OPEN SOURCE
RED HAT: Red Hat Wants To Repeat The Magic of Linux With Containers. With enterprise workloads slowly moving to the public cloud, and containers becoming first class citizens of the datacenter, the battleground is quickly shifting to the cloud and containers. Traditional infrastructure players are facing a huge challenge. The changing dynamics of the market are forcing Red Hat to relook at its strategy. Read the rest
[FORBES.COM]
MICROSOFT: Project Malmo AI Platform Goes Open Source. The system, now available to all, uses Minecraft to test artificial intelligence protocols. Formerly referred to as Project AIX, the platform has been developed in order to give startups a cheap, effective way to test out artificial intelligence programming without the need to build robots to test commands and comprehension with physical subjects. Find out more
[ZDNET.COM]
STORAGE: Why Object Storage Is Eating the World. Traditionally, web applications use file systems and databases to store user data. This is simple to manage, as web applications generate structured data by accepting text input in forms, and saving the input to a database. However, times are changing; with the advent of social media, cloud storage, and data analytics platforms, increasing quantities of unstructured data are being pushed onto the Internet. Read more
[OPENSOURCE.COM]
SECURITY: What IoT Can Learn From Open Source. In 2014, a study by Hewlett-Packard found that seven out of ten IoT devices tested contained serious security vulnerabilities, an average of twenty-five per device. In particular, the vulnerabilities included a lack of encryption for local and Internet transfer of data, no enforcement of secure passwords, and security for downloaded updates. The devices test included some of the most common IoT devices currently in use, including TVs, thermostats, fire alarms and door locks. Given that Gartner predicts that 25 billion smart devices will be in use by 2020, no one needs to be a prophet to foresee a major security problem that will make even the security problems of the basic Internet seem insignificant. Read more
[DATAMATION.COM]a
==========
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems June 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-june-2016.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.
==========