blue-mountain-cloud-computing2CLOUD COMPUTING

PARTNERSHIP: Google, VMware Partner for Hybrid Cloud Computing. According to a statement issued by the two companies, VMware is making four Google cloud services available to enterprise customers through its vCloud Air hybrid cloud. The services include Big Query analytics, Google Cloud Storage, as well as Google Datastore and DNS services. Read more

DISASTER RECOVERY: A Matter Of Trust: The Importance Of Backups In Cloud Computing. Strong security is a foundational element of every public, private and hybrid cloud implementation and will be a top concern for all businesses as part of a macro trend taking grip in 2015. Research shows that 90 percent of the world’s data has been generated in the past two years – calling into question not only data storage, but also data safety. Read more

GOVERNMENT IT: CIO Outlines Cloud Environment Goals at Department of Defense. The top technology officer at the Department of Defense (DoD) wants to work more closely with cloud service providers, saying yesterday that he expects to enhance collaboration with the private sector as the Pentagon, like the rest of the federal government, looks to trim IT costs and improve efficiencies. Read more [CIO.COM]

CLOUD: 2015: A Big Year for Cloud Computing. Given the rising cloud adoption, the increased interest in data visualization tools and the rise of internal enterprise app stores, 2015 is expected to be a big year for the cloud. Cloud adoption has reached a tipping point with a majority of businesses deploying at least a portion of their processes to the cloud. Read more


VB.NET: Be Warned: Google Enlists Chrome In Push For Encrypted Web. Google just gave Chrome something of an insecurity complex. Google has added a feature to Chrome that can alert users about unencrypted network connections common on many parts of the Web. The feature isn’t on by default. Read more

ALERT: FCC Issues Tough Warning Against WiFi Blocking. The Federal Communications Commission has issued a warning that intentional blockage of personal WiFi hotspots was illegal and would be subject to enforcement. The FCC has noticed a “disturbing trend” among hotels and other commercial establishments of blocking consumers’ personal WiFi hotspots on their premises, its advisory notes. Read more

CAREERS: Let’s Improve Cyber Security And Your Job Prospects. It costs governments and companies worldwide over a trillion dollars annually. It can get you arrested. But it can also get you hired. Hacking is a prevalent part of modern technological society, yet at the academic capital of technology, we reduce the topic to just a few academic settings — several courses taught by Professor Dan Boneh, and one by Professor Bahman Bahmani. Read more

AGENCIES: Pay for Mid-Level Cybersecurity Talent Is Soaring. Today’s security talent crunch has its own trickle-down effect with salaries increasing for ‘mid-tier’ hires. The demand is making it harder for chief information security officers to attract and retain seasoned engineers who can detect and neutralize threats. CISOs capped by salary constraints must offer the opportunity to cross-train employees using cutting-edge security technologies, experts say.
Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – March 6, 2015

Leave a Reply