are about their particular type of technology. But DoD only wants to hear how that technology can apply to fulfilling their previously identified and prioritized existing requirements. DoD is NOT interested in helping Company X figure out where to stuff their solutions.

To make this type of interaction between DoD and Industry successful, the company needs to be prepared to do some homework BEFORE they go in. They need to understand, as much as they can, what DoD needs. They need to be prepared to really listen when DoD talks. And then they need to be ready to interact with DoD to brainstorm ideas and offer expert advice. Obviously, the desired outcome is that Widget Y might be a solution that can help. But that’s something that can only be determined by clearly addressing the requirements first!

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

IoT & Smart Cities Stories
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...