SlideShare une entreprise Scribd logo
1  sur  92
Tech Update Summary
July 2016
Blue Mountain Data Systems
For CTOs, CIOs & CISOs
Visit Blue Mountain Data Systems
https://www.bluemt.com
For CTOs, CIOs & CISOs
Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue
Mountain Data Systems Blog. We hope you will visit our blog for the latest information.
You can also receive these updates via email. Click here to subscribe.
Here’s the summary of the Daily Tech Updates for July 2016. Hope the information and ideas prove
useful.
Best,
Paul Vesely
President and Principal Architect
Blue Mountain Data Systems Inc.
Network Security
Network Security
MICROSOFT: Microsoft Issues Windows 10 Preview Build, Patches Critical Flaws.
With less than a month to go until the release of the Windows 10 Anniversary
Update, Microsoft put out a new build that fixes a number of bugs in Windows,
Office, Edge and other applications. In addition, Microsoft’s Patch Tuesday release
featured 11 updates for vulnerabilities, including six rated as “critical.” Read the
rest
[TOPTECHNEWS.COM]
CISCO: Unveils Three DNA Network Security Technologies. Cisco has announced
three new technologies for its Digital Network Architecture (DNA) solution to
enable network engineers, application developers, channel partners, and IT
customers to embed improved and simplified security within their network
infrastructure layer: Umbrella Branch, Stealthwatch Learning Network License, and
Meraki MX Security Appliances with Advanced Malware Protection (AMP) and
Threat Grid. Find out more
[ZDNET.COM]
Network Security
SWIFT: Seeks Stronger Network Security. Swift is turning to outside help as it looks
to improve security on its network following a number of hacking incidents. It has
engaged cyber security firms BAE Systems and Fox-IT, and created a Forensics and
Customer Security Intelligence team, as it wants to investigate security incidents
“within customer environments”. Read more
[BANKINGTECH.COM]
MICRO-SEGMENTATION: Tempered Networks Simplifies Network Security.
Tempered Networks’ Marc Kaplan explains how micro-segmentation simplifies the
network, makes firewalls easier to manage and improves network security. Read
the rest
[NETWORKWORLD.COM]
Encryption
Encyption
FEDERAL GOVERNMENT: John McCain Threatens to Subpoena Apple CEO Tim Cook
to Talk Encryption with Feds. “We now find ourselves at what is a complete
impasse [in the encryption debate], and it is time I urge for congress to step in and
break that impasse,” said one former assistant attorney general. Read the rest
[FEDSCOOP.COM]
GOOGLE: Testing a Chrome Browser that Adds Post-Quantum Encryption. In a truly
forward-thinking move, Google is getting serious about the effort to future-proof
internet security: users of the tech giant’s test-phase browser, Chrome Canary, can
start testing a so-called post-quantum cryptographic technology aimed at making
users immune from next-next-generation cryptographic attacks. Find out more
[EXTREMETECH.COM]
Encyption
EMAIL: Simple Security – How Gmail, Mailvelope, and Virtru Make Encrypted Email
Easier. Encrypting your email is a great step towards more secure communication.
Gmail, Mailvelope, and Virtru can help streamline your encrypted email efforts.
Read more
[TECHREPUBLIC.COM]
OPINION: An Encryption Commission Is A Waste Of Time. Members of Congress
are looking to create an encryption commission that would “get the answers we
need” on the issue of encryption and digital security. Will this really help? Read the
rest
[GIZMODO.COM]
Databases
Databases
MICROSOFT: SQL Server Data Tools (SSDT) Now Supports Developing Databases
Using Always Encrypted. Microsoft recently announced that SQL Server Data Tools
(SSDT) now supports developing databases using Always Encrypted. Always
Encrypted is a feature designed to protect sensitive data, such as credit card
numbers or national identification numbers (e.g. U.S. social security numbers),
stored in Azure SQL Database or SQL Server databases. Always Encrypted allows
clients to encrypt sensitive data inside client applications and never reveal the
encryption keys to the Database Engine (SQL Database or SQL Server). Read the
rest
[MSPOWERUSER.COM]
Databases
SPECIALIZED: Terabyte Terror: It Takes Special Databases to Lasso the Internet of
Things. Non-relational databases can help take the pain out of corralling swarms of
sensor data. IoT sensors produce a massive amount of data. This volume and
variety of formats can often defy being corralled by standard relational databases.
As such, a slew of nontraditional, NoSQL databases have popped up to help
companies tackle that mountain of information. Find out more
[ARSTECHNICA.COM]
MySQL: Building a Web UI for MySQL Databases in Plain Java. Learn how to
connect MySQL databases from Java web applications, from creating classes,
implementing the UI, and running the application. Read more
[DZONE.COM]
Databases
NIST: NIST Database Goes Ballistic. The ability to match a bullet with the gun that
fired it has been a forensic staple for law enforcement for almost 150 years, but
the National Institute of Standards and Technology is hoping to juice the old
capability with 21st century big data. Read more
[FCW.COM]
More About Blue Mountain
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S.
Dept. of Labor, Employee Benefits Security Administration. Responsible to the
Office of Technology and Information Systems for information systems
architecture, planning, applications development, networking, administration and
IT security, supporting the enforcement of Title I of the Employee Retirement
Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for
design, development and support for its various enforcement database
management systems, as well as all case tracking and customer service inquiry
systems. Blue Mountain also provides IT security services to the EBSA, in the form
of FISMA Assessment and Authorization, System Security Plans, Risk and
vulnerability assessments, monitoring and investigation support. Read more.
Security Patches
Security Patches
MICROSOFT: July 2016 Patch Tuesday: Microsoft Releases 11 Security Updates, 6
Rated Critical. For July, Microsoft released 11 security bulletins, six of which were
rated critical due to remote code execution (RCE) vulnerabilities. Read the rest
[NETWORKWORLD.COM]
ANDROID: Android Security Bulletin Features Two Patch Levels. The frail world of
the Android ecosystem has taken some hits in the past week with the disclosure of
a full disk encryption bypass vulnerability and the arrival of the HummingBad
malware. Find out more
[THREATPOST.COM]
Security Patches
ADOBE: Adobe Deploys Security Update to Fix 52 Vulnerabilities in Flash. Some
of the critical flaws could lead to remote code execution on your PC. The update
includes Flash security fixes across the Microsoft Windows, Apple Mac, Linux,
and ChromeOS operating systems, as well as the Google Chrome, Microsoft
Edge, and Internet Explorer 11 browsers. Read more
[ZDNET.COM]
INTEL: Intel Patches Local EoP Vulnerability Impacting Windows 7. Intel issued an
important security patch Monday for a vulnerability that could allow hackers to
execute arbitrary code on targeted systems running Windows 7. The bug, located
in Intel’s HD graphics Windows kernel driver, leaves affected systems open to a
local privilege escalation attacks that could give criminals the ability take control
of targeted systems. Read more
[THREATPOST.COM]
CIO, CTO & CISO
For the CIO, CTO & CISO
CTO: Census Seeks CTO. The Census Bureau is looking for a new chief technology
officer. In the midst of the bureau’s 2020 technology push — an ambitious overhaul
that watchdogs are monitoring closely — the agency posted its official CTO job
listing on July 11. The posting comes three weeks after Avi Bender, who had served
as Census CTO since 2010, moved to the National Technical Information Service.
The next CTO will serve under another newly arrived leader — CIO Kevin Smith,
who joined the bureau in June. Read the rest
[FCW.COM]
THREE THINGS: Every CISO Should Know. To reduce their organisation’s attack
surface – and improve their team’s ability to detect, react, respond and recover –
CISOs should keep three things in mind. Read the rest
[INFORMATION-AGE.COM]
CIO, CTO & CISO
CIO: Execs From Outside IT Win Key CIO Jobs. Pressure to fulfill business goals
forces companies to look for different breed of IT leaders. Eli Lilly & Co. this week
reverses a long history of naming chief information officers with deep enterprise
technology experience as Aarti Shah, a 22-year veteran at the drug company,
takes the helm. But her appointment barely ranks as an outlier as Lilly and other
companies look outside the traditional technology ranks for executive talent that
boards and chief executives can hold accountable for business objectives. Read
the rest
[BLOGS.WSJ.COM]
CIO, CTO & CISO
CTO: IRS’s Top Techie Leaves Citing Lapsed Critical Pay Authority. The IRS is losing
its chief technology officer, Terry Milholland, due to a lapse in a 1998 statute that
allowed for a higher pay band for select positions at the tax agency, according to
Commissioner John Koskinen. In a June 29 email to staff, Koskinen said
Milholland is the latest IT executive to leave since the Streamlined Critical Pay
Authority — part of the IRS Restructuring and Reform Act of 1998 — expired in
2013 without a congressional vote to renew. Find out more
[FEDERALTIMES.COM]
For the CIO, CTO & CISO
CIO: FDIC Was Hacked by China, and CIO Covered It Up. Problems uncovered after
employees walk off job with thousands of SSNs on flash drives. A report published
by the House Committee on Science, Space and Technology today found that
hackers purported to be from China had compromised computers at the Federal
Deposit Insurance Corporation repeatedly between 2010 and 2013. Backdoor
malware was installed on 12 workstations and 10 servers by attackers—including
the workstations of the chairman, chief of staff, and general counsel of the FDIC.
But the incidents were never reported to the US Computer Emergency Response
Team (US-CERT) or other authorities and were only brought to light after an
Inspector General investigation into another serious data breach at the FDIC in
October of 2015. Read more
[ARSTECHNICA.COM]
CIO, CTO & CISO
CISO: Brown University Offers Ivy League CISO Creds. Freshly minted CISOs as
well as other mid-career professionals with a need for a broad grounding in
cybersecurity can get an advanced degree in the topic through a new program at
Brown University. The Executive Master in Cybersecurity, set to launch in
October, is a 16-month program to instruct students in technology, law and
policy, human behavior, and leadership-skills development. “What the industry is
crying out for is interdisciplinary training,” says Alan Usas, the program director.
Read more
[NETWORKWORLD.COM]
CIO, CTO & CISO
FEDERAL CIO: 4 Ways Government Agencies Can Improve Their Cybersecurity
Fundamentals. Responding to the OPM breaches, Federal CIO Tony Scott
initiated a month-long Cybersecurity Sprint calling on all agencies to evaluate
and address security problems. This program yielded some positive results,
including immediate improvements in authentication practices. Federal civilian
agencies increased their use of strong authentication practices for privileged and
unprivileged users by 30 percent during the sprint. Read more
[ABOUT.BGOV.COM]
For the CIO, CTO & CISO
CISO: What Is IDaaS? A CISO Clears Up Confusion Around the Definition of Cloud
IAM. Identity and access management-as-a-service, also known as IDaaS or cloud
identity and access management (IAM), has become a hot topic among CISOs over
the past few years. Alas, confusion about the cloud-based service still exists; even
the most basic question is left unanswered or answered incorrectly. With so much
uncertainty and inaccuracy existing around the definition of IDaaS, it seemed fitting
to tap into the expertise of a security thought leader and early adopter of IAM-as-a-
service. Joseph Burkard, a CISO for a global health care organization, delivers a
complete definition of IDaaS and discusses how his choice of a cloud IAM vendor
reflects this definition. Read more
[SECURITYINTELLIGENCE.COM]
Penetration Testing
Penetration Testing
RISK STRATEGY: 8 Reasons You Need A Security Penetration Test. One of the
biggest challenges in IT security is determining whether the tools and
configurations you have in place are giving your organization the level of security
you require. Here’s how penetration testing can help. Read the rest
[INFORMATIONWEEK.COM]
VULNERABILITIES: Hacking A Penetration Tester. How even a pen test conducted
by a security pro can be hacked by a determined attacker looking for a way to its
target. Find out more
[DARKREADING.COM]
Penetration Testing
CYBERWAR: The DNC Hack and Dump Is What Cyberwar Looks Like. Elections are
critical infrastructure that should be hands-off for governments. What occurred
with the recently disclosed breach of the Democratic National Committee
servers, and the dumping of stolen data on a WordPress site, is more than an act
of cyber espionage or harmless mischief. It meets the definition of an act of
cyberwar, and the US government should respond as such. Read more
[ARSTECHNICA.COM]
SECURITY FLAWS: Necessity is the Mother of the ‘Rugged DevOps’ Movement.
No matter how good your perimeter security is, experts agree: Your system has
been breached, whether you know it or not. The costs of security flaws –
cybersecurity expert Joe Franscella calls them “The Five Horsemen of the
Internet Apocalypse: Scam, Extortion, Embarrassment, Theft and Death” – are
enormous. So why don’t we consider security a first-class citizen in DevOps?
Read more
[SDTIMES.COM]
Open Source
Open Source
RED HAT: Red Hat Wants To Repeat The Magic of Linux With Containers. With
enterprise workloads slowly moving to the public cloud, and containers
becoming first class citizens of the datacenter, the battleground is quickly
shifting to the cloud and containers. Traditional infrastructure players are facing
a huge challenge. The changing dynamics of the market are forcing Red Hat to
relook at its strategy. Read the rest
[FORBES.COM]
MICROSOFT: Project Malmo AI Platform Goes Open Source. The system, now
available to all, uses Minecraft to test artificial intelligence protocols. Formerly
referred to as Project AIX, the platform has been developed in order to give
startups a cheap, effective way to test out artificial intelligence programming
without the need to build robots to test commands and comprehension with
physical subjects. Find out more
[ZDNET.COM]
Open Source
STORAGE: Why Object Storage Is Eating the World. Traditionally, web
applications use file systems and databases to store user data. This is simple to
manage, as web applications generate structured data by accepting text input in
forms, and saving the input to a database. However, times are changing; with the
advent of social media, cloud storage, and data analytics platforms, increasing
quantities of unstructured data are being pushed onto the Internet. Read more
[OPENSOURCE.COM]
Open Source
SECURITY: What IoT Can Learn From Open Source. In 2014, a study by Hewlett-
Packard found that seven out of ten IoT devices tested contained serious
security vulnerabilities, an average of twenty-five per device. In particular, the
vulnerabilities included a lack of encryption for local and Internet transfer of
data, no enforcement of secure passwords, and security for downloaded
updates. The devices test included some of the most common IoT devices
currently in use, including TVs, thermostats, fire alarms and door locks. Given
that Gartner predicts that 25 billion smart devices will be in use by 2020, no one
needs to be a prophet to foresee a major security problem that will make even
the security problems of the basic Internet seem insignificant. Read more
[DATAMATION.COM]
Incident Response
Incident Response
VIDEO: Incident Response: Trade-offs Under Pressure. John Allspaw provides a
glimpse into how other fields handle incident response, including active steps
companies can take to support engineers in those uncertain and ambiguous
scenarios. Examples include fields such as military, surgical trauma units, space
transportation, aviation and air traffic control, and wildland firefighting. Read more
[INFOQ.COM]
LISTEN: HSAC Wants DHS Cross-Sector Cybersecurity Plan. The Homeland Security
Department and Homeland Security Advisory Council are exchanging summer
homework, respectively asking for recommendations for the presidential transition
and a plan for coordinating cross-sector cybersecurity responses. Read the rest
[FEDERALNEWSRADIO.COM]
Incident Response
COLLABORATION: Technology Gives Police and Public Safety Agencies the Upper
Hand. Cities put common IT infrastructure to work in the ongoing effort to prevent
and reduce criminal activity. When a suspicious person or activity happens at
Newburgh, N.Y.’s City Hall, police are notified directly. City employees can push a
button to silently page the nearby police department in an emergency, one of many
new features available since the city upgraded its communications infrastructure,
adding new IP phones, paging and emergency notification software on top of a new
Cisco Systems phone system. Read more
[STATETECHMAGAZINE.COM]
Incident Response
HAVE A PLAN: The Importance of a Cyber Incident Response Plan and the Steps
Needed to Avoid Disaster. With two-thirds of the UK’s big businesses being hit with
a cyber-attack in the past year, it’s absolutely crucial for businesses to know how to
respond and deal with the aftermath. A study conducted last year revealed that
more than half of organizations lack the capability to gather data from across their
environment, or coordinate centralized alerts to the business about suspicious
activity. Read the rest
[INFO-SECURITY.COM]
Program Management
Program Management
MICROSOFT: Microsoft Launches Planner, a Project-Management Tool Part of
Office 365. Microsoft has launched Office 365 Planner, a new project-
management tool for teams. The company will be rolling out Planner worldwide
to Office 365 users, including Office 365 Enterprise E1–E5, Business Essentials,
Premium, and Education subscription plans. The Planner tile will appear in your
Office 365 app launcher, meaning Office 365 admins don’t need to take any
action. Read more
[VENTUREBEAT.COM]
Program Management
NASA: When Project Management Really is Rocket Science: A Lesson from NASA.
A recent GAO assessment of major NASA projects shows that 18 of the
organization’s biggest projects received very positive reviews – with project
management receiving credit for some of that success. What has proven to be
extremely effective for NASA is utilizing standards and adapting tools and
processes to the needs of the agency, while satisfying considerations of such
leading practices as EVM, project costing, baseline establishment and blending
of engineering disciplines into projects. Read the rest
[FEDERALTIMES.COM]
Program Management
ADVICE: 6 Ways to Be a Better Project Manager. Project management is a
complex — and critical — function. Here are six pieces of advice to help project
managers improve their craft. Find out more
[CIO.COM]
IT CAREERS: What’s Going On with IT Hiring? Analysts have been generally
cautious this year about IT hiring trends. Although the unemployment rate for IT
professionals is about half the national average of 4.7%, said CompTIA, some
analysts use terms ranging from “modest” to “pre-recession” to describe IT
hiring. Read more
[COMPUTERWORLD.COM]
Search Technology
Search Technology
SOLR: Solr 6.0 and Graph Traversal Support. One of the new features that are
present in the recently released Solr 6.0 is the graph traversal query that allows you
to work with graphs. Having a root set and relations between documents (like
parent identifier of the document) you can use a single query to get multiple levels
of joins in the same request. Here's how this new feature works both in old
fashioned Solr master/slave as well as in SolrCloud. Read more
[DZONE.COM]
OPEN SOURCE: Has Open Source Become the Default Business Model for Enterprise
Software? SpliceMachine's decision to open-source its product has become the
latest reminder that -- in emerging technology markets -- open source is
increasingly the rule, not the exception. Read the rest
[ZDNET.COM]
Search Technology
GOOGLE: Releases Search Tools to Simplify the Voter Registration Process. Google is
continuing its efforts to encourage people to vote in this November’s presidential
election in the United States. With Google’s most recent update, it will provide
information directly in the search results about how you can register to vote in your
state. The update can be triggered by typing “register to vote” in the search bar.
Google will then return detailed state-by-state information about how to vote,
including the general requirements and voter registration guidelines. Read more
[SEARCHENGINEJOURNAL.COM]
Search Technology
CONNECTOR FRAMEWORKS: How Do I Connect Thee? Let Me Point the Ways.
Finally, for content repositories and other sources of searchable data, there are also
connector frameworks, such as Apache ManifoldCF, that facilitate the connection
between the repositories and various destinations (primarily search servers).
Support for a wide variety of repositories, such as Documentum, Alfresco,
Sharepoint, etc. is already available. Other custom connectors may also be similarly
developed. On the other side, search servers such as ElasticSearch and Apache Solr
are supported, amongst others. Read the rest
[INFOWORLD.COM]
Agile Application Development
Agile Application Development
AGILE DevOps: A Path to the Common Ground of Productivity. Best of breed
analytics solutions must bridge the gap between data science and production to
unify development and deployment into an agile methodology. With that in mind,
Florian Douetteau, CEO of Dataiku, has put together an interesting guidebook that
discusses how to achieve that level of synergy to build a data project that embodies
the ideologies of agility. Read more
[GIGAOM.COM]
PROJECT REQUIREMENTS: Blueprint’s Storyteller Auto-Generates User Stories for
Agile Teams. Blueprint is trying to solve one of the biggest problems it sees in the
agile industry: user stories. According to the company, too often teams
misunderstand project requirements, which result in costly delays and revisions. To
solve this, Blueprint is launching Storyteller, a new solution designed to auto-
generate high-quality user stories and acceptance criteria. Read the rest
[SDTIMES.COM]
Agile Application Development
CONTRACTING: Agile Software Development Brings New Contracting Issues.
Creating software using an agile software development (“ASD”) methodology is not
a new concept, but it is rapidly gaining popularity among software developers
based on the notion that ASD yields workable code sooner and in a more efficient
manner. However, traditional “waterfall” software development approaches do not
easily lend themselves to contracting under an ASD approach. Read more
[LAW360.COM]
EPA: How Agile Development Aids FITARA Compliance. As chief information officer
of the Environmental Protection Agency, Ann Dunkin is charged with modernizing
the IT infrastructure of the 15,000-person strong office. In a recent interview,
Dunkin spoke about the progress that EPA is making in reforming its IT acquisition
process and the challenge of shifting from legacy systems to agile development.
Read the rest
[FEDERALTIMES.COM]
BYOD
BYOD
EXEC TECH: BYOD is Evolving for a Cyber-Conscious Age. Kimberly Hancher, former
CIO at the Equal Employment Opportunity Commission, helped craft the White
House BYOD policy in 2012. That document outlines a broad set of guidelines that
agencies can use to establish the proper parameters for mobile access. Yet four years
later, she said, there aren’t enough clear policies at federal agencies. “I don’t think
most agencies are really undertaking the effort and due diligence to address BYOD
policy,” she said. “They’re just sort of letting people do whatever they can get away
with, and very few agencies have actually put formal policies in place.” Read the rest
[FCW.COM]
BYOD
USERS: Don’t Mess with iOS 10 or Android Nougat Betas. There’s a lot of interest in
the beta releases of iOS 10 and Android Nougat, and while most people are free to
explore the new platforms, BYOD users should hold off from testing them. Find out
more
[ZDNET.COM]
ENTERPRISE: The BYOD Evolution: Three Common Approaches. It has become a way
of life for employees to bring personal devices to work, whether or not your
organisation has a BYOD policy. Employees want the ability to use their own phones,
tablets and laptops at work, without losing ownership or control of those devices.
But this should raise some red flags for a company’s IT and security teams. The
modern issues with BYOD have gone beyond just basic user-privacy issues, to the
serious security and compliance matters that need to be addressed to ensure IT
ecosystems are not vulnerable. Read more
[APPSTECHNEWS.COM]
BYOD
INDUSTRY INSIGHT: Balancing Mobility with Security: What Government Can Do. The
consumerization of IT is not only changing the way employees work, it’s changing
their expectations of government IT. Employees look to their agencies to provide
modern IT services, interfaces and capabilities — most of which have historically
been the responsibility of IT departments. The trouble is that accommodating the
mobility demands of today’s users presents a fundamental security challenge to IT
teams used to retaining control of every system, app and network under their
purview. How do IT teams balance the demands of flexible and secure mobility,
accommodate users’ preferences and modernize their IT environments? Here are a
few considerations. Read the rest
[GCN.COM]
Big Data
Big Data
INFORMATION MANAGEMENT: How to Make Big Data Work for SMEs. Big data for
SMEs is all about joining up various sources of data and using it to improve
productivity and profitability. With accessibility via the cloud, big data enables
smaller business to take advantage of the tools that were previously only available
to larger corporates. Big data is basically a repository of information drawn from
different silos and joined up to make it work more effectively for the business.
Here are five key steps on how SMEs can maximise their existing data to make it
big. Read the rest
[INFORMATION-AGE.COM]
STUDY: One-Third of Big Data Developers Use Machine Learning. A recent Evans
Data report shows that 36 percent of developers working with big data and
analytics are also using machine learning. Find out more
[EWEEK.COM]
Big Data
HEALTHCARE: Managing Big Data in Healthcare. Life sciences companies have too
much information – manually collected, logged and stored to adhere to the highest
quality standards. Digital analytics can funnel just the right information for risk
management. Read more
[AUTOMATIONWORLD.COM]
ROUNDUP: Watson, WebEx Mashup, Hadoop Summit. IBM Watson gets close with
Cisco WebEx to improve collaboration. Hortonworks rolls out updates and initiatives
at Hadoop Summit. MapR offers an update to please admins. MongoDB Atlas goes
live with a managed cloud-based MongoDB service. Read more
[INFORMATIONWEEK.COM]
Mobile Applications
Mobile Applications
SURVEY: Companies Want Mobile Apps Without Spending Much on Development.
The enterprises engaged in the communications space are increasingly recognizing
the perks having a sophisticated mobile app platform, with 42 percent of
companies expanding their spending on mobile app development, by an average of
31 per cent in 2016. However, the companies are averse to spending much on it, as
a recent survey by Gartner revealed that the average proportion of the overall
application development budget allocated to mobile is only 10 per cent, which is
actually a 2 percent decline from last year. Read the rest
[CIOL.COM]
Mobile Applications
IBM: Revamps MobileFirst Development Platform for the Cloud. IBM further
strengthened the ties between its enterprise mobile app development platform and
the cloud with MobileFirst Foundation 8.0, an enterprise middleware that provides
cloud-based Mobile Back-end-as-a-Service (MBaaS) for enterprise mobile apps,
along with many other associated products and services to round out the
development/deployment lifecycle. Find out more
[ADTMAG.COM]
Mobile Applications
AMAZON: AWS Mobile App Development Tools Target Device Lifecycle. AWS is a
major player in mobile app development with a variety of end-to-end tools. But it’s
not the only option, as Google and other MBaaS providers seek their market share.
Read more
[SEARCHAWS.TECHTARGET.COM]
FILEMAKER 15: How to Make Mobile Apps with FileMaker 15. The business world is
full of inventories, catalogs and other lists that sit in spreadsheets or databases that
would be more useful if you could take them out of the office. With FileMaker Go
and FileMaker WebDirect, you can. Read the rest
[CIO.COM]
Personnel Management
Personnel Management
WORKFORCE: Millennials Want to Stay, If Government Grasps the New Reality. Many
“millennials” in government say their agencies haven’t yet understood what makes
them tick. And their generation isn’t drastically different than the ones that have
come before it. Though a majority of federal employees under the age of 35
indicated their interest in staying within the federal government, many millennials
said their decision depends on several different factors. Read the rest
[FEDERALNEWSRADIO.COM]
OPM: Office of Personnel Management Hires First CISO. Following one of the largest
data breaches on record, the Office of Personnel Management hires a chief
information security officer. The new CISO is Cord Chase, former senior adviser on
Cyber and National Security to the White House and Office of Management and
Budget, and technology head and engineer at the U.S. Department of Agriculture.
Find out more [GOVTECH.COM]
Personnel Management
DOD: The 4 Big Takeaways from Ash Carter’s New Push for Military Personnel
Reform. The plan to overhaul the military personnel system that Defense Secretary
Ash Carter announced Thursday would end the “one-size-fits-all” promotion system
for military officers and clear the way for far more diverse options in military career
tracks. Read more
[MILITARYTIMES.COM]
FEDERAL CIVIL SERVICE: Report Says Top Civil-Service Rank Needs Urgent Boost. The
Senior Executive Service, the highest rank of the nation’s federal civil service, carries
a certain prestige. But that is not enough to convince many lower-ranking employees
that the status is worth the headache. Read more
[WASHINGTONPOST.COM]
Programming & Scripting Development
Client & Server-Side
Programming & Scripting Development
Client & Server-Side
JAVA: How Oracle’s Business As Usual Is Threatening to Kill Java. Oracle’s silence
about Java EE has brought developer community distrust to a fever pitch. Read the
rest
[ARSTECHNICA.COM]
JAVASCRIPT: Blocking JavaScript Can Stop Some Windows Malware. Email
attachments are probably the most common mechanism for infecting a Windows
computer. As potential victims get wise to the tried and true infection schemes,
bad guys have a relatively new wrinkle — the attached malicious file is JavaScript.
JavaScript, or more correctly in this case, JScript files, are plain text files that end in
“.js.” Find out more
[COMPUTERWORLD.COM]
Programming & Scripting Development
Client & Server-Side
jQUERY: Long-awaited jQuery 3.0 Brings Slim Build. The jQuery team has unveiled
the long-awaited 3.0 release, bringing a new slimmed-down option as well as
major new features, improvements, and bug fixes. Read more
[INFOQ.COM]
RUBY-ON-RAILS: Ruby on Rails-style Development Comes to Apple’s Swift. The
Swifton framework shares the model-view-controller development pattern with
Rails. Read more
[INFOWORLD.COM]
Cloud Computing
Cloud Computing
IaaS: Infrastructure as a Service Cloud Computing Revenue to Surge by 2020.
Infrastructure as a service (IaaS) cloud revenue is expected to triple to $43.6 billion
by 2020, up from $12.6 billion in 2015, according to research firm IDC. The
projection, which equates to a compound annual growth rate of 28.2 percent over
five years, is based on the number of enterprises ditching on-premises hardware for
the public cloud. Read the rest
[ZDNET.COM]
MICROSOFT: Azure Cloud Wins a High-Profile New Customer – GE. General Electric is
making its Predix industrial software platform available on Microsoft’s cloud. The
move isn’t entirely new for GE — its Predix platform was already available on
Amazon and Oracle’s clouds. But it’s an important step for Microsoft, which wants to
establish itself as the favored partner for big business. Find out more
[CNBC.COM]
Cloud Computing
SERVERLESS COMPUTING: What Serverless Computing Really Means. For
developers, worrying about infrastructure is a chore they can do without. Serverless
computing merely adds another layer of abstraction atop cloud infrastructure, so
developers no longer need to worry about servers, including virtual ones in the
cloud. Read more
[INFOWORLD.COM]
IBM: Tests Secure Cloud Blockchain Service. IBM is beta-testing a new high-security
service plan for IBM Blockchain, with dedicated infrastructure for each customer.
Until now, it has offered only a starter cloud service for developers who want to
experiment with blockchain technology. That service runs in a multitenant cloud,
with infrastructure shared among hundreds of blockchains. The new service plan is
still cloud-based, but “you get your own resources dedicated to you,” said IBM Vice
President for Blockchain Technologies Jerry Cuomo. Read more
[COMPUTERWORLD.COM]
Business Intelligence
Business Intelligence
TOOLS: 12 Ways to Empower Government Users With the Microsoft Business
Intelligence (MBI) Stack. One way to mitigate the risks of budgetary constraints is
to discontinue the habit of relying on IT resources for small tasks that users can
either do themselves or with limited assistance. Your agency’s use of Microsoft
Business Intelligence (MBI) tools and reporting services may hold the key to
advancing your organization’s return on investment as well as gain much needed
autonomy for your users. Read the rest
[BLUEMT.COM]
DATABASES: SQL Server 2016 Stretch Database: What Can It Do? When Microsoft
released SQL Server 2016, the release was accompanied by a slew of advanced
features heavily tailored to make data more malleable and useful for business. In
that light, one of the most exciting features of SQL Server 2016 is the Stretch
Database feature. Find out more
[ENTERPRISEAPPSTODAY.COM]
Business Intelligence
AMAZON: How Amazon Echo Could Serve as Your New Business Analyst. Picture
this. You’re meeting with your board of directors. Someone requests more details
about a sales forecast. Instead of booting up a laptop computer to dig up those
numbers, you address the question verbally to an Amazon Echo device sitting
alongside the other conference room gadgetry. Moments later, it responds with the
appropriate data, allowing the meeting to continue uninterrupted. That scenario is
being tested among a handful of companies that use data analytics software from
Sisense, a New York-based company. Read more
[FORTUNE.COM]
Business Intelligence
SOFTWARE: The Two Main Pitfalls of Business Intelligence As We Know It. Business
Intelligence, or as it’s more commonly known as in today’s lexicon “BI,” is one of the
first things that pops into professionals’ minds when anything data-related in the
workplace is brought up. Whether you’re on the information technology side of the
business or a P&L owner, the answer to any information problem is to typically
throw a BI solution at it. Here’s a look at two primary reasons why business
intelligence is soon-to-be extinct in the emerging technology landscape. Read more
[CIO.COM]
IT Security | Cybersecurity
IT Security | Cybersecurity
NIST: Plans Cybersecurity Framework Update. Winter 2017 Revision Would Refine,
Clarify Provisions. The National Institute of Standards and Technology plans to
update its 2-year-old cybersecurity framework late next year, says Matt Barrett,
program manager. Read the rest
[GOVINFOSECURITY.COM]
PHYSICS: In Cybersecurity, It’s Physics to the Rescue. As computing technology
evolves, how will cybersecurity need to change to keep up? Find out more
[FEDSCOOP.COM]
IT Security | Cybersecurity
FEDERAL AGENCIES: For Federal Agencies, a Deluge of Data Requires Security –
Everywhere. Data security is a paramount concern for federal agencies no matter
how and where their information is stored. Read more
[FEDTECHMAGAZINE.COM]
RANSOMWARE: New York Takes Bold Steps to Tackle Ransomware. As ransomware
threats increasingly target state and local IT systems, Sen. Chuck Schumer calls for a
unified and coordinated defense. Read more
[STATETECHMAGAZINE.COM]
IT Security | Cybersecurity
FDIC: Why the FDIC Is Updating Its Cyber Security Policy After This Data Breach. The
U.S. Federal Deposit Insurance Corporation is updating cyber security policies after a
2015 data breach in which a former employee kept copies of sensitive information
on how banks would handle bankruptcy. FDIC Chairman Martin Gruenberg said he
made personnel changes after receiving a report in 2013 informing him that he had
not been fully briefed about the major compromise of the regulator’s computers by
a foreign government in 2010 and 2011. Read more
[FORTUNE.COM]
IT Security | Cybersecurity
BLIND SPOTS: Cybersecurity Blind Spots: Mitigating Risks and Vulnerabilities.
Technical blind spots certainly present major information security challenges to
CISOs and their teams, as the complexities of monitoring encrypted traffic and
updating SAP software and other legacy applications can be daunting tasks. But
there are other cybersecurity blind spots that involve more amorphous and less
technical concepts such as enterprise risks. Here’s how security experts overcome
these challenges. Read the rest
[SEARCHSECURITY.TECHTARGET.COM]
CAREERS: Feds to Hire 3,500 Cybersecurity Pros by Year’s End. Last October, the U.S.
government began hiring 6,500 new cybersecurity IT professionals. It has hired
3,000 so far, and plans to hire another 3,500 by January 2017, the White House has
reported. Read more
[COMPUTERWORLD.COM]
IT Security | Cybersecurity
THREAT PREVENTION: Context-Rich And Context-Aware Cybersecurity. An adaptive
threat-prevention model is quickly replacing traditional, unintegrated architectures
as security teams work to achieve a sustainable advantage against complex threats.
Read the rest
[DARKREADING.COM]
From the Blue Mountain Data Systems Blog
Three-Dimensional Governance for the CIO
https://www.bluemt.com/three-dimensional-governance-for-the-cio
7 Reasons to Take Control of IT Incidents
https://www.bluemt.com/7-reasons-to-take-control-of-it-incidents/
Breach Mitigation Response Time Too Long, Survey Says
https://www.bluemt.com/breach-mitigation-response-time-too-long-survey-
says/
Six Tactics for Cyberdefense
https://www.bluemt.com/six-tactics-for-cyberdefense/
From the Blue Mountain Data Systems Blog
Feds Report Mixed Responses to Shared Services
https://www.bluemt.com/feds-report-mixed-responses-to-shared-services
Federal Employees Are Not Security Experts
https://www.bluemt.com/federal-employees-are-not-security-experts
Survival Guide for Network Administrators
https://www.bluemt.com/survival-guide-for-network-administrators
DBaaS: OpenStack Trove Changes DB Management
https://www.bluemt.com/dbaas-openstack-trove-changes-db-management
From the Blue Mountain Data Systems Blog
Help Wanted: Certified Cybersecurity Professionals
https://www.bluemt.com/help-wanted-certified-cybersecurity-professionals
Cyber Threat Intelligence Integration Center Preview
https://www.bluemt.com/cyber-threat-intelligence-integration-center-preview/
Cloud Moves in 1-2-3
https://www.bluemt.com/cloud-moves-in-1-2-3/
Change Management for Disaster Recovery
https://www.bluemt.com/change-management-for-disaster-recovery/
From the Blue Mountain Data Systems Blog
Jeffersonian Advice For C-Suite Career Advancement
https://www.bluemt.com/jeffersonian-advice-for-c-suite-career-advancement/
Ways To Survive The “Mobile-Pocalypse”
https://www.bluemt.com/ways-to-survive-the-mobile-pocalypse/
Microsoft Cloud Services Receive FedRAMP Authority to Operate
https://www.bluemt.com/microsoft-cloud-services-receive-fedramp-authority-
to-operate/
Hiring Pentesters? Here Are 10 Things You Need to Know
https://www.bluemt.com/hiring-pentesters-here-are-10-things-you-need-to-
know/
From the Blue Mountain Data Systems Blog
Home Router Malware Alert
https://www.bluemt.com/home-router-malware-alert/
Threat Model Deconstruction
https://www.bluemt.com/threat-model-deconstruction/
Business Email Scam Nets $214 Million
https://www.bluemt.com/business-email-scam-nets-214-million/
How to Prevent Unauthorized Software from Taking Over Your Organization
https://www.bluemt.com/the-cios-guide-to-happy-end-users-2/
From the Blue Mountain Data Systems Blog
Digital Marketing Predictions for 2015
https://www.bluemt.com/digital-marketing-predictions-for-2015/
SDN: Network Administrator’s Friend or Foe?
https://www.bluemt.com/sdn-network-administrators-friend-or-foe/
Mobile Payments: A Must for Federal Agencies
https://www.bluemt.com/mobile-payments-a-must-for-federal-agencies/
Soft Skills Are A Must-Have For Careers In IT
https://www.bluemt.com/soft-skills-are-a-must-have-for-careers-in-it/
From the Blue Mountain Data Systems Blog
Security Risks Most Prevalent in Younger Workers
https://www.bluemt.com/security-risks-most-prevalent-in-younger-workers/
The Security World’s Maturation
https://www.bluemt.com/the-security-worlds-maturation/
Data Breach Concerns Keep CISOs Up At Night
https://www.bluemt.com/data-breach-concerns-keep-cisos-up-at-night/
Personalized Govt Equals Instant Gratification for Citizens
https://www.bluemt.com/personalized-govt-equals-instant-gratification-for-
citizens/
From the Blue Mountain Data Systems Blog
People-Centric Security
https://www.bluemt.com/people-centric-security/
Pentagon Tries BYOD To Strike Work/Life Balance
https://www.bluemt.com/pentagon-tries-byod-to-strike-worklife-balance/
Open Source Model Considered for MS Windows
https://www.bluemt.com/open-source-model-considered-for-ms-windows/
Open Internet: To Be or Not to Be?
https://www.bluemt.com/open-internet-to-be-or-not-to-be/
From the Blue Mountain Data Systems Blog
Malware Stays A Step Ahead Infecting One Third of Websites
https://www.bluemt.com/malware-stays-a-step-ahead-infecting-one-third-of-
websites/
Machine-Generated Data: Potential Goldmine for the CIO
https://www.bluemt.com/machine-generated-data-potential-goldmine-for-the-
cio/
Government Legacy Programs: Reuse vs. Replacement
https://www.bluemt.com/government-legacy-programs-reuse-vs-replacement/
It Takes a Whole Village to Protect Networks and Systems
https://www.bluemt.com/it-takes-a-whole-village-to-protect-networks-and-
systems/
From the Blue Mountain Data Systems Blog
Governance For the CIO
https://www.bluemt.com/governance-for-the-cio/
Help Desk Consolidation – Lessons Learned
https://www.bluemt.com/help-desk-consolidation-lessons-learned/
One Year Later, Companies Still Vulnerable to Heartbleed
https://www.bluemt.com/one-year-later-companies-still-vulnerable-to-
heartbleed/
Federal Projects Cultivate Worker Passion
https://www.bluemt.com/federal-projects-cultivate-worker-passion-2/
ABOUT US
Blue Mountain Data Systems Inc.
Blue Mountain Data Systems Inc. is dedicated to application
and systems development, electronic document management,
IT security support, and the automation of workflow processes.
Read more about our experience here:
>> http://bluemt.com/experience
Recent Experience
U.S. Dept. of Labor
Employee Benefits Security Administration
1994 to Present
Responsible to the Office of Technology and Information Systems for information
systems architecture, planning, applications development, networking,
administration and IT security, supporting the enforcement of Title I of the
Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue
Mountain is responsible for design, development and support for its various
enforcement database management systems, as well as all case tracking and
customer service inquiry systems. Blue Mountain also provides IT security services
to the EBSA, in the form of FISMA Assessment and Authorization, System Security
Plans, Risk and vulnerability assessments, monitoring and investigation support.
MANAGEMENT
Paul T. Vesely
Founder, President, CEO and Principal Architect
Mr. Vesely is a recognized thought leader in systems
architecture and delivery, having designed and
delivered many enterprise wide information and
document management solutions. Mr. Vesely’s history
includes 33 years experience in the information
systems industry, with Unisys, Grumman, PRC and a
host of clients in both government and private sectors.
CONTACT US
Contact Us Today to Discuss Your Next IT Project
HEADQUARTERS
366 Victory Drive
Herndon, VA 20170
PHONE 703-502-3416
FAX 703-745-9110
EMAIL
paul@bluemt.com
WEB
https://www.bluemt.com

Contenu connexe

Dernier

UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdfAndrey Devyatkin
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingShane Coughlan
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 

Dernier (20)

UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Tech Update Summary from Blue Mountain Data Systems July 2016

  • 1. Tech Update Summary July 2016 Blue Mountain Data Systems
  • 2.
  • 3. For CTOs, CIOs & CISOs Visit Blue Mountain Data Systems https://www.bluemt.com
  • 4. For CTOs, CIOs & CISOs Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue Mountain Data Systems Blog. We hope you will visit our blog for the latest information. You can also receive these updates via email. Click here to subscribe. Here’s the summary of the Daily Tech Updates for July 2016. Hope the information and ideas prove useful. Best, Paul Vesely President and Principal Architect Blue Mountain Data Systems Inc.
  • 6. Network Security MICROSOFT: Microsoft Issues Windows 10 Preview Build, Patches Critical Flaws. With less than a month to go until the release of the Windows 10 Anniversary Update, Microsoft put out a new build that fixes a number of bugs in Windows, Office, Edge and other applications. In addition, Microsoft’s Patch Tuesday release featured 11 updates for vulnerabilities, including six rated as “critical.” Read the rest [TOPTECHNEWS.COM] CISCO: Unveils Three DNA Network Security Technologies. Cisco has announced three new technologies for its Digital Network Architecture (DNA) solution to enable network engineers, application developers, channel partners, and IT customers to embed improved and simplified security within their network infrastructure layer: Umbrella Branch, Stealthwatch Learning Network License, and Meraki MX Security Appliances with Advanced Malware Protection (AMP) and Threat Grid. Find out more [ZDNET.COM]
  • 7. Network Security SWIFT: Seeks Stronger Network Security. Swift is turning to outside help as it looks to improve security on its network following a number of hacking incidents. It has engaged cyber security firms BAE Systems and Fox-IT, and created a Forensics and Customer Security Intelligence team, as it wants to investigate security incidents “within customer environments”. Read more [BANKINGTECH.COM] MICRO-SEGMENTATION: Tempered Networks Simplifies Network Security. Tempered Networks’ Marc Kaplan explains how micro-segmentation simplifies the network, makes firewalls easier to manage and improves network security. Read the rest [NETWORKWORLD.COM]
  • 9. Encyption FEDERAL GOVERNMENT: John McCain Threatens to Subpoena Apple CEO Tim Cook to Talk Encryption with Feds. “We now find ourselves at what is a complete impasse [in the encryption debate], and it is time I urge for congress to step in and break that impasse,” said one former assistant attorney general. Read the rest [FEDSCOOP.COM] GOOGLE: Testing a Chrome Browser that Adds Post-Quantum Encryption. In a truly forward-thinking move, Google is getting serious about the effort to future-proof internet security: users of the tech giant’s test-phase browser, Chrome Canary, can start testing a so-called post-quantum cryptographic technology aimed at making users immune from next-next-generation cryptographic attacks. Find out more [EXTREMETECH.COM]
  • 10. Encyption EMAIL: Simple Security – How Gmail, Mailvelope, and Virtru Make Encrypted Email Easier. Encrypting your email is a great step towards more secure communication. Gmail, Mailvelope, and Virtru can help streamline your encrypted email efforts. Read more [TECHREPUBLIC.COM] OPINION: An Encryption Commission Is A Waste Of Time. Members of Congress are looking to create an encryption commission that would “get the answers we need” on the issue of encryption and digital security. Will this really help? Read the rest [GIZMODO.COM]
  • 12. Databases MICROSOFT: SQL Server Data Tools (SSDT) Now Supports Developing Databases Using Always Encrypted. Microsoft recently announced that SQL Server Data Tools (SSDT) now supports developing databases using Always Encrypted. Always Encrypted is a feature designed to protect sensitive data, such as credit card numbers or national identification numbers (e.g. U.S. social security numbers), stored in Azure SQL Database or SQL Server databases. Always Encrypted allows clients to encrypt sensitive data inside client applications and never reveal the encryption keys to the Database Engine (SQL Database or SQL Server). Read the rest [MSPOWERUSER.COM]
  • 13. Databases SPECIALIZED: Terabyte Terror: It Takes Special Databases to Lasso the Internet of Things. Non-relational databases can help take the pain out of corralling swarms of sensor data. IoT sensors produce a massive amount of data. This volume and variety of formats can often defy being corralled by standard relational databases. As such, a slew of nontraditional, NoSQL databases have popped up to help companies tackle that mountain of information. Find out more [ARSTECHNICA.COM] MySQL: Building a Web UI for MySQL Databases in Plain Java. Learn how to connect MySQL databases from Java web applications, from creating classes, implementing the UI, and running the application. Read more [DZONE.COM]
  • 14. Databases NIST: NIST Database Goes Ballistic. The ability to match a bullet with the gun that fired it has been a forensic staple for law enforcement for almost 150 years, but the National Institute of Standards and Technology is hoping to juice the old capability with 21st century big data. Read more [FCW.COM]
  • 15. More About Blue Mountain BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.
  • 17. Security Patches MICROSOFT: July 2016 Patch Tuesday: Microsoft Releases 11 Security Updates, 6 Rated Critical. For July, Microsoft released 11 security bulletins, six of which were rated critical due to remote code execution (RCE) vulnerabilities. Read the rest [NETWORKWORLD.COM] ANDROID: Android Security Bulletin Features Two Patch Levels. The frail world of the Android ecosystem has taken some hits in the past week with the disclosure of a full disk encryption bypass vulnerability and the arrival of the HummingBad malware. Find out more [THREATPOST.COM]
  • 18. Security Patches ADOBE: Adobe Deploys Security Update to Fix 52 Vulnerabilities in Flash. Some of the critical flaws could lead to remote code execution on your PC. The update includes Flash security fixes across the Microsoft Windows, Apple Mac, Linux, and ChromeOS operating systems, as well as the Google Chrome, Microsoft Edge, and Internet Explorer 11 browsers. Read more [ZDNET.COM] INTEL: Intel Patches Local EoP Vulnerability Impacting Windows 7. Intel issued an important security patch Monday for a vulnerability that could allow hackers to execute arbitrary code on targeted systems running Windows 7. The bug, located in Intel’s HD graphics Windows kernel driver, leaves affected systems open to a local privilege escalation attacks that could give criminals the ability take control of targeted systems. Read more [THREATPOST.COM]
  • 19. CIO, CTO & CISO
  • 20. For the CIO, CTO & CISO CTO: Census Seeks CTO. The Census Bureau is looking for a new chief technology officer. In the midst of the bureau’s 2020 technology push — an ambitious overhaul that watchdogs are monitoring closely — the agency posted its official CTO job listing on July 11. The posting comes three weeks after Avi Bender, who had served as Census CTO since 2010, moved to the National Technical Information Service. The next CTO will serve under another newly arrived leader — CIO Kevin Smith, who joined the bureau in June. Read the rest [FCW.COM] THREE THINGS: Every CISO Should Know. To reduce their organisation’s attack surface – and improve their team’s ability to detect, react, respond and recover – CISOs should keep three things in mind. Read the rest [INFORMATION-AGE.COM]
  • 21. CIO, CTO & CISO CIO: Execs From Outside IT Win Key CIO Jobs. Pressure to fulfill business goals forces companies to look for different breed of IT leaders. Eli Lilly & Co. this week reverses a long history of naming chief information officers with deep enterprise technology experience as Aarti Shah, a 22-year veteran at the drug company, takes the helm. But her appointment barely ranks as an outlier as Lilly and other companies look outside the traditional technology ranks for executive talent that boards and chief executives can hold accountable for business objectives. Read the rest [BLOGS.WSJ.COM]
  • 22. CIO, CTO & CISO CTO: IRS’s Top Techie Leaves Citing Lapsed Critical Pay Authority. The IRS is losing its chief technology officer, Terry Milholland, due to a lapse in a 1998 statute that allowed for a higher pay band for select positions at the tax agency, according to Commissioner John Koskinen. In a June 29 email to staff, Koskinen said Milholland is the latest IT executive to leave since the Streamlined Critical Pay Authority — part of the IRS Restructuring and Reform Act of 1998 — expired in 2013 without a congressional vote to renew. Find out more [FEDERALTIMES.COM]
  • 23. For the CIO, CTO & CISO CIO: FDIC Was Hacked by China, and CIO Covered It Up. Problems uncovered after employees walk off job with thousands of SSNs on flash drives. A report published by the House Committee on Science, Space and Technology today found that hackers purported to be from China had compromised computers at the Federal Deposit Insurance Corporation repeatedly between 2010 and 2013. Backdoor malware was installed on 12 workstations and 10 servers by attackers—including the workstations of the chairman, chief of staff, and general counsel of the FDIC. But the incidents were never reported to the US Computer Emergency Response Team (US-CERT) or other authorities and were only brought to light after an Inspector General investigation into another serious data breach at the FDIC in October of 2015. Read more [ARSTECHNICA.COM]
  • 24. CIO, CTO & CISO CISO: Brown University Offers Ivy League CISO Creds. Freshly minted CISOs as well as other mid-career professionals with a need for a broad grounding in cybersecurity can get an advanced degree in the topic through a new program at Brown University. The Executive Master in Cybersecurity, set to launch in October, is a 16-month program to instruct students in technology, law and policy, human behavior, and leadership-skills development. “What the industry is crying out for is interdisciplinary training,” says Alan Usas, the program director. Read more [NETWORKWORLD.COM]
  • 25. CIO, CTO & CISO FEDERAL CIO: 4 Ways Government Agencies Can Improve Their Cybersecurity Fundamentals. Responding to the OPM breaches, Federal CIO Tony Scott initiated a month-long Cybersecurity Sprint calling on all agencies to evaluate and address security problems. This program yielded some positive results, including immediate improvements in authentication practices. Federal civilian agencies increased their use of strong authentication practices for privileged and unprivileged users by 30 percent during the sprint. Read more [ABOUT.BGOV.COM]
  • 26. For the CIO, CTO & CISO CISO: What Is IDaaS? A CISO Clears Up Confusion Around the Definition of Cloud IAM. Identity and access management-as-a-service, also known as IDaaS or cloud identity and access management (IAM), has become a hot topic among CISOs over the past few years. Alas, confusion about the cloud-based service still exists; even the most basic question is left unanswered or answered incorrectly. With so much uncertainty and inaccuracy existing around the definition of IDaaS, it seemed fitting to tap into the expertise of a security thought leader and early adopter of IAM-as-a- service. Joseph Burkard, a CISO for a global health care organization, delivers a complete definition of IDaaS and discusses how his choice of a cloud IAM vendor reflects this definition. Read more [SECURITYINTELLIGENCE.COM]
  • 28. Penetration Testing RISK STRATEGY: 8 Reasons You Need A Security Penetration Test. One of the biggest challenges in IT security is determining whether the tools and configurations you have in place are giving your organization the level of security you require. Here’s how penetration testing can help. Read the rest [INFORMATIONWEEK.COM] VULNERABILITIES: Hacking A Penetration Tester. How even a pen test conducted by a security pro can be hacked by a determined attacker looking for a way to its target. Find out more [DARKREADING.COM]
  • 29. Penetration Testing CYBERWAR: The DNC Hack and Dump Is What Cyberwar Looks Like. Elections are critical infrastructure that should be hands-off for governments. What occurred with the recently disclosed breach of the Democratic National Committee servers, and the dumping of stolen data on a WordPress site, is more than an act of cyber espionage or harmless mischief. It meets the definition of an act of cyberwar, and the US government should respond as such. Read more [ARSTECHNICA.COM] SECURITY FLAWS: Necessity is the Mother of the ‘Rugged DevOps’ Movement. No matter how good your perimeter security is, experts agree: Your system has been breached, whether you know it or not. The costs of security flaws – cybersecurity expert Joe Franscella calls them “The Five Horsemen of the Internet Apocalypse: Scam, Extortion, Embarrassment, Theft and Death” – are enormous. So why don’t we consider security a first-class citizen in DevOps? Read more [SDTIMES.COM]
  • 31. Open Source RED HAT: Red Hat Wants To Repeat The Magic of Linux With Containers. With enterprise workloads slowly moving to the public cloud, and containers becoming first class citizens of the datacenter, the battleground is quickly shifting to the cloud and containers. Traditional infrastructure players are facing a huge challenge. The changing dynamics of the market are forcing Red Hat to relook at its strategy. Read the rest [FORBES.COM] MICROSOFT: Project Malmo AI Platform Goes Open Source. The system, now available to all, uses Minecraft to test artificial intelligence protocols. Formerly referred to as Project AIX, the platform has been developed in order to give startups a cheap, effective way to test out artificial intelligence programming without the need to build robots to test commands and comprehension with physical subjects. Find out more [ZDNET.COM]
  • 32. Open Source STORAGE: Why Object Storage Is Eating the World. Traditionally, web applications use file systems and databases to store user data. This is simple to manage, as web applications generate structured data by accepting text input in forms, and saving the input to a database. However, times are changing; with the advent of social media, cloud storage, and data analytics platforms, increasing quantities of unstructured data are being pushed onto the Internet. Read more [OPENSOURCE.COM]
  • 33. Open Source SECURITY: What IoT Can Learn From Open Source. In 2014, a study by Hewlett- Packard found that seven out of ten IoT devices tested contained serious security vulnerabilities, an average of twenty-five per device. In particular, the vulnerabilities included a lack of encryption for local and Internet transfer of data, no enforcement of secure passwords, and security for downloaded updates. The devices test included some of the most common IoT devices currently in use, including TVs, thermostats, fire alarms and door locks. Given that Gartner predicts that 25 billion smart devices will be in use by 2020, no one needs to be a prophet to foresee a major security problem that will make even the security problems of the basic Internet seem insignificant. Read more [DATAMATION.COM]
  • 35. Incident Response VIDEO: Incident Response: Trade-offs Under Pressure. John Allspaw provides a glimpse into how other fields handle incident response, including active steps companies can take to support engineers in those uncertain and ambiguous scenarios. Examples include fields such as military, surgical trauma units, space transportation, aviation and air traffic control, and wildland firefighting. Read more [INFOQ.COM] LISTEN: HSAC Wants DHS Cross-Sector Cybersecurity Plan. The Homeland Security Department and Homeland Security Advisory Council are exchanging summer homework, respectively asking for recommendations for the presidential transition and a plan for coordinating cross-sector cybersecurity responses. Read the rest [FEDERALNEWSRADIO.COM]
  • 36. Incident Response COLLABORATION: Technology Gives Police and Public Safety Agencies the Upper Hand. Cities put common IT infrastructure to work in the ongoing effort to prevent and reduce criminal activity. When a suspicious person or activity happens at Newburgh, N.Y.’s City Hall, police are notified directly. City employees can push a button to silently page the nearby police department in an emergency, one of many new features available since the city upgraded its communications infrastructure, adding new IP phones, paging and emergency notification software on top of a new Cisco Systems phone system. Read more [STATETECHMAGAZINE.COM]
  • 37. Incident Response HAVE A PLAN: The Importance of a Cyber Incident Response Plan and the Steps Needed to Avoid Disaster. With two-thirds of the UK’s big businesses being hit with a cyber-attack in the past year, it’s absolutely crucial for businesses to know how to respond and deal with the aftermath. A study conducted last year revealed that more than half of organizations lack the capability to gather data from across their environment, or coordinate centralized alerts to the business about suspicious activity. Read the rest [INFO-SECURITY.COM]
  • 39. Program Management MICROSOFT: Microsoft Launches Planner, a Project-Management Tool Part of Office 365. Microsoft has launched Office 365 Planner, a new project- management tool for teams. The company will be rolling out Planner worldwide to Office 365 users, including Office 365 Enterprise E1–E5, Business Essentials, Premium, and Education subscription plans. The Planner tile will appear in your Office 365 app launcher, meaning Office 365 admins don’t need to take any action. Read more [VENTUREBEAT.COM]
  • 40. Program Management NASA: When Project Management Really is Rocket Science: A Lesson from NASA. A recent GAO assessment of major NASA projects shows that 18 of the organization’s biggest projects received very positive reviews – with project management receiving credit for some of that success. What has proven to be extremely effective for NASA is utilizing standards and adapting tools and processes to the needs of the agency, while satisfying considerations of such leading practices as EVM, project costing, baseline establishment and blending of engineering disciplines into projects. Read the rest [FEDERALTIMES.COM]
  • 41. Program Management ADVICE: 6 Ways to Be a Better Project Manager. Project management is a complex — and critical — function. Here are six pieces of advice to help project managers improve their craft. Find out more [CIO.COM] IT CAREERS: What’s Going On with IT Hiring? Analysts have been generally cautious this year about IT hiring trends. Although the unemployment rate for IT professionals is about half the national average of 4.7%, said CompTIA, some analysts use terms ranging from “modest” to “pre-recession” to describe IT hiring. Read more [COMPUTERWORLD.COM]
  • 43. Search Technology SOLR: Solr 6.0 and Graph Traversal Support. One of the new features that are present in the recently released Solr 6.0 is the graph traversal query that allows you to work with graphs. Having a root set and relations between documents (like parent identifier of the document) you can use a single query to get multiple levels of joins in the same request. Here's how this new feature works both in old fashioned Solr master/slave as well as in SolrCloud. Read more [DZONE.COM] OPEN SOURCE: Has Open Source Become the Default Business Model for Enterprise Software? SpliceMachine's decision to open-source its product has become the latest reminder that -- in emerging technology markets -- open source is increasingly the rule, not the exception. Read the rest [ZDNET.COM]
  • 44. Search Technology GOOGLE: Releases Search Tools to Simplify the Voter Registration Process. Google is continuing its efforts to encourage people to vote in this November’s presidential election in the United States. With Google’s most recent update, it will provide information directly in the search results about how you can register to vote in your state. The update can be triggered by typing “register to vote” in the search bar. Google will then return detailed state-by-state information about how to vote, including the general requirements and voter registration guidelines. Read more [SEARCHENGINEJOURNAL.COM]
  • 45. Search Technology CONNECTOR FRAMEWORKS: How Do I Connect Thee? Let Me Point the Ways. Finally, for content repositories and other sources of searchable data, there are also connector frameworks, such as Apache ManifoldCF, that facilitate the connection between the repositories and various destinations (primarily search servers). Support for a wide variety of repositories, such as Documentum, Alfresco, Sharepoint, etc. is already available. Other custom connectors may also be similarly developed. On the other side, search servers such as ElasticSearch and Apache Solr are supported, amongst others. Read the rest [INFOWORLD.COM]
  • 47. Agile Application Development AGILE DevOps: A Path to the Common Ground of Productivity. Best of breed analytics solutions must bridge the gap between data science and production to unify development and deployment into an agile methodology. With that in mind, Florian Douetteau, CEO of Dataiku, has put together an interesting guidebook that discusses how to achieve that level of synergy to build a data project that embodies the ideologies of agility. Read more [GIGAOM.COM] PROJECT REQUIREMENTS: Blueprint’s Storyteller Auto-Generates User Stories for Agile Teams. Blueprint is trying to solve one of the biggest problems it sees in the agile industry: user stories. According to the company, too often teams misunderstand project requirements, which result in costly delays and revisions. To solve this, Blueprint is launching Storyteller, a new solution designed to auto- generate high-quality user stories and acceptance criteria. Read the rest [SDTIMES.COM]
  • 48. Agile Application Development CONTRACTING: Agile Software Development Brings New Contracting Issues. Creating software using an agile software development (“ASD”) methodology is not a new concept, but it is rapidly gaining popularity among software developers based on the notion that ASD yields workable code sooner and in a more efficient manner. However, traditional “waterfall” software development approaches do not easily lend themselves to contracting under an ASD approach. Read more [LAW360.COM] EPA: How Agile Development Aids FITARA Compliance. As chief information officer of the Environmental Protection Agency, Ann Dunkin is charged with modernizing the IT infrastructure of the 15,000-person strong office. In a recent interview, Dunkin spoke about the progress that EPA is making in reforming its IT acquisition process and the challenge of shifting from legacy systems to agile development. Read the rest [FEDERALTIMES.COM]
  • 49. BYOD
  • 50. BYOD EXEC TECH: BYOD is Evolving for a Cyber-Conscious Age. Kimberly Hancher, former CIO at the Equal Employment Opportunity Commission, helped craft the White House BYOD policy in 2012. That document outlines a broad set of guidelines that agencies can use to establish the proper parameters for mobile access. Yet four years later, she said, there aren’t enough clear policies at federal agencies. “I don’t think most agencies are really undertaking the effort and due diligence to address BYOD policy,” she said. “They’re just sort of letting people do whatever they can get away with, and very few agencies have actually put formal policies in place.” Read the rest [FCW.COM]
  • 51. BYOD USERS: Don’t Mess with iOS 10 or Android Nougat Betas. There’s a lot of interest in the beta releases of iOS 10 and Android Nougat, and while most people are free to explore the new platforms, BYOD users should hold off from testing them. Find out more [ZDNET.COM] ENTERPRISE: The BYOD Evolution: Three Common Approaches. It has become a way of life for employees to bring personal devices to work, whether or not your organisation has a BYOD policy. Employees want the ability to use their own phones, tablets and laptops at work, without losing ownership or control of those devices. But this should raise some red flags for a company’s IT and security teams. The modern issues with BYOD have gone beyond just basic user-privacy issues, to the serious security and compliance matters that need to be addressed to ensure IT ecosystems are not vulnerable. Read more [APPSTECHNEWS.COM]
  • 52. BYOD INDUSTRY INSIGHT: Balancing Mobility with Security: What Government Can Do. The consumerization of IT is not only changing the way employees work, it’s changing their expectations of government IT. Employees look to their agencies to provide modern IT services, interfaces and capabilities — most of which have historically been the responsibility of IT departments. The trouble is that accommodating the mobility demands of today’s users presents a fundamental security challenge to IT teams used to retaining control of every system, app and network under their purview. How do IT teams balance the demands of flexible and secure mobility, accommodate users’ preferences and modernize their IT environments? Here are a few considerations. Read the rest [GCN.COM]
  • 54. Big Data INFORMATION MANAGEMENT: How to Make Big Data Work for SMEs. Big data for SMEs is all about joining up various sources of data and using it to improve productivity and profitability. With accessibility via the cloud, big data enables smaller business to take advantage of the tools that were previously only available to larger corporates. Big data is basically a repository of information drawn from different silos and joined up to make it work more effectively for the business. Here are five key steps on how SMEs can maximise their existing data to make it big. Read the rest [INFORMATION-AGE.COM] STUDY: One-Third of Big Data Developers Use Machine Learning. A recent Evans Data report shows that 36 percent of developers working with big data and analytics are also using machine learning. Find out more [EWEEK.COM]
  • 55. Big Data HEALTHCARE: Managing Big Data in Healthcare. Life sciences companies have too much information – manually collected, logged and stored to adhere to the highest quality standards. Digital analytics can funnel just the right information for risk management. Read more [AUTOMATIONWORLD.COM] ROUNDUP: Watson, WebEx Mashup, Hadoop Summit. IBM Watson gets close with Cisco WebEx to improve collaboration. Hortonworks rolls out updates and initiatives at Hadoop Summit. MapR offers an update to please admins. MongoDB Atlas goes live with a managed cloud-based MongoDB service. Read more [INFORMATIONWEEK.COM]
  • 57. Mobile Applications SURVEY: Companies Want Mobile Apps Without Spending Much on Development. The enterprises engaged in the communications space are increasingly recognizing the perks having a sophisticated mobile app platform, with 42 percent of companies expanding their spending on mobile app development, by an average of 31 per cent in 2016. However, the companies are averse to spending much on it, as a recent survey by Gartner revealed that the average proportion of the overall application development budget allocated to mobile is only 10 per cent, which is actually a 2 percent decline from last year. Read the rest [CIOL.COM]
  • 58. Mobile Applications IBM: Revamps MobileFirst Development Platform for the Cloud. IBM further strengthened the ties between its enterprise mobile app development platform and the cloud with MobileFirst Foundation 8.0, an enterprise middleware that provides cloud-based Mobile Back-end-as-a-Service (MBaaS) for enterprise mobile apps, along with many other associated products and services to round out the development/deployment lifecycle. Find out more [ADTMAG.COM]
  • 59. Mobile Applications AMAZON: AWS Mobile App Development Tools Target Device Lifecycle. AWS is a major player in mobile app development with a variety of end-to-end tools. But it’s not the only option, as Google and other MBaaS providers seek their market share. Read more [SEARCHAWS.TECHTARGET.COM] FILEMAKER 15: How to Make Mobile Apps with FileMaker 15. The business world is full of inventories, catalogs and other lists that sit in spreadsheets or databases that would be more useful if you could take them out of the office. With FileMaker Go and FileMaker WebDirect, you can. Read the rest [CIO.COM]
  • 61. Personnel Management WORKFORCE: Millennials Want to Stay, If Government Grasps the New Reality. Many “millennials” in government say their agencies haven’t yet understood what makes them tick. And their generation isn’t drastically different than the ones that have come before it. Though a majority of federal employees under the age of 35 indicated their interest in staying within the federal government, many millennials said their decision depends on several different factors. Read the rest [FEDERALNEWSRADIO.COM] OPM: Office of Personnel Management Hires First CISO. Following one of the largest data breaches on record, the Office of Personnel Management hires a chief information security officer. The new CISO is Cord Chase, former senior adviser on Cyber and National Security to the White House and Office of Management and Budget, and technology head and engineer at the U.S. Department of Agriculture. Find out more [GOVTECH.COM]
  • 62. Personnel Management DOD: The 4 Big Takeaways from Ash Carter’s New Push for Military Personnel Reform. The plan to overhaul the military personnel system that Defense Secretary Ash Carter announced Thursday would end the “one-size-fits-all” promotion system for military officers and clear the way for far more diverse options in military career tracks. Read more [MILITARYTIMES.COM] FEDERAL CIVIL SERVICE: Report Says Top Civil-Service Rank Needs Urgent Boost. The Senior Executive Service, the highest rank of the nation’s federal civil service, carries a certain prestige. But that is not enough to convince many lower-ranking employees that the status is worth the headache. Read more [WASHINGTONPOST.COM]
  • 63. Programming & Scripting Development Client & Server-Side
  • 64. Programming & Scripting Development Client & Server-Side JAVA: How Oracle’s Business As Usual Is Threatening to Kill Java. Oracle’s silence about Java EE has brought developer community distrust to a fever pitch. Read the rest [ARSTECHNICA.COM] JAVASCRIPT: Blocking JavaScript Can Stop Some Windows Malware. Email attachments are probably the most common mechanism for infecting a Windows computer. As potential victims get wise to the tried and true infection schemes, bad guys have a relatively new wrinkle — the attached malicious file is JavaScript. JavaScript, or more correctly in this case, JScript files, are plain text files that end in “.js.” Find out more [COMPUTERWORLD.COM]
  • 65. Programming & Scripting Development Client & Server-Side jQUERY: Long-awaited jQuery 3.0 Brings Slim Build. The jQuery team has unveiled the long-awaited 3.0 release, bringing a new slimmed-down option as well as major new features, improvements, and bug fixes. Read more [INFOQ.COM] RUBY-ON-RAILS: Ruby on Rails-style Development Comes to Apple’s Swift. The Swifton framework shares the model-view-controller development pattern with Rails. Read more [INFOWORLD.COM]
  • 67. Cloud Computing IaaS: Infrastructure as a Service Cloud Computing Revenue to Surge by 2020. Infrastructure as a service (IaaS) cloud revenue is expected to triple to $43.6 billion by 2020, up from $12.6 billion in 2015, according to research firm IDC. The projection, which equates to a compound annual growth rate of 28.2 percent over five years, is based on the number of enterprises ditching on-premises hardware for the public cloud. Read the rest [ZDNET.COM] MICROSOFT: Azure Cloud Wins a High-Profile New Customer – GE. General Electric is making its Predix industrial software platform available on Microsoft’s cloud. The move isn’t entirely new for GE — its Predix platform was already available on Amazon and Oracle’s clouds. But it’s an important step for Microsoft, which wants to establish itself as the favored partner for big business. Find out more [CNBC.COM]
  • 68. Cloud Computing SERVERLESS COMPUTING: What Serverless Computing Really Means. For developers, worrying about infrastructure is a chore they can do without. Serverless computing merely adds another layer of abstraction atop cloud infrastructure, so developers no longer need to worry about servers, including virtual ones in the cloud. Read more [INFOWORLD.COM] IBM: Tests Secure Cloud Blockchain Service. IBM is beta-testing a new high-security service plan for IBM Blockchain, with dedicated infrastructure for each customer. Until now, it has offered only a starter cloud service for developers who want to experiment with blockchain technology. That service runs in a multitenant cloud, with infrastructure shared among hundreds of blockchains. The new service plan is still cloud-based, but “you get your own resources dedicated to you,” said IBM Vice President for Blockchain Technologies Jerry Cuomo. Read more [COMPUTERWORLD.COM]
  • 70. Business Intelligence TOOLS: 12 Ways to Empower Government Users With the Microsoft Business Intelligence (MBI) Stack. One way to mitigate the risks of budgetary constraints is to discontinue the habit of relying on IT resources for small tasks that users can either do themselves or with limited assistance. Your agency’s use of Microsoft Business Intelligence (MBI) tools and reporting services may hold the key to advancing your organization’s return on investment as well as gain much needed autonomy for your users. Read the rest [BLUEMT.COM] DATABASES: SQL Server 2016 Stretch Database: What Can It Do? When Microsoft released SQL Server 2016, the release was accompanied by a slew of advanced features heavily tailored to make data more malleable and useful for business. In that light, one of the most exciting features of SQL Server 2016 is the Stretch Database feature. Find out more [ENTERPRISEAPPSTODAY.COM]
  • 71. Business Intelligence AMAZON: How Amazon Echo Could Serve as Your New Business Analyst. Picture this. You’re meeting with your board of directors. Someone requests more details about a sales forecast. Instead of booting up a laptop computer to dig up those numbers, you address the question verbally to an Amazon Echo device sitting alongside the other conference room gadgetry. Moments later, it responds with the appropriate data, allowing the meeting to continue uninterrupted. That scenario is being tested among a handful of companies that use data analytics software from Sisense, a New York-based company. Read more [FORTUNE.COM]
  • 72. Business Intelligence SOFTWARE: The Two Main Pitfalls of Business Intelligence As We Know It. Business Intelligence, or as it’s more commonly known as in today’s lexicon “BI,” is one of the first things that pops into professionals’ minds when anything data-related in the workplace is brought up. Whether you’re on the information technology side of the business or a P&L owner, the answer to any information problem is to typically throw a BI solution at it. Here’s a look at two primary reasons why business intelligence is soon-to-be extinct in the emerging technology landscape. Read more [CIO.COM]
  • 73. IT Security | Cybersecurity
  • 74. IT Security | Cybersecurity NIST: Plans Cybersecurity Framework Update. Winter 2017 Revision Would Refine, Clarify Provisions. The National Institute of Standards and Technology plans to update its 2-year-old cybersecurity framework late next year, says Matt Barrett, program manager. Read the rest [GOVINFOSECURITY.COM] PHYSICS: In Cybersecurity, It’s Physics to the Rescue. As computing technology evolves, how will cybersecurity need to change to keep up? Find out more [FEDSCOOP.COM]
  • 75. IT Security | Cybersecurity FEDERAL AGENCIES: For Federal Agencies, a Deluge of Data Requires Security – Everywhere. Data security is a paramount concern for federal agencies no matter how and where their information is stored. Read more [FEDTECHMAGAZINE.COM] RANSOMWARE: New York Takes Bold Steps to Tackle Ransomware. As ransomware threats increasingly target state and local IT systems, Sen. Chuck Schumer calls for a unified and coordinated defense. Read more [STATETECHMAGAZINE.COM]
  • 76. IT Security | Cybersecurity FDIC: Why the FDIC Is Updating Its Cyber Security Policy After This Data Breach. The U.S. Federal Deposit Insurance Corporation is updating cyber security policies after a 2015 data breach in which a former employee kept copies of sensitive information on how banks would handle bankruptcy. FDIC Chairman Martin Gruenberg said he made personnel changes after receiving a report in 2013 informing him that he had not been fully briefed about the major compromise of the regulator’s computers by a foreign government in 2010 and 2011. Read more [FORTUNE.COM]
  • 77. IT Security | Cybersecurity BLIND SPOTS: Cybersecurity Blind Spots: Mitigating Risks and Vulnerabilities. Technical blind spots certainly present major information security challenges to CISOs and their teams, as the complexities of monitoring encrypted traffic and updating SAP software and other legacy applications can be daunting tasks. But there are other cybersecurity blind spots that involve more amorphous and less technical concepts such as enterprise risks. Here’s how security experts overcome these challenges. Read the rest [SEARCHSECURITY.TECHTARGET.COM] CAREERS: Feds to Hire 3,500 Cybersecurity Pros by Year’s End. Last October, the U.S. government began hiring 6,500 new cybersecurity IT professionals. It has hired 3,000 so far, and plans to hire another 3,500 by January 2017, the White House has reported. Read more [COMPUTERWORLD.COM]
  • 78. IT Security | Cybersecurity THREAT PREVENTION: Context-Rich And Context-Aware Cybersecurity. An adaptive threat-prevention model is quickly replacing traditional, unintegrated architectures as security teams work to achieve a sustainable advantage against complex threats. Read the rest [DARKREADING.COM]
  • 79. From the Blue Mountain Data Systems Blog Three-Dimensional Governance for the CIO https://www.bluemt.com/three-dimensional-governance-for-the-cio 7 Reasons to Take Control of IT Incidents https://www.bluemt.com/7-reasons-to-take-control-of-it-incidents/ Breach Mitigation Response Time Too Long, Survey Says https://www.bluemt.com/breach-mitigation-response-time-too-long-survey- says/ Six Tactics for Cyberdefense https://www.bluemt.com/six-tactics-for-cyberdefense/
  • 80. From the Blue Mountain Data Systems Blog Feds Report Mixed Responses to Shared Services https://www.bluemt.com/feds-report-mixed-responses-to-shared-services Federal Employees Are Not Security Experts https://www.bluemt.com/federal-employees-are-not-security-experts Survival Guide for Network Administrators https://www.bluemt.com/survival-guide-for-network-administrators DBaaS: OpenStack Trove Changes DB Management https://www.bluemt.com/dbaas-openstack-trove-changes-db-management
  • 81. From the Blue Mountain Data Systems Blog Help Wanted: Certified Cybersecurity Professionals https://www.bluemt.com/help-wanted-certified-cybersecurity-professionals Cyber Threat Intelligence Integration Center Preview https://www.bluemt.com/cyber-threat-intelligence-integration-center-preview/ Cloud Moves in 1-2-3 https://www.bluemt.com/cloud-moves-in-1-2-3/ Change Management for Disaster Recovery https://www.bluemt.com/change-management-for-disaster-recovery/
  • 82. From the Blue Mountain Data Systems Blog Jeffersonian Advice For C-Suite Career Advancement https://www.bluemt.com/jeffersonian-advice-for-c-suite-career-advancement/ Ways To Survive The “Mobile-Pocalypse” https://www.bluemt.com/ways-to-survive-the-mobile-pocalypse/ Microsoft Cloud Services Receive FedRAMP Authority to Operate https://www.bluemt.com/microsoft-cloud-services-receive-fedramp-authority- to-operate/ Hiring Pentesters? Here Are 10 Things You Need to Know https://www.bluemt.com/hiring-pentesters-here-are-10-things-you-need-to- know/
  • 83. From the Blue Mountain Data Systems Blog Home Router Malware Alert https://www.bluemt.com/home-router-malware-alert/ Threat Model Deconstruction https://www.bluemt.com/threat-model-deconstruction/ Business Email Scam Nets $214 Million https://www.bluemt.com/business-email-scam-nets-214-million/ How to Prevent Unauthorized Software from Taking Over Your Organization https://www.bluemt.com/the-cios-guide-to-happy-end-users-2/
  • 84. From the Blue Mountain Data Systems Blog Digital Marketing Predictions for 2015 https://www.bluemt.com/digital-marketing-predictions-for-2015/ SDN: Network Administrator’s Friend or Foe? https://www.bluemt.com/sdn-network-administrators-friend-or-foe/ Mobile Payments: A Must for Federal Agencies https://www.bluemt.com/mobile-payments-a-must-for-federal-agencies/ Soft Skills Are A Must-Have For Careers In IT https://www.bluemt.com/soft-skills-are-a-must-have-for-careers-in-it/
  • 85. From the Blue Mountain Data Systems Blog Security Risks Most Prevalent in Younger Workers https://www.bluemt.com/security-risks-most-prevalent-in-younger-workers/ The Security World’s Maturation https://www.bluemt.com/the-security-worlds-maturation/ Data Breach Concerns Keep CISOs Up At Night https://www.bluemt.com/data-breach-concerns-keep-cisos-up-at-night/ Personalized Govt Equals Instant Gratification for Citizens https://www.bluemt.com/personalized-govt-equals-instant-gratification-for- citizens/
  • 86. From the Blue Mountain Data Systems Blog People-Centric Security https://www.bluemt.com/people-centric-security/ Pentagon Tries BYOD To Strike Work/Life Balance https://www.bluemt.com/pentagon-tries-byod-to-strike-worklife-balance/ Open Source Model Considered for MS Windows https://www.bluemt.com/open-source-model-considered-for-ms-windows/ Open Internet: To Be or Not to Be? https://www.bluemt.com/open-internet-to-be-or-not-to-be/
  • 87. From the Blue Mountain Data Systems Blog Malware Stays A Step Ahead Infecting One Third of Websites https://www.bluemt.com/malware-stays-a-step-ahead-infecting-one-third-of- websites/ Machine-Generated Data: Potential Goldmine for the CIO https://www.bluemt.com/machine-generated-data-potential-goldmine-for-the- cio/ Government Legacy Programs: Reuse vs. Replacement https://www.bluemt.com/government-legacy-programs-reuse-vs-replacement/ It Takes a Whole Village to Protect Networks and Systems https://www.bluemt.com/it-takes-a-whole-village-to-protect-networks-and- systems/
  • 88. From the Blue Mountain Data Systems Blog Governance For the CIO https://www.bluemt.com/governance-for-the-cio/ Help Desk Consolidation – Lessons Learned https://www.bluemt.com/help-desk-consolidation-lessons-learned/ One Year Later, Companies Still Vulnerable to Heartbleed https://www.bluemt.com/one-year-later-companies-still-vulnerable-to- heartbleed/ Federal Projects Cultivate Worker Passion https://www.bluemt.com/federal-projects-cultivate-worker-passion-2/
  • 89. ABOUT US Blue Mountain Data Systems Inc. Blue Mountain Data Systems Inc. is dedicated to application and systems development, electronic document management, IT security support, and the automation of workflow processes. Read more about our experience here: >> http://bluemt.com/experience
  • 90. Recent Experience U.S. Dept. of Labor Employee Benefits Security Administration 1994 to Present Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support.
  • 91. MANAGEMENT Paul T. Vesely Founder, President, CEO and Principal Architect Mr. Vesely is a recognized thought leader in systems architecture and delivery, having designed and delivered many enterprise wide information and document management solutions. Mr. Vesely’s history includes 33 years experience in the information systems industry, with Unisys, Grumman, PRC and a host of clients in both government and private sectors.
  • 92. CONTACT US Contact Us Today to Discuss Your Next IT Project HEADQUARTERS 366 Victory Drive Herndon, VA 20170 PHONE 703-502-3416 FAX 703-745-9110 EMAIL paul@bluemt.com WEB https://www.bluemt.com