Welcome!

Java IoT Authors: Elizabeth White, Liz McMillan, Pat Romanski, Yeshim Deniz, Zakia Bouachraoui

Related Topics: @CloudExpo, Agile Computing, Cloud Security, Government Cloud

@CloudExpo: Article

Cloud Expo New York Speaker Profile: Jill T. Singer – Federal CIO Emeritus

Jill Tummler Singer – Former CIO at the National Reconnaissance Office, now CEO of Tummler Singer Associates

With Cloud Expo New York | 12th Cloud Expo [June 10-13, 2013] starting next Monday, here's a look at one the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference coming up June 10-13 at the Jacob Javits Center in New York City.

We have technical and strategy sessions for you all four days dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, where do they work, what else have they written and/or said about the Cloud that is transforming the world of Enterprise IT, side by side with the exploding use of enterprise Big Data – processed in the Cloud – to drive value for businesses...?


12TH CLOUD EXPO SPEAKER NAME: Jill Tummler Singer

TWITTER: @jilltsinger

ORGANIZATION: Tummler Singer Associates

12TH CLOUD EXPO SESSION TITLE: Time to Mission @ the Speed of Cloud

SESSION DESCRIPTION: Organizations want extraordinary results from their IT units. Today's mantra is faster delivery, better quality, cheaper solutions, and safer environments. Many CIOs are implementing cloud computing enterprise architectures to address these challenges with results varying greatly. Why are some organizations seeing only limited results from cloud computing implementations while others are increasing market share, decreasing costs, generating value, and innovating faster? In this session, Jill Singer will explore fundamental shifts organizations need to consider to get the most value from cloud computing and deliver "time to mission @ the speed of cloud."


Jill will also be a panelist on the CloudNOW Lunchtime panel: "Harnessing the Risks of Cloud Computing for Business Value"

BRIEF BIOGRAPHY:
Jill Tummler Singer recently completed 27 years of direct Federal Service and is the CEO for Tummler Singer Associates, LLC., a woman-owned consulting firm. Her last federal assignment was as the Chief Information Officer for the National Reconnaissance Office (NRO) where she was responsible for Information Technology, Information Assurance, and Information Management. The NRO, as part of the 16-member Intelligence Community, plays a primary role in achieving information superiority for the U.S. Government and Armed Forces. Prior to joining the NRO, she served as the Deputy CIO for the Central Intelligence Agency.

Jill Singer has served in several senior leadership positions within the Federal Government including Director of the Diplomatic Telecommunications Service, U.S. Department of State and Chief of Systems Engineering, Architecture, and Planning for CIA’s global infrastructure organization. She has held industry positions with Science Applications International Corporation, Inc. (SAIC), GE Aerospace, and IBM. She received her MS in Systems Analysis and BS in Computer Science from the University of West Florida. She is a graduate of several leadership programs including the Federal Executive Leadership Program and the University of Virginia’s (UVA) Executive Leaders Program.

Currently she serves as an Executive-on-Ground for the UVA McIntire School of Commerce and as a member of the AFCEA Cyber Committee. She has received numerous awards including CloudNow Legacy Award (2013); Top Ten Global Breakaway CIO (2012); Top Ten Women in Cloud (2012); Ten Most Powerful Women in Federal Technology (2011); CIA Mentor of the Year (2010); CIO Executive Council “Ones to Watch” (2010); and CIO Magazine Stand-Out Award for Collaboration and Influence (2010). She is also an accomplished speaker and published author.

BLOG: Jill's most recent articles can be see here jillsinger.ulitzer.com/


RECENT CLOUD COMPUTING QUOTE:

"The NRO Cloud strategy [isn't] too different from how other Federal agencies adopt Cloud Computing.

Most agencies processing classified information are focused on private clouds versus public clouds for security and information management/assurance reasons. Over time, though, I believe federal community clouds will emerge, as will private hybrid clouds, which allow agencies to maintain a private space as well as take advantage of federal community clouds.

The NRO Cloud will be implemented in four phases over the course of 6 years. It’s a complex migration necessarily paced to meet federal budget processes, existing acquisition commitments, and mission service imperatives."


[from "Is Cloud Computing for Real?"]

More Stories By Jeremy Geelan

Jeremy Geelan is Chairman & CEO of the 21st Century Internet Group, Inc. and an Executive Academy Member of the International Academy of Digital Arts & Sciences. Formerly he was President & COO at Cloud Expo, Inc. and Conference Chair of the worldwide Cloud Expo series. He appears regularly at conferences and trade shows, speaking to technology audiences across six continents. You can follow him on twitter: @jg21.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of ...
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...