make-it-happenFOR THE CTO, CIO & CISO

IT MANAGEMENT: Be Popular By Never Denying A User Request. Some user requests are much more complicated than others and may be difficult to fulfill. Saying no is not good for business.Here is a technique that gives you a positive way to respond to any request while allowing the user to ultimately determine its destiny. Read more

SERVICE MANAGEMENT: Process Frameworks. Public process frameworks are easily accessible, proven over time, and generally free to use. The most well known IT management framework is the UK’s Office of Government Commerce’s (OGC) IT Infrastructure Library, or ITIL. ITIL codifies the concept of IT as a “service“, or one or more IT systems which enable a business process. Read more

APPLICATION SECURITY: How To Get CVSS Right. For anyone dealing with software vulnerabilities, the CVE and CVSS are often their first stops in finding out the scope and details, and just about everything else they need to know about the specific vulnerability. Read more

SOFTWARE VULNERABILITIES: DARPA Recruits Gamers to Find Software Vulnerabilities through Online Games. Gamers can help DARPA, the U.S. military’s research division, to find a fault in a software and kill it by simply playing one of its free video games. This week, the research agency announced that five new games will be added in the program. Read more


STRATEGY: Certain Considerations Regarding File and Document Management Systems Protection. Documents encounter perils of various types. Customer listings, sales-strategy reports and specific revenue statistics might fall into the hands of competing firms. Exclusive personal data offered by clients and staff members may be damaged resulting in legal actions. Recognition data for instance bank-account login advice or credit-card details may be stolen by thieves. Read more

ELECTRONIC RECORDS: What Ever Happened to the Paperless Office? Back in the impossibly distant past of 1975, people had optimistic ideas about what business offices would look like in the future. In a BusinessWeek article published in 1975 titled “The Office of the Future,” it was proposed that the 80s and 90s would usher in an era where record handling would be purely electronic, eliminating the need for paper. Read more

PAPER WORKFLOW: Adobe Document Cloud Champions Paperless Office. Adobe overhauls its Acrobat electronic document and EchoSign e-signature services with the launch of the Adobe Document Cloud. Adobe has pooled its Acrobat PDF creation technology and EchoSign e-signature service with other existing assets such as OCR and image enhancement technologies to launch a new Document Cloud service to power paperless document transactions. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – June 1, 2015

Leave a Reply