REVENUE SOURCE: In Chicago, Tax Dollars Rain Down from the Cloud. When most IT managers look at virtualization, they see increased administrative efficiencies, lower capital costs and the like. But as city fathers begin looking at virtualization, they may start to see something else entirely: A new revenue stream. Read more

VIRTUAL SPOTLIGHT: Google’s Preemptible Offers Virtual Machine-for-Hire Service on the Cheap. With virtual machines, as in life, you get what you pay for. So if a service provider is offering very cheap virtualized servers in the public cloud, it’s a pretty sure bet that they won’t be reliable ones. But sometimes cheap is just what you are looking for, and reliability be damned. Read more

GARTNER NEWS: VMware, Microsoft Stay On Top In Latest Virtualization Quadrant. As things stand, VMware retains its commanding lead, while Microsoft is the only other company to squeeze into the “Leaders” quadrant. VMware stays out in front even without the help of vSphere 6.0, which was not considered in this year’s quadrant due to its late release. Gartner says vSphere 6.0 was released after the cutoff date for its analysis, but it should be noted that Microsoft didn’t release any new products either, with Windows Server 2012 r2 still its main offering. Read more

DISASTER RECOVERY: Not Dead Yet. One doesn’t need to look very far to find hypervisor vendor marketing materials, analyst opinions and even a few trade press articles declaring the death of disaster recovery planning. Most are following a line of reasoning from the server virtualization evangelists to make the case that building server hosts with high availability (HA) in mind — using active-passive failover clustering models, for example… Read more


NETWORK-CENTRIC STRATEGY: Enterprise Data Security Best Practices Mean IT Teamwork. Security administrators often implement specific, individual data security measures in an effort to protect the enterprise’s network. Some of these measures are network-centric concepts such as intrusion detection system (IDS) rules, firewall rules, or virtual local area network configurations. Read more

BLACK HAT SURVEY: Poor Priorities, Lack Of Resources Put Enterprises At Risk. IT security professionals are becoming increasingly frustrated because the priorities of the business frequently leave the security department short of the time and resources it needs to fight the most critical threats, according to a new study released today. Read more

SLIDESHOW: Eight Key Facts About Email Security in the Enterprise. It comes as no surprise that, in today’s business environment, protecting a company from security threats is a top issue facing IT departments. Managing the complexity of security remains a key challenge facing businesses. A common way attackers are able to penetrate a network is through employee email, which can be a major pain point for organizations. Read more

UNLIKELY PARTNERSHIP: Google And Blackberry Team On Android For The Enterprise. When it comes to unexpected partnerships, a BlackBerry-Android mashup is surely at the top of the list. But Google and BlackBerry have announced they will be joining forces to create a version of the Android system designed for enterprise applications. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – September 2, 2015

Leave a Reply