CLOUD TECH: Heptio’s Joe Beda – Before Embracing Cloud Computing, Make Sure Your Culture is Ready. Ours is a world enamored with the possibilities unlocked by technological advances. And if we ever update our organizational thinking to account for those advances, we might actually follow through on those possibilities. That issue is at the forefront of Joe Beda’s mind these days. Beda is the co-founder of Heptio, a company that makes tools for developers interested in bringing containers into their development environment. He’s worked at large companies (he helped create Kubernetes and Google Cloud Engine at the search giant) and small (Heptio is up for Startup of the Year at Thursday’s GeekWire Awards), and understands why so many companies struggle with the shift to cloud computing. Read more
DAILY REPORT: Cloud Computing Asserts Itself. It’s been said before but it bears repeating: If it were not for its cloud-computing business, Amazon.com would have difficulty reaching profitability. Can that last? A.W.S. is far and away the leader in cloud computing services, but Microsoft and Alphabet, the parent of Google, are both investing heavily to close the gap, and both are willing to undercut Amazon on price. Other big tech companies like IBM and Oracle are also aggressively investing to get a piece of the cloud action. Read the rest
QUESTION: How Do You Define Cloud Computing? New technology that experiences high growth rates will inevitably attract hyperbole. Cloud computing is no exception, and almost everyone has his or her own definition of cloud from “it’s on the internet” to a full-blown technical explanation of the myriad compute options available from a given cloud service provider. Knowing what is and what is not a cloud service can be confusing. Fortunately, the National Institute of Standards and Technology (NIST) has provided us with a cloud computing definition that identifies “five essential characteristics.” Find out more
RED HAT: New Products Centered Around Cloud Computing, Containers. Red Hat has made a number of announcements at its user group conference, Red Hat Summit. The announcements ranged from the announcement of OpenShift.io to facilitate the creation of software as a service applications, pre-built application runtimes to facilitate creation of OpenShift-based workloads, an index to help enterprises build more reliable container-based computing environments, an update to the Red Hat Gluster storage virtualization platform allowing it to be used in an AWS computing environment, and, of course, an announcement of a Red Hat/Amazon Web Services partnership. Read more
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems April 2017 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-april-2017-75757463.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.