2016 PREDICTIONS: 5 Aspects of Cloud Computing to Watch Out For in 2016. The cloud computing space evolved a lot in 2015. 2016 holds quite a bit in store, like a rise in hybrid cloud, container tech, and more. Read more
INDUSTRY SNAPSHOT: Adobe, Microsoft, Red Hat Aim For Cloud Makeovers. The Internet cloud generally refers to services delivered online, such as software downloads, video streaming and data stored in remote data centers that consumers can access anywhere via mobile devices. For makers of desktop software, the rise of such services has caused a revolution, not just in software packaging (there is none), but also in drastically reducing customers’ initial costs of implementing and using new programs. As a result, Adobe and Microsoft are shifting from selling boxed software and one-time licenses to monthly or annual subscription services delivered over the Internet. Read more
MICROSOFT: Adds Virtual Array to StorSimple Hybrid Cloud Storage. The company adds a new virtual array product to its StorSimple line of hybrid cloud storage and announces updates to its 8000 Series hardware and Cloud Appliance. Read more
DATA PROTECTION: When It Comes to Cloud Security Which is Better? Heavy Hand or Gentle Policing? When it comes to successfully managing cloud use within the enterprise, some security organizations try to establish and enforce firm lines between what is permissible and what is banned, while others try to learn what their employees are trying to achieve and help them do so more securely. In a recent interview, Jim Reavis, cofounder and chief executive officer at the Cloud Security Alliance, shares a sense of what enterprises think about cloud deployments and cloud security. As a nonprofit, the Cloud Security Alliance promotes the use of security assurance best practices in cloud computing, as well as cloud computing education. Read more
FRAMEWORKS: Five Things You Need to Know About Hadoop v. Apache Spark. They’re sometimes viewed as competitors in the big-data space, but the growing consensus is that they’re better together. Read more
ANALYTICS: Top Programming Language In Demand. If you are looking to advance your career or considering who to hire in 2016, you may be looking at particular skills sets, including coding. But what languages should you target? One programming language instructor has made a discovery in Google Trends: Starting in Nov. 2015, more people were searching for “learn Python” than were searching for “learn Java” for the first time ever. That’s when those two points converged as Python continued to rise and Java edged ever so slightly upward over the last few years. Read more
DATA VISUALIZATION: Making Big Data More Meaningful through Data Visualization. Jans Aasman Ph.D., psychologist and expert in cognitive science as well as CEO of Franz Inc., discusses the use of semantic visual discovery to make big data meaningful. Read more
APPLICATION DEVELOPMENT: 4 Great Leaps Machine Learning Made in 2015. Until recently, machine learning was an esoteric discipline, used only by a few who understood the algorithms and had access to tons of data on which to employ it. But with big data technology becoming a commodity and algorithms easier to use, machine learning has moved out of the shadows and into the hands of citizen developers and regular users. Read more
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems December 2015 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-december-2015.
LEARN MORE ABOUT PAUL VESELY: Paul Vesely is a recognized leader in systems architecture, having designed and delivered many database and document processing systems ranging from work group LANs to enterprise-wide solutions. His goal is to minimize the impact of cultural change in organizations where myriad job functions of document management and workflow are affected. Read more.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.