TO SQL OR NoSQL? That’s the Database Question. Poke around the infrastructure of any startup website or mobile app these days, and you’re bound to find something other than a relational database doing much of the heavy lifting. Today, the database landscape continues to become increasingly complicated. The usual SQL suspects—SQL Server-Oracle-DB2-Postgres, et al.—aren’t handling this new world on their own, and some say they can’t. But the division between SQL and NoSQL is increasingly fuzzy, especially as database developers integrate the technologies together and add bits of one to the other. Read more
RANSOMWARE: Why Hospitals Are the Perfect Targets for Ransomware. Ransomware has been an Internet scourge for more than a decade, but only recently has it made mainstream media headlines. That’s primarily due to a new trend in ransomware attacks: the targeting of hospitals and other healthcare facilities. The malware works by locking your computer to prevent you from accessing data until you pay a ransom, usually demanded in Bitcoin. Hospitals are the perfect mark for this kind of extortion because they provide critical care and rely on up-to-date information from patient records. Without quick access to databases that hold drug histories, surgery directives and other information, patient care can get delayed or halted, which makes hospitals more likely to pay a ransom rather than risk delays that could result in death and lawsuits. Read more
SECURITY: Data and Identity: Two New Security Perimeters. It’s clear that organizations embracing new cloud and mobile infrastructure have less control of some IT assets than they did in the past. What does this mean for security of your data? Read more
HYBRID CLOUD: The 5 Phases of Overcoming Hybrid Cloud Data Integration. An effect hybrid integration strategy can be broken down into five phases, each with its own level of complexity. Phase 1: Replicating SaaS apps to on-premise databases. The first stage in developing a hybrid integration platform is to replicate SaaS applications to on-premises databases. Companies in this stage typically either need analytics on some of the business-critical information contained in their SaaS apps, or they are sending SaaS data to a staging database so that it can be picked up by other on-premise apps. Read more
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems March 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-march-2016.
MORE FROM THE BLUE MOUNTAIN DATA SYSTEMS BLOG: 12 Ways to Empower Government Users With the Microsoft Business Intelligence (MBI) Stack http://www.bluemt.com/12-ways-to-empower-government-users-with-the-microsoft-business-intelligence-mbi-stack/.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.