UK MOD to Build Open Source Analytics Platform

mod.png

The Ministry of Defence has launched a competition to build an evolutionary new open source analytics platform to help it better understand its data.

The department is seeking prototype solutions to help analyse its structured and unstructured data.
The platform will help the MOD to understand its internal information, documents, processes and interactions, allowing it to streamline processes, collaborate and share knowledge more easily. Ministry of Defence embraces cloud apps with Office 365 move Ministry of Defence launches private cloud for app sharing MoD scientists publish open source code on GitHub for first time

The department has £250,000 available for the first phase of the competition, with up to £2 million allocated for phase two, which will be awarded to the most successful phase one projects.  The project will be created by the Centre for Defence Enterprise (CDE), on behalf of the MOD’s information systems and services wing, will be led by CIO Mike Stone.

Companies interested in competing are invited to attend a briefing event at techUK in London on 24 June and have until 13 Ausgust 2015 to submit their proposals online.
“Traditionally the MOD has been cautious of adopting emerging and unproved technologies. However, we need to adopt these freely available capabilities and services now,” said Stone announcing the initiative.
            
“I hope this CDE competition will encourage industry, and particularly small and medium-sized enterprises (SMEs) that are delivering analytics and digital enablers, to help us develop a capability that will become an important part of defence transformation,” he added.
Stone joined the MOD a year ago with a promise to “dramatically improve” the department’s IT by adopting more user-friendly technologies and exploiting cloud and mobile.
Last week the department announced it has started to move its 420,000-strong workforce to Microsoft Office 365.

The IT team are working to improve 30 different issues identified by Stone, including better access to the internet and social media, quicker logon times, better file sharing, browser choice, reducing device size and weight and more regular password resets.
Computerworld:  http://bit.ly/1Mb53ns

« Australia is 'one of most aggressive' in Mass Surveillance
Digital Currencies: A Gold Standard for Bitcoin »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Exec

Cyber Exec

Cyber Exec is an executive search firm dedicated to global talent acquisition in Cyber Security, Information Technology, Defense...

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

Spire Solutions

Spire Solutions

Spire Solutions is the Middle East & Africa region’s leading cybersecurity solution provider and value-added distributor (VAD).

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

QuoLab

QuoLab

QuoLab empowers security professionals to analyze, investigate and respond to threats within an integrated ecosystem.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

Arelion

Arelion

Arelion is a leading light in global connectivity and we've been keeping the world connected for nearly three decades.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Codenotary

Codenotary

Codenotary provide a comprehensive suite of verification and enforcement services to guarantee the integrity of your software throughout its entire lifecycle.

Lansafe

Lansafe

Lansafe stands as a leading managed service provider in the UK, seamlessly integrating IT, Telecoms, Security, Electrical and Cyber Security solutions.