Feeds

G-Cloud boss hopes sexy cloud expos will warm up gov bods

Denise McDonagh: Buy camps will 'propagate' G-Cloud

Beginner's guide to SSL certificates

The G-Cloud programme is being developed to help the wider public sector transition to cloud services, according to Denise McDonagh.

In an interview with Guardian Government Computing, the director of the G-Cloud programme said that she is currently focusing on the "propagation" of the G-Cloud.

"Propagation for me is about how I help the public sector – central and local government, the NHS, charities, education and skills – to think about how and when they use the service and can transition from where they are now into cloud services."

Specialist "buy camps" for government purchasers, supplier expos, communities of interest and an "Ask Mike" online information service are among initiatives that McDonagh is using to promote the G-Cloud.

The Home Office, where McDonagh is also IT director in addition to running the G-Cloud programme, was among the departments to make a purchase – for support services – through the first iteration of CloudStore.

She said that contracts worth £500,000 were signed in the first 10 weeks after the initial CloudStore catalogue opened in mid-February.

The G-Cloud programme is now in discussions with 50 public bodies through the Ask Mike service, helping them through the process of what and how to buy.

So far 244 suppliers have expressed an interest in joining the second version of CloudStore, but McDonagh said she is expecting a lot more to sign up.

"I have had a number of SMEs that said 'we did not bid first time around because we wanted to see what it was like, but we will want to bid second time around'," she said.

Cloud hosting company Cat N was one of the SMEs that decided to join the first iteration and, according to McDonagh, made its first sale in May.

This article was originally published at Guardian Government Computing.

Guardian Government Computing is a business division of Guardian Professional, and covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

Intelligent flash storage arrays

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.