TRANSFORMATION: Connecting Architecture to Business Strategy. Enterprise Architecture, when done well, is a business transformation practice. Transforming a business is not about slogans, mission statements, slick PowerPoints or in-depth strategy documents. It’s about execution and actually changing business operations. Read more

BIG DATA: Much Ado about Hyperscale Architectures. Many organizations are looking forward to the future of hyperscale networking. Even if you are not a cloud-scale enterprise like Amazon and Google, you can still capitalize on the ability to manage and manipulate large data stores over a highly commoditized, distributed architecture. Read more

IT BUDGETS: The Enterprise Technologies To Watch In 2015. It is impressive how much the enterprise technology landscape has changed in just a year. While some priorities remain unchanged, important new players have emerged that business and IT leaders must consider in their plans this year. Read more

C-SUITE GOALS: New Battleground In Enterprise Technology. Businesses today are grabbling with the challenge of using new technologies and new sets of data to improve performance, create excellent customer experiences, and empower their staff to innovate and collaborate more fluidly, says Vishal Barapatre, CTO In2IT Technologies South Africa. Read more


CONTENT FILTERING: Is Your Web Security Really Cloud Application Proof? From Dropbox to Twitter to WeTransfer and Salesforce, the use of cloud-based applications has become an everyday part of the modern business ecosystem. Research has shown that the average employee uses a staggering 27 apps at work. Read more

PAYSCALE UPDATE: IT Security Pros See Rise in Salaries. Salaries for security tech professionals can greatly exceed the baseline for IT professional salaries, according to a report from Dice, the IT jobs portal. Read more

DEFENSE REQUIREMENTS: Navy IT Priorities Stress Security, Efficiency. Recently, the Navy has more overtly aligned its IT requirements around the joint information environment (JIE), a vision centered on universal interoperability, standardizatio and visibility within the Defense Department. The service has four priorities related to the JIE: security, network normalization, infrastructure consolidation and enterprise services. Read more

OUTSOURCING: IRS Cut Its Cybersecurity Staff By 11% Over Four Years. The Internal Revenue Service, which rcently disclosed the breach of 100,000 taxpayer accounts, has been steadily reducing the size of its internal cybersecurity staff as it increases its security spending. This may seem paradoxical, but one observer suggested it could signal a shift to outsourcing. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – July 29, 2015

Leave a Reply