IT STRATEGY: How Twitter Can Help You Recruit Tech Talent. Twitter conjures up images of funny celebrity tweets and corporate PR gaffes rather than job searching and recruiting. However, there is an emerging pool of job candidates on Twitter. In fact, 45 percent of job seekers report that they use Twitter… Read more

GOOGLE NEWS: Will Its Artificial Intelligence Run An IT Help Desk? A robot could answer your next call to tech support, thanks to new artificial intelligence research at Google. The company taught computers how to have context-sensitive discussions with people about issues ranging from philosophy to humdrum IT help-desk tasks. Read more

INFOGRAPHIC: The Evolution of Provisioning. Traditional provisioning has failed to deliver on its promised benefits. Over the years, organizations have struggled to keep up with increasing demands around cloud, mobile, and compliance. Read this infographic to learn why a new approach to provisioning is needed. Read more

NETWORK MODERNIZATION: Big Change, But One Step At A Time. Federal CIOs frequently acknowledge that their networks might not be up to snuff. Budget constraints and limited resources are cited as top challenges for maintaining networks, and barely one in 10 believes the agency’s network infrastructure can support modern solutions to move and manage data, according to Brocade’s latest survey of 200 participants at 65 federal agencies. Read more


EXPERT ADVICE: Four Enterprise Scenarios For Deploying Database Security Tools. Database security tools are incredibly versatile, offering benefits for security, compliance and even operations. These products, available from third parties, provide a level of database security well beyond what relational database management system (RDBMS) vendors offer customers. Read more

PRIVACY: Companies Averaging 4 Insider-Threat Attacks Per Year. When it comes to insider IT security threats, the third time is definitely not the charm. In fact, the typical organization now experiences 3.8 insider security incidents on an annual basis. Read more

SURVEY FINDINGS: Most Enterprises Don’t Fix 60 Percent of Security Vulnerabilities. Waratek, the application protection and management company, announced the results of a survey conducted at the Gartner Security and Risk Management Summit 2015. Two-thirds of senior security professionals polled said they remediate 40 percent or less of the security vulnerabilities discovered by software application security testing tools. Read more

BREACH PREVENTION: Big Security Breaches and How Big Data Can Prevent Them. In the abstract, network and systems security is easy. We all agree that keeping bad actors out of your electronic world is a no-brainer. We also all agree that there are different rights levels that should be assigned to different user groups. Finally, we all agree that certain systems contain more valuable data than others. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – August 12, 2015

Leave a Reply