CLOUD: How Google Spanner’s Easing Our Distributed SQL Database Woes. Google has had to put some significant engineering into Spanner, including a huge amount of resiliency improvements to their own network. Spanner uses atomic clocks and GPS to deliver something called TrueTime, Google’s single “point of truth” on time, which acts as the equivalent of the Sysplex Timer. Find out more
BUSINESS ANALYTICS: Big Data and the Risks of Using NoSQL Databases. Using big data to extract value from your data is one thing. However, using NoSQL can increase your technical debt and put your enterprise at risk of data integrity and the lack of resilience. Find out more
OPEN DATABASES: A Juicy Extortion Target. Recent attacks against insecure MongoDB, Hadoop and CouchDB installations represent a new phase in online extortion, born from ransomware’s roots with the promise of becoming a nemesis for years to come. Find out more
GRAPH DATABASES: Five Mistakes to Avoid for Scalable Performance. The limitations of the relational database management system (RDBMS) model create an opportunity for disruptive approaches like graph data management tools, which are naturally adapted to support business processes related to connectivity. These tools provide an elegant framework for creating, storing, and analyzing data that represents different types of networks. As interest in exploiting graph analytics increases, organizations with business challenges consuming massive amounts of data may find that general-purpose graph analytics tools will not properly scale to meet the performance needs in analyzing gargantuan graphs. Here are five mistakes to avoid when choosing a graph data analytics solution. Find out more
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems January 2017 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-january-2017.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.