Setting the Stage for Cloud Adoption: CLOUD2 Commission Unveils Recommendations

In April, I was pleased to accept a role as one of the commissioners on the TechAmerica Foundation's CLOUD2 Commission, whose mandate was to provide the Obama Administration with recommendations for how government could better deploy cloud computing, and for public policies that will help drive innovation in the cloud and spur economic growth.

In April, I was pleased to accept a role as one of the commissioners on the TechAmerica Foundation’s CLOUD2 Commission, whose mandate was to provide the Obama Administration with recommendations for how government could better deploy cloud computing, and for public policies that will help drive innovation in the cloud and spur economic growth.

Today the CLOUD2 Commission released its recommendations, which are focused on four broad themes that are critical enablers of the cloud: 

  1. Building trust into cloud solutions with strong identity management and other technologies

  2. Fostering transparency in the delivery of cloud solutions by providers

  3. Enabling transformation through changes in federal acquisition and budgeting to take advantage of unique cloud traits

  4. Addressing data sovereignty and privacy challenges that could limit growth of cloud adoption

CA Technologies was honored to serve on this important Commission.  We believe that the issues that are addressed in the Commission’s recommendations will help increase trust in the cloud and accelerate adoption both in the public and private sectors. 

We also expect that the adoption of the recommendations will send a strong signal to governments around the world, that like the U.S., are looking to realize greater IT efficiency and agility with the help of cloud computing.

In my role as CLOUD2 Commissioner, along with my colleague, Brendan Peter, who served as a deputy commissioner, I contributed to three of the Commission’s critical recommendations.  

First, we did extensive work in the area of data and application portability. In speaking with customers around the world, we know these are critical concerns that must be addressed – both in the public and private sectors – to lead to broad adoption of cloud computing. Organizations must have the flexibility to move applications and workloads across public, private, and hybrid clouds, and even between clouds and traditional IT environments. Once this is achieved, they can unlock the real potential of cloud computing: business agility.

We also spearheaded work to ensure identity and access management issues were addressed completely in the report.  One of the recommendations is for the government to move quickly to implement multi-factor identity management solutions as part of the security strategy for the cloud.  This will help enhance security of cloud-based services delivered to the government and reinforce the vision articulated in the recently issued National Strategy for Trusted Identities in Cyberspace (NSTIC).

Finally, we were directly involved in the effort to create a buyer’s guide to help demystify how government agencies can acquire and implement the right cloud solutions depending on each organization’s needs and priorities.  We advocated for the inclusion of specific recommendations on common service measurement frameworks to guide customers in choosing cloud services. This is where our ongoing efforts with Carnegie Mellon University’s Cloud Service Measurement Initiative Consortium (CSMIC) and the Service Measurement Index  give us valuable insights we to share on data-driven approaches to compare competing cloud offerings. 

We worked extensively to help develop the best practices and policy considerations for the different stakeholders involved in buying cloud solutions, and I look forward to seeing how the guide evolves as federal agencies use and augment it.

We reached an important milestone today in the industry’s effort to accelerate cloud adoption in the public sector. When we first signed on to participate in the Commission, we knew we had an aggressive 3-month mandate to meet. It took an amazing level of collaboration across the many companies and experts involved to meet this goal – and I’m excited to see momentum for cloud continue as a result. Along with the other 70 top organizations involved with the Commission, I look forward to working with the Obama Administration and a range of private and public sector organizations to implement today’s recommendations.

To learn more about the CLOUD2 Commission’s recommendations, see today’s press release.

Written by

Adam Famularo

CA Leadership

Adam is the general manager of Cloud Strategy and Solutions, leading the team driving new…

Published in

View this topic
  • James Holland

    This is great. Hooray for Disney’s imagineers!


    become a new brand in the share market research with its accurate research. Proven
    itself always right whether market is bull or bear. Last week all paid clients
    booked handsome profit in NIFTY, BANKINIFTY & STOCKS. Now for the coming
    week we expect more correction can come in NIFTY as the IRAQ issue is getting
    more tense, If it happens more then you will see a sharp fall in all world marketNSE BSE, STOCK TIPSbecause as we know all world run on
    crude & most of the crude comes from IRAQ. So be ready for a sharp fall so
    sell will be the best strategy for next week also. Traders can make a sell
    position in NIFTY around 7600-7650 with stoploss 7750 for the target of
    7300-7200.One can also make a sell call NIFTY 50 stocks as per NIFTY levels. You
    can also take our two days free trial to check our accuracy. For further updates
    you can visit our website.



  • king lear

    testing comment functionality, please do not publish this

  • Rachel Macik

    Love the personal pic :)

    • CAHighlight

      Thank you!

  • Plutora Inc

    This is a good case study. 2.3 sec’s off a login transaction is big.

  • Michele Hudnall

    While the analysts were hyping DevOps, I posted the oversight of not including security as part of that discussion as you are highlighting here. Instead of just talking DevOps, it should be DOS (what’s old is new again :-) – DevOpsSec. As a previous AppDev person, it’s the app, who’s using it, why and where rather than the device and having the service available.

    As you rightly point, out Security should be baked into the solution.

    Nice Post and Timely!


    • CAHighlight

      Thank you for your feedback Michele. Agreed – security cannot be overlooked. Appreciate your input!

  • Mitesh

    I would love a printed copy

  • Lars Johansson

    I love the idea of BYOID! This makes me choose if I am almost anonymous (with my Hotmail Nicname) or official with identity from an official organisation. My Identity Provider will attach identity with right level of LoA according to the need of the Service provider.

    • CAHighlight

      Thank you for your comment. BYOID has tangible benefits for end users and relying parties but it also has to be weighed in the balance with potential risks and liability concerns. It will be interesting to see how BYOID plays out in the enterprise.