Databases in computer network. Computer generated image.DATABASES

LAW ENFORCEMENT: To Deter Criminals, Expand DNA Databases Instead of Prisons. Elected officials often push for lengthening prison sentences for particular crimes in the hopes of deterring people from committing them. But new research highlights a more effective and less costly approach: expanding databases that record the DNA of criminal offenders. Read more

AWS: Rolls Out New Graph Database, More Database Functionality. At re:Invent, Amazon Web Services unveils new services for Aurora and for DynamoDB, along with Neptune — a fully managed graph database. Read more

GRAPH DATABASES: A Look at the Graph Database Landscape. Graph databases are the fastest growing category in all of data management, according to, a database consultancy. Since seeing early adoption by companies including Twitter, Facebook and Google, graphs have evolved into a mainstream technology used today by enterprises in every industry and sector. So, what makes graph databases so popular? By storing data in a graph format, including nodes, edges and properties, graphs overcome the big and complex data challenges that other databases cannot. Graphs offer clear advantages over both traditional RDBMs and newer big data products. Here’s a look at a few of them particular. Read more.

ENTERPRISE: Data Storage and Analytics: 10 Tips to Make it the Perfect Marriage. In the past, data storage was kind of dumb. It sat there inert – waiting for an application to come along and do something with it. Those days are gone, as big data and analytics tools seek to unearth trends, isolate opportunities and detect threats in real time. Here are some tips from the experts on how to get the most out of the evolving relationship between storage and analytics. Find out more


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems December 2017

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


Databases – Daily Tech Update – January 18, 2018

Leave a Reply