Google security bug bountiesFEDERAL, STATE & LOCAL GOVERNMENT IT

IT PROCUREMENT: States Join Forces with Cooperative Purchasing Agreements. When it comes to buying technology, banding together just might be the way to go. All levels of government have long tapped collective pur­chasing agreements to gain up to double-digit discounts on IT purchases, among other things. Read more

BUDGET 2016:Obama Hopes Tech Talent Can Hot-Wire Federal IT. Tucked in the president’s 2016 budget proposal is an innovative initiative aimed at overhauling the way federal digital service delivery gets done. The $105 million request, if enacted, would finance a battalion of 500 IT specialists — collectively known as the U.S. Digital Service (USDS) — recruited from the private sector. Read more

DETECTION TOOLS: Can Facial Recognition Technology Help US Spies Predict China’s Next Island? Technology akin to facial recognition is helping U.S. spies predict where the next mysterious man-made isle will appear in the South China Sea. Read more


WEB DEVELOPMENT: 5 Metrics That Affect The Success Of Your Website Redesign. When you’re undertaking a website redesign it can be tempting to rush in with the excitement of new possibilities, but it’s important to consider the key aspects of a redesign, both aesthetically and from a business perspective. In order for the process to be successful these two must be aligned if the new website is to provide a high return on investment. Read more

3D PRINTING: Designer Creates Shoe Line For Working Women On The Go. After years of commuting from Westchester to the city for her fashion career, Schwartz had foot and back pain from carrying different pairs of shoes for the walk to the office, the work day and evening events. “I was just constantly schlepping them back and forth,” said Schwartz, who lives in Yorktown, where she grew up. Read more


MICROSOFT: New Security Flaw Spans All Versions Of Windows. A security flaw discovered affecting all versions of Windows as well as some 31 software vendors’ products including Adobe, Apple, Oracle, and Symantec, was disclosed publicly. Read more [DARKREADING.COM]

DARWIN: Apple Systems Vulnerable to Bug. According to Kaspersky’s SecureList Blog, the vulnerability is connected with the processing of an IP packet that has a specific size and invalid IP options, enabling attackers to cause a denial of service on devices with 64-bit processors and OS X v10.10 or iOS v8 or lower versions installed.

CLOUD COMPUTING: Assume You’ve Been Breached: Security In The Cloud Era. Perimeter-based security measures are no longer up to snuff, asserted Sayeram, since customers are “designing for the cloud and setting up auto-scaling environments.” Security is now the host’s responsibility and server security is becoming paramount. In fact, on, Inc.’s AWS, the “focus is on the servers, not the perimeter [because] all security needs to be in-host in order to get the most from cloud usage,” Sayeram explained. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – May 26, 2015

Leave a Reply