USABILITY: Enterprise Software Companies Need to be Customer Centric. Many enterprise software firms are working at improving the usability of their solutions. Further, many enterprise software firms, have embraced the cloud. Read more

UX NEWS: 4 Consumerization Trends That Are Changing Enterprise Software as We Know It. Enterprise software is in the midst of a revolution. In the early 2000s, businesses were the primary users of technology, and they set the rules for how it should be built. The result was clunky, feature-rich software that no one apart from a few power users knew how to use. Read more

GOOGLE’S SCHMIDT TO DEVS: Challenge Legacy Enterprise Software. Google executive chairman Eric Schmidt believes there is a big opportunity for software developers building enterprise solutions that combine mobility, ultra-fast connectivity, and true cloud-based services. Read more


BIG NEWS: The Launch Of Windows 10 May Signal The End Of ‘Patch Tuesday’. Several years ago, Microsoft launched what later became known as “Patch Tuesday” as a way to deliver security updates and bug fixes for Windows and other software products on the second Tuesday of each month. The upcoming launch of Windows 10 will likely do away with that “once a month” pattern for releasing patches as Microsoft moves to a release model where updates are launched when they are ready. Read more

BROWSER BUG FIXES: Apple Patches Multiple Security Bugs In Safari. Apple has released new versions of Safari with security updates for OS X Mountain Lion, Mavericks, and Yosemite. The first set of new flaws in Safari were discovered by Apple and affect its browser engine WebKit in Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 due to three memory corruption issues that can be exploited through a maliciously crafted website, and can cause the browser to crash or execute arbitrary code. Read more

PREINSTALLED SOFTWARE: Lenovo Patches Critical PC Flaws. Lenovo issued an emergency patch to fix flaws in software that it preinstalls on many of its Windows PCs after security researchers warned that it contained vulnerabilities that attackers could use to remotely seize control of systems. Find out more


TENABLE NEWS: Eliminate Blind Spots In Your Network Security. Recent security breaches in major organisations have highlighted the difficulties of protecting networks in an ever-changing dynamic IT landscape. While companies have invested in multiple, preventative security technologies such as authentication, anti-virus, automated patching, next generation firewalls and security event management, cyber criminals… Find out more

QUALSYS CM: Continuous Monitoring Of Perimeter And Internal IT Assets. Today’s cyber attacks are often a result of cyber criminals scanning and attacking networks on a continuous basis, coupled with an event-driven approach to monitoring an organization’s perimeter. As a result, vulnerable machines can be exploited within hours with toxic combinations of scenarios… Find out more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – July 2, 2015

Leave a Reply