January 2018: For CTOs, CIOs & CISOs Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue Mountain Data Systems Blog. We hope you will visit our blog for the latest information >> https://bluemt.com/blog/
Tech Update Summary from Blue Mountain Data Systems September 2015BMDS3416
For CTOs, CIOs & CISOs Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue Mountain Data Systems Blog. We hope you will visit our blog for the latest information >> https://bluemt.com/blog/
Tech Update Summary from Blue Mountain Data Systems June 2015BMDS3416
For CTOs, CIOs & CISOs Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue Mountain Data Systems Blog. We hope you will visit our blog for the latest information >> https://bluemt.com/blog/
Tech Update Summary from Blue Mountain Data Systems May 2015BMDS3416
This document provides a summary of the Daily Tech Updates published by Blue Mountain Data Systems in May 2015. It includes brief summaries of articles on topics relevant to CTOs, CIOs, and CISOs such as career advice, employee threats, Windows Server 2003 end of life, Office 365, Azure Site Recovery, retail security focus, FITARA, radio programming for executives, hiring algorithms, marketing and IT relationships, remote hiring, CIO strategic influence, information governance, compliance fatigue, CDM and FedRAMP, leadership challenges, cloud decisions, cloud security, getting noticed online, technology marketing, C-suite casual dress, women in technology leadership, internet of things, big data analytics and security, big data market
10 Things Federal Customers Want from an IT Support ExperienceBMDS3416
In today’s competitive market, customer satisfaction is key. What factors make the IT support experience better for Federal customers? Consider these 10 things.
16 Ways to Retain Technical Staff - Don't Lose Them to Your CompetitionBMDS3416
Blue Mountain Data Systems Inc. provides 16 suggestions for retaining valuable technical staff. These include offering competitive salaries and benefits, clear communication, flexibility, opportunities for growth, and investing in continuing education. The document outlines specific strategies Blue Mountain uses, such as annual parties, flexible work schedules, pairing employees based on skills, and budgeting for training. The goal is to foster trust, engagement, and a collaborative work environment to reduce turnover.
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...BMDS3416
The document discusses how implementing a self-service approach using Microsoft Business Intelligence (MBI) tools can empower government users and maximize ROI for federal IT resources. It provides 12 suggestions for how MBI tools like Power BI, SQL Server Analysis Services, and SharePoint can allow users to perform analytics, create custom reports, and access reports on any device without relying on IT staff. The document concludes that MBI tools offer significant efficiency compared to traditional programming but require an investment to establish a strategy and framework.
How-to: 18 Ways to Secure Your Electronic DocumentsBMDS3416
Are your organization’s #document #management #security inefficiencies leaving you open to legal and economic repercussions? Compliance with mandates such as the Privacy Act, Freedom of Information Act, #HIPAA and the #Sedona #Principals for e-discovery and disclosure are causing ongoing concern within government agencies and corporations…and increased need for solid document security. But how can you keep these electronic files secure during the entire chain of custody? Here are 18 security suggestions.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
Tech Update Summary from Blue Mountain Data Systems September 2015BMDS3416
For CTOs, CIOs & CISOs Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue Mountain Data Systems Blog. We hope you will visit our blog for the latest information >> https://bluemt.com/blog/
Tech Update Summary from Blue Mountain Data Systems June 2015BMDS3416
For CTOs, CIOs & CISOs Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue Mountain Data Systems Blog. We hope you will visit our blog for the latest information >> https://bluemt.com/blog/
Tech Update Summary from Blue Mountain Data Systems May 2015BMDS3416
This document provides a summary of the Daily Tech Updates published by Blue Mountain Data Systems in May 2015. It includes brief summaries of articles on topics relevant to CTOs, CIOs, and CISOs such as career advice, employee threats, Windows Server 2003 end of life, Office 365, Azure Site Recovery, retail security focus, FITARA, radio programming for executives, hiring algorithms, marketing and IT relationships, remote hiring, CIO strategic influence, information governance, compliance fatigue, CDM and FedRAMP, leadership challenges, cloud decisions, cloud security, getting noticed online, technology marketing, C-suite casual dress, women in technology leadership, internet of things, big data analytics and security, big data market
10 Things Federal Customers Want from an IT Support ExperienceBMDS3416
In today’s competitive market, customer satisfaction is key. What factors make the IT support experience better for Federal customers? Consider these 10 things.
16 Ways to Retain Technical Staff - Don't Lose Them to Your CompetitionBMDS3416
Blue Mountain Data Systems Inc. provides 16 suggestions for retaining valuable technical staff. These include offering competitive salaries and benefits, clear communication, flexibility, opportunities for growth, and investing in continuing education. The document outlines specific strategies Blue Mountain uses, such as annual parties, flexible work schedules, pairing employees based on skills, and budgeting for training. The goal is to foster trust, engagement, and a collaborative work environment to reduce turnover.
12 Ways to Empower Government Users With the Microsoft Business Intelligence ...BMDS3416
The document discusses how implementing a self-service approach using Microsoft Business Intelligence (MBI) tools can empower government users and maximize ROI for federal IT resources. It provides 12 suggestions for how MBI tools like Power BI, SQL Server Analysis Services, and SharePoint can allow users to perform analytics, create custom reports, and access reports on any device without relying on IT staff. The document concludes that MBI tools offer significant efficiency compared to traditional programming but require an investment to establish a strategy and framework.
How-to: 18 Ways to Secure Your Electronic DocumentsBMDS3416
Are your organization’s #document #management #security inefficiencies leaving you open to legal and economic repercussions? Compliance with mandates such as the Privacy Act, Freedom of Information Act, #HIPAA and the #Sedona #Principals for e-discovery and disclosure are causing ongoing concern within government agencies and corporations…and increased need for solid document security. But how can you keep these electronic files secure during the entire chain of custody? Here are 18 security suggestions.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
E-commerce Development Services- Hornet DynamicsHornet Dynamics
For any business hoping to succeed in the digital age, having a strong online presence is crucial. We offer Ecommerce Development Services that are customized according to your business requirements and client preferences, enabling you to create a dynamic, safe, and user-friendly online store.
DDS Security Version 1.2 was adopted in 2024. This revision strengthens support for long runnings systems adding new cryptographic algorithms, certificate revocation, and hardness against DoS attacks.
Atelier - Innover avec l’IA Générative et les graphes de connaissancesNeo4j
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Allez au-delà du battage médiatique autour de l’IA et découvrez des techniques pratiques pour utiliser l’IA de manière responsable à travers les données de votre organisation. Explorez comment utiliser les graphes de connaissances pour augmenter la précision, la transparence et la capacité d’explication dans les systèmes d’IA générative. Vous partirez avec une expérience pratique combinant les relations entre les données et les LLM pour apporter du contexte spécifique à votre domaine et améliorer votre raisonnement.
Amenez votre ordinateur portable et nous vous guiderons sur la mise en place de votre propre pile d’IA générative, en vous fournissant des exemples pratiques et codés pour démarrer en quelques minutes.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
What is Augmented Reality Image Trackingpavan998932
Augmented Reality (AR) Image Tracking is a technology that enables AR applications to recognize and track images in the real world, overlaying digital content onto them. This enhances the user's interaction with their environment by providing additional information and interactive elements directly tied to physical images.
WhatsApp offers simple, reliable, and private messaging and calling services for free worldwide. With end-to-end encryption, your personal messages and calls are secure, ensuring only you and the recipient can access them. Enjoy voice and video calls to stay connected with loved ones or colleagues. Express yourself using stickers, GIFs, or by sharing moments on Status. WhatsApp Business enables global customer outreach, facilitating sales growth and relationship building through showcasing products and services. Stay connected effortlessly with group chats for planning outings with friends or staying updated on family conversations.
Transform Your Communication with Cloud-Based IVR SolutionsTheSMSPoint
Discover the power of Cloud-Based IVR Solutions to streamline communication processes. Embrace scalability and cost-efficiency while enhancing customer experiences with features like automated call routing and voice recognition. Accessible from anywhere, these solutions integrate seamlessly with existing systems, providing real-time analytics for continuous improvement. Revolutionize your communication strategy today with Cloud-Based IVR Solutions. Learn more at: https://thesmspoint.com/channel/cloud-telephony
Hand Rolled Applicative User ValidationCode KataPhilip Schwarz
Could you use a simple piece of Scala validation code (granted, a very simplistic one too!) that you can rewrite, now and again, to refresh your basic understanding of Applicative operators <*>, <*, *>?
The goal is not to write perfect code showcasing validation, but rather, to provide a small, rough-and ready exercise to reinforce your muscle-memory.
Despite its grandiose-sounding title, this deck consists of just three slides showing the Scala 3 code to be rewritten whenever the details of the operators begin to fade away.
The code is my rough and ready translation of a Haskell user-validation program found in a book called Finding Success (and Failure) in Haskell - Fall in love with applicative functors.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j
Dr. Jesús Barrasa, Head of Solutions Architecture for EMEA, Neo4j
Découvrez les dernières innovations de Neo4j, et notamment les dernières intégrations cloud et les améliorations produits qui font de Neo4j un choix essentiel pour les développeurs qui créent des applications avec des données interconnectées et de l’IA générative.
OpenMetadata Community Meeting - 5th June 2024OpenMetadata
The OpenMetadata Community Meeting was held on June 5th, 2024. In this meeting, we discussed about the data quality capabilities that are integrated with the Incident Manager, providing a complete solution to handle your data observability needs. Watch the end-to-end demo of the data quality features.
* How to run your own data quality framework
* What is the performance impact of running data quality frameworks
* How to run the test cases in your own ETL pipelines
* How the Incident Manager is integrated
* Get notified with alerts when test cases fail
Watch the meeting recording here - https://www.youtube.com/watch?v=UbNOje0kf6E
SOCRadar's Aviation Industry Q1 Incident Report is out now!
The aviation industry has always been a prime target for cybercriminals due to its critical infrastructure and high stakes. In the first quarter of 2024, the sector faced an alarming surge in cybersecurity threats, revealing its vulnerabilities and the relentless sophistication of cyber attackers.
SOCRadar’s Aviation Industry, Quarterly Incident Report, provides an in-depth analysis of these threats, detected and examined through our extensive monitoring of hacker forums, Telegram channels, and dark web platforms.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Looking for a reliable mobile app development company in Noida? Look no further than Drona Infotech. We specialize in creating customized apps for your business needs.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
E-commerce Development Services- Hornet DynamicsHornet Dynamics
For any business hoping to succeed in the digital age, having a strong online presence is crucial. We offer Ecommerce Development Services that are customized according to your business requirements and client preferences, enabling you to create a dynamic, safe, and user-friendly online store.
DDS Security Version 1.2 was adopted in 2024. This revision strengthens support for long runnings systems adding new cryptographic algorithms, certificate revocation, and hardness against DoS attacks.
Atelier - Innover avec l’IA Générative et les graphes de connaissancesNeo4j
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Allez au-delà du battage médiatique autour de l’IA et découvrez des techniques pratiques pour utiliser l’IA de manière responsable à travers les données de votre organisation. Explorez comment utiliser les graphes de connaissances pour augmenter la précision, la transparence et la capacité d’explication dans les systèmes d’IA générative. Vous partirez avec une expérience pratique combinant les relations entre les données et les LLM pour apporter du contexte spécifique à votre domaine et améliorer votre raisonnement.
Amenez votre ordinateur portable et nous vous guiderons sur la mise en place de votre propre pile d’IA générative, en vous fournissant des exemples pratiques et codés pour démarrer en quelques minutes.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
What is Augmented Reality Image Trackingpavan998932
Augmented Reality (AR) Image Tracking is a technology that enables AR applications to recognize and track images in the real world, overlaying digital content onto them. This enhances the user's interaction with their environment by providing additional information and interactive elements directly tied to physical images.
WhatsApp offers simple, reliable, and private messaging and calling services for free worldwide. With end-to-end encryption, your personal messages and calls are secure, ensuring only you and the recipient can access them. Enjoy voice and video calls to stay connected with loved ones or colleagues. Express yourself using stickers, GIFs, or by sharing moments on Status. WhatsApp Business enables global customer outreach, facilitating sales growth and relationship building through showcasing products and services. Stay connected effortlessly with group chats for planning outings with friends or staying updated on family conversations.
Transform Your Communication with Cloud-Based IVR SolutionsTheSMSPoint
Discover the power of Cloud-Based IVR Solutions to streamline communication processes. Embrace scalability and cost-efficiency while enhancing customer experiences with features like automated call routing and voice recognition. Accessible from anywhere, these solutions integrate seamlessly with existing systems, providing real-time analytics for continuous improvement. Revolutionize your communication strategy today with Cloud-Based IVR Solutions. Learn more at: https://thesmspoint.com/channel/cloud-telephony
Hand Rolled Applicative User ValidationCode KataPhilip Schwarz
Could you use a simple piece of Scala validation code (granted, a very simplistic one too!) that you can rewrite, now and again, to refresh your basic understanding of Applicative operators <*>, <*, *>?
The goal is not to write perfect code showcasing validation, but rather, to provide a small, rough-and ready exercise to reinforce your muscle-memory.
Despite its grandiose-sounding title, this deck consists of just three slides showing the Scala 3 code to be rewritten whenever the details of the operators begin to fade away.
The code is my rough and ready translation of a Haskell user-validation program found in a book called Finding Success (and Failure) in Haskell - Fall in love with applicative functors.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j
Dr. Jesús Barrasa, Head of Solutions Architecture for EMEA, Neo4j
Découvrez les dernières innovations de Neo4j, et notamment les dernières intégrations cloud et les améliorations produits qui font de Neo4j un choix essentiel pour les développeurs qui créent des applications avec des données interconnectées et de l’IA générative.
OpenMetadata Community Meeting - 5th June 2024OpenMetadata
The OpenMetadata Community Meeting was held on June 5th, 2024. In this meeting, we discussed about the data quality capabilities that are integrated with the Incident Manager, providing a complete solution to handle your data observability needs. Watch the end-to-end demo of the data quality features.
* How to run your own data quality framework
* What is the performance impact of running data quality frameworks
* How to run the test cases in your own ETL pipelines
* How the Incident Manager is integrated
* Get notified with alerts when test cases fail
Watch the meeting recording here - https://www.youtube.com/watch?v=UbNOje0kf6E
SOCRadar's Aviation Industry Q1 Incident Report is out now!
The aviation industry has always been a prime target for cybercriminals due to its critical infrastructure and high stakes. In the first quarter of 2024, the sector faced an alarming surge in cybersecurity threats, revealing its vulnerabilities and the relentless sophistication of cyber attackers.
SOCRadar’s Aviation Industry, Quarterly Incident Report, provides an in-depth analysis of these threats, detected and examined through our extensive monitoring of hacker forums, Telegram channels, and dark web platforms.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Looking for a reliable mobile app development company in Noida? Look no further than Drona Infotech. We specialize in creating customized apps for your business needs.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
Creative operations teams expect increased AI use in 2024. Currently, over half of tasks are not AI-enabled, but this is expected to decrease in the coming year. ChatGPT is the most popular AI tool currently. Business leaders are more actively exploring AI benefits than individual contributors. Most respondents do not believe AI will impact workforce size in 2024. However, some inhibitions still exist around AI accuracy and lack of understanding. Creatives primarily want to use AI to save time on mundane tasks and boost productivity.
Organizational culture includes values, norms, systems, symbols, language, assumptions, beliefs, and habits that influence employee behaviors and how people interpret those behaviors. It is important because culture can help or hinder a company's success. Some key aspects of Netflix's culture that help it achieve results include hiring smartly so every position has stars, focusing on attitude over just aptitude, and having a strict policy against peacocks, whiners, and jerks.
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
PepsiCo provided a safe harbor statement noting that any forward-looking statements are based on currently available information and are subject to risks and uncertainties. It also provided information on non-GAAP measures and directing readers to its website for disclosure and reconciliation. The document then discussed PepsiCo's business overview, including that it is a global beverage and convenient food company with iconic brands, $91 billion in net revenue in 2023, and nearly $14 billion in core operating profit. It operates through a divisional structure with a focus on local consumers.
Content Methodology: A Best Practices Report (Webinar)contently
This document provides an overview of content methodology best practices. It defines content methodology as establishing objectives, KPIs, and a culture of continuous learning and iteration. An effective methodology focuses on connecting with audiences, creating optimal content, and optimizing processes. It also discusses why a methodology is needed due to the competitive landscape, proliferation of channels, and opportunities for improvement. Components of an effective methodology include defining objectives and KPIs, audience analysis, identifying opportunities, and evaluating resources. The document concludes with recommendations around creating a content plan, testing and optimizing content over 90 days.
How to Prepare For a Successful Job Search for 2024Albert Qian
The document provides guidance on preparing a job search for 2024. It discusses the state of the job market, focusing on growth in AI and healthcare but also continued layoffs. It recommends figuring out what you want to do by researching interests and skills, then conducting informational interviews. The job search should involve building a personal brand on LinkedIn, actively applying to jobs, tailoring resumes and interviews, maintaining job hunting as a habit, and continuing self-improvement. Once hired, the document advises setting new goals and keeping skills and networking active in case of future opportunities.
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
The document provides career advice for getting into the tech field, including:
- Doing projects and internships in college to build a portfolio.
- Learning about different roles and technologies through industry research.
- Contributing to open source projects to build experience and network.
- Developing a personal brand through a website and social media presence.
- Networking through events, communities, and finding a mentor.
- Practicing interviews through mock interviews and whiteboarding coding questions.
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
1. Core updates from Google periodically change how its algorithms assess and rank websites and pages. This can impact rankings through shifts in user intent, site quality issues being caught up to, world events influencing queries, and overhauls to search like the E-A-T framework.
2. There are many possible user intents beyond just transactional, navigational and informational. Identifying intent shifts is important during core updates. Sites may need to optimize for new intents through different content types and sections.
3. Responding effectively to core updates requires analyzing "before and after" data to understand changes, identifying new intents or page types, and ensuring content matches appropriate intents across video, images, knowledge graphs and more.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
During this webinar, Anand Bagmar demonstrates how AI tools such as ChatGPT can be applied to various stages of the software development life cycle (SDLC) using an eCommerce application case study. Find the on-demand recording and more info at https://applitools.info/b59
Key takeaways:
• Learn how to use ChatGPT to add AI power to your testing and test automation
• Understand the limitations of the technology and where human expertise is crucial
• Gain insight into different AI-based tools
• Adopt AI-based tools to stay relevant and optimize work for developers and testers
* ChatGPT and OpenAI belong to OpenAI, L.L.C.
3. For CTOs, CIOs & CISOs
Visit Blue Mountain Data Systems
https://www.bluemt.com
4. For CTOs, CIOs & CISOs
Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue
Mountain Data Systems Blog. We hope you will visit our blog for the latest information.
You can also receive these updates via email. Click here to subscribe.
Here’s the summary of the Daily Tech Updates for January 2018. Hope the information and ideas prove
useful.
Best,
Paul Vesely
President and Principal Architect
Blue Mountain Data Systems Inc.
6. Network Security
2018 TRENDS: Your 2018 Network Security Snapshot. Security spending is on the
rise even as IT allotments fall, creating a conundrum for IT professionals who must
deliver top-tier protection in a technology market where cybercriminal innovation
and consumer expectations are accelerating. Here’s what’s on the horizon for
network security and where IT focus has the most impact. Here’s a snapshot of
2018’s top network trends. Read more
[SECURITYINTELLIGENCE.COM]
FEDERAL: Time to Fix the TIC. The Report to the President on Federal IT
Modernization emphasizes the need for updated IT infrastructure and shared
services – specifically recommending modernizing the Trusted Internet
Connections program. Will this cause network security to become irrelevant? Read
more
[FCW.COM]
7. Network Security
SECURITY: Shared Services Can Improve Cybersecurity, IT Security Leaders Argue.
The government can enhance smaller agencies’ security if it gives them access to
more interagency cybersecurity services, current and former federal cyber leaders
say. Read more.
[FEDTECHMAGAZINE.COM]
TREND: The Next Step in Network Security Evolution. The next step in the
evolution for network security should be obvious. Decisions about whether to
allow or block communication must be made based on information that more
closely aligns with intent, such as the user and application making the request, the
user and the application receiving the request, and the state of the environment.
As with signature-less NGAV, machine learning can be applied to perform this
analysis in real-time. Read more.
[HELPNETSECURITY.COM]
9. Encyption
OPINION: Hyper-Convergence and the Need for Greater Encryption. Is there a
need to encrypt physical servers on premise, rather than just certain files and
directories based on the data they hold? The argument often given for not needing
to encrypt physical servers is usually that these servers run for weeks, months or
even years without being brought down, and that they are physically protected
within a well-fortified data center. The protection that FDE (Full Drive Encryption)
brings only really applies to data at rest and it seldom is at rest on these servers. A
response to this argument is that all drives eventually leave the data center for
repair or disposal and having them encrypted protects you from having your old
drives with your customer data on them show up on eBay. It also makes that
decommissioning process even easy, as an encrypted drive can be quickly and
easily crypto-erased if it is still operational, and if in some dramatic failure of
process these does not happen, the data is still not accessible without the
encryption key. Read more
[INFOSECURITY-MAGAZINE.COM]
10. Encyption
SECURITY: Skype’s Rolling Out End-to-End Encryption For Hundreds of Millions of
People. Skype has more than 300 million monthly users, making it one of the most
popular chat platforms in the world. Now, they’ll all be able to benefit from a
crucial privacy protection: Microsoft has announced that Skype will offer end-to-
end encryption for audio calls, text, and multimedia messages through a feature
called Private Conversations. Read more
[WIRED.COM]
NATIONAL SECURITY: FBI Chief Calls Encryption a ‘Major Public Safety Issue’. FBI
Director Christopher A. Wray on Tuesday renewed a call for tech companies to help
law enforcement officials gain access to encrypted smartphones, describing it as a
“major public safety issue.” Wray said the bureau was unable to gain access to the
content of 7,775 devices in fiscal 2017 — more than half of all the smartphones it
tried to crack in that time period — despite having a warrant from a judge.
Read more.
[WASHINGTONPOST.COM]
11. Encyption
CHAT SECURITY: WhatsApp Security Flaws Could Allow Snoops to Slide Into
Group Chats. When WhatsApp added end-to-end encryption to every conversation
for its billion users two years ago, the mobile messaging giant significantly raised
the bar for the privacy of digital communications worldwide. But one of the tricky
elements of encryption—and even trickier in a group chat setting—has always
been ensuring that a secure conversation reaches only the intended audience,
rather than some impostor or infiltrator. And according to new research from one
team of German cryptographers, flaws in WhatsApp make infiltrating the app’s
group chats much easier than ought to be possible. Find out more
[WIRED.COM]
13. Databases
LAW ENFORCEMENT: To Deter Criminals, Expand DNA Databases Instead of
Prisons. Elected officials often push for lengthening prison sentences for particular
crimes in the hopes of deterring people from committing them. But new research
highlights a more effective and less costly approach: expanding databases that
record the DNA of criminal offenders. Read more
[WASHINGTONPOST.COM]
AWS: Rolls Out New Graph Database, More Database Functionality. At re:Invent,
Amazon Web Services unveils new services for Aurora and for DynamoDB, along
with Neptune — a fully managed graph database. Read more
[ZDNET.COM]
14. Databases
GRAPH DATABASES: A Look at the Graph Database Landscape. Graph databases
are the fastest growing category in all of data management, according to DB-
Engines.com, a database consultancy. Since seeing early adoption by companies
including Twitter, Facebook and Google, graphs have evolved into a mainstream
technology used today by enterprises in every industry and sector. So, what makes
graph databases so popular? By storing data in a graph format, including nodes,
edges and properties, graphs overcome the big and complex data challenges that
other databases cannot. Graphs offer clear advantages over both traditional
RDBMs and newer big data products. Here’s a look at a few of them particular.
Read more.
[DATANAMI.COM]
15. Databases
ENTERPRISE: Data Storage and Analytics: 10 Tips to Make it the Perfect Marriage.
In the past, data storage was kind of dumb. It sat there inert – waiting for an
application to come along and do something with it. Those days are gone, as big
data and analytics tools seek to unearth trends, isolate opportunities and detect
threats in real time. Here are some tips from the experts on how to get the most
out of the evolving relationship between storage and analytics. Find out more
[ENTERPRISESTORAGEFORUM.COM]
16. More About Blue Mountain
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S.
Dept. of Labor, Employee Benefits Security Administration. Responsible to the
Office of Technology and Information Systems for information systems
architecture, planning, applications development, networking, administration and
IT security, supporting the enforcement of Title I of the Employee Retirement
Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for
design, development and support for its various enforcement database
management systems, as well as all case tracking and customer service inquiry
systems. Blue Mountain also provides IT security services to the EBSA, in the form
of FISMA Assessment and Authorization, System Security Plans, Risk and
vulnerability assessments, monitoring and investigation support. Read more.
18. Federal Tech
FEDERAL GOVERNMENT: APIs, Shared Services Can Reshape,
Modernize Government Technology. The size and scope of the
federal government’s information technology landscape only
continues to grow and in a way that makes it incredibly difficult to
change. In the Federal Chief Information Officers Council’s latest
study, the current state of government IT is described as monolithic.
And, it is not meant as a compliment. Read more
[FEDERALNEWSRADIO.COM]
19. Federal Tech
OPINION: Government Efforts to Weaken Privacy are Bad for Business and
National Security. The federal government’s efforts to require technology and
social media companies to relax product security and consumer privacy standards
– if successful – will ultimately make everyone less safe and secure. Read the rest
[INFOSECURITY-MAGAZINE.COM]
PUBLIC SAFETY: Rapid DNA Technology Gives Law Enforcement Access to Your
DNA in 90 Minutes. Before recently-passed legislation, law enforcement agencies
had to send DNA samples to government labs and wait for it to get tested, which
could take days or even weeks. Find out more
[GOVTECH.COM]
20. Federal Tech
MODERNIZATION: Making Modernization Happen. Now more than ever before,
comprehensive IT modernization for federal agencies is a real possibility. The
question that remains is whether President Donald Trump’s words and actions
during his first months in office will be sustained by the administration and
Congress in the months and years ahead. Read more
[FCW.COM]
22. State Tech
SURVEY: Cybersecurity Concerns May Keep One in Four Americans
from Voting. Cybersecurity concerns may prevent one in four
Americans from heading to the polls in November, according to a
new survey by cybersecurity firm Carbon Black. The company
recently conducted a nationwide survey of 5,000 eligible US voters to
determine whether reports of cyberattacks targeting election-related
systems are impacting their trust in the US electoral process. The
results revealed that nearly half of voters believe the upcoming
elections will be influenced by cyberattacks. Consequently, more
than a quarter said they will consider not voting in future elections.
Read more
[HSTODAY.US.COM]
23. State Tech
ALASKA: Unique Challenges in IT Consolidation. The Last Frontier is
centralizing IT operations under Alaska’s newly created Office of
Information Technology. But consolidating IT in a sprawling state like
Alaska offers challenges not found in other environments, says the
state’s new CIO Bill Vajda. Read the rest
[GCN.COM]
ALABAMA: Acting CIO Jim Purcell Is a Man on a Mission for Smarter
State IT. Jim Purcell wasn’t expecting a call from Alabama’s new
governor, Kay Ivey, and he certainly wasn’t expecting her to ask him
to head up the Office of Information Technology (OIT) – but that’s
exactly what happened last week. Find out more
[GOVTECH.COM]
24. State Tech
ILLINOIS: Inside a State Digital Transformation. Hardik Bhatt, CIO of the State of
Illinois, sought to become the nation’s first Smart State – a process that required
reorganizing its 38 IT departments into one, improving government services, and
finding new sources of innovation to apply to its revenue model. Within 18
months, Illinois rose in national rankings from the bottom fourth of state
governments to the top third. Read more
[ENTERPRISERSPROJECT.COM]
26. Electronic Document Management
CFPB: Looks to Embrace Cloud for Email, Office Application Needs. The Consumer
Financial Protection Bureau wants to move to a public cloud setup for some of its
core enterprise apps. The financial watchdog agency recently sent out a Request
for Information (RFI) on the process, technical requirements and costs of moving to
cloud services in fiscal year 2017. CFPB wants to establish a more complete
understanding on the costs associated with moving fully to a cloud solution for
email and office applications (e.g., documents, spreadsheets, presentations,
SharePoint and more).Read the rest
[FEDTECHMAGAZINE.COM]
27. Electronic Document Management
ROI: 4 Ways Business Document Management Software Can Save You Money. Lisa
Croft, Group Product Marketing Manager at Adobe Document Cloud, talks about
the many ways business document management can save your company time,
space, and more importantly, loads of money. Here are the four most obvious ways
these tools provide excellent return-on-investment. Read more
[PCMAG.COM]
29. Section 508 Compliance & WCAG 2.0
ACCESSIBLE DIGITAL WORKPLACE: We Need to Build Accessibility Into Our Digital
Workplaces. According to the 2010 U.S. Census, one in five people have some form
of physical or cognitive disability. And yet as of 2016, only 17.9 percent of people
with disabilities were employed, compared with 65.3 percent of people without a
disability. Nevertheless chances are at least one person in your organization
probably has some form of disability. And the disabilities, such as dyslexia and
color blindness, are not so obvious. Read more
[CMSWIRE.COM]
30. Section 508 Compliance & WCAG 2.0
508 REFRESH: How Does the Refreshed Section 508 Rule Affect Your Agency? This
article focuses on what changed in the refresh and how the refresh affects agency
systems. The good news is that if agencies complied with the original Section 508
rule, then they are ahead of the game concerning the refreshed rule. Simply put –
agencies that were compliant are still compliant because there is a “safe harbor”
clause embedded in the new rule that exempts existing or “legacy” IT from having
to meet the refreshed rule. Keep in mind, though, that new or updated web pages
created after the new rule went into effect must comply with the new rule by
January of 2018. Read more
[GCN.COM]
31. Section 508 Compliance
LEGAL: Is Your Company Website Sufficiently Accessible to the Disabled? Over the
last two years, there have been an increasing number of lawsuits filed over the
alleged failure of websites to accommodate persons with disabilities. According to
a recent New York Times article, since January 2015, at least 751 website
accessibility lawsuits have been filed under Title III. The vast majority of these suits
have targeted retailers and restaurants. Now, other entities, such as academic
institutions, are coming under fire, and we anticipate litigation to increase in 2018
impacting all industries. Read more.
[LEXOLOGY.COM]
32. Section 508 Compliance
ACCESSIBLE WEB DESIGN: How to Accommodate the Dyslexic Reader. Dyslexia is
a general term for disorders that involve difficulty in learning to read or interpret
words, letters, and other symbols, but that do not affect general intelligence. It is
the most common cause of reading, writing, and spelling difficulties. Of people
with reading difficulties, 70-80% are likely to have some form of dyslexia. It is
estimated that between 5-10% of the population has dyslexia, but this number can
also be as high as 17%. Here are some CSS tips to consider when designing web
content to accommodate the dyslexic reader. Read more.
[ACCESSIBLEWEBSITESERVICES.COM]
34. Security Patches
WINDOWS: Windows 7 Update Guide: How ‘Security-Only’ and ‘Monthly Rollups’
Differ. Microsoft in 2016 changed the way it rolls out updates for Windows 7 and
Windows 8.1, leaving many IT admins and users confused. Here’s how to sort out
what the company is doing. Read more
[COMPUTERWORLD.COM]
ANDROID: Google Releases December Security Bulletin for Android, KRACK Fix
Included. You have to thank the Android gods that Google is as regular as the
sunrise when it comes to releasing their monthly Android Security Bulletin. Ever
since the Stagefright vulnerability was made public, the mothership has made it its
own responsibility to put out a monthly patch for evolving Android security risks.
The patch for December 2017 is now out, both for general Android devices, and
one specific to Nexus and Pixel devices. Find out more
[ANDROIDCOMMUNITY.COM]
35. Security Patches
INTEL: Intel’s Security Patches are Causing Computers to Randomly Restart. Intel
confirms that its patches to fix processors affected by the Spectre and Meltdown
security flaws are causing computers to suddenly reboot on their own. Read more
[CNBC.COM]
MICROSOFT: Says Security Patches Slowing Down PCs, Servers. Microsoft Corp
has announced that software patches released to guard against microchip security
threats slowed down some personal computers and servers, with systems running
on older Intel Corp processors seeing a noticeable decrease in performance. Read
more
[REUTERS.COM]
36. Security Patches
SECURITY: The Hidden Toll of Fixing Meltdown and Spectre. In the early days of
2018, the engineering team at the mobile services company Branch noticed
slowdowns and errors with its Amazon Web Services cloud servers. An
unexpected round of AWS server reboots in December had already struck Ian
Chan, Branch’s director of engineering, as odd. But the server slowdowns a few
weeks later presented a more pressing concern. Read more.
[WIRED.COM]
GOOGLE: Says Its Security Patches Not Slowing Down Systems. Alphabet Inc’s
Google said it has already deployed software patches against the Spectre and
Meltdown chipset security flaws last year, without slowing down its cloud
services. Find out more
[WIRED.COM]
38. For the CIO, CTO & CISO
CIO: Cybersecurity, IT Centralization Are Focuses for Santa Clara County CIO.
Nearly 11 months after former EPA CIO Ann Dunkin became Santa Clara County’s
CIO, she reflects on an ongoing IT centralization and the importance of good
“cyberhygiene.” Read more
[GOVTECH.COM]
CTO: FCC’s Own Chief Technology Officer Warned About Net Neutrality Repeal.
The Federal Communications Commission’s own chief technology officer expressed
concern about Republican Chairman Ajit Pai’s plan to repeal the net neutrality rules,
saying it could lead to practices that are “not in the public interest.” Read more
[POLITICO.COM]
39. CIO, CTO & CISO
CISO: How Federal CISOs Can Make the Most of Security Resources They Have.
Chief information security officers need to efficiently use the resources at hand
while planning for the future. Read more.
[NEXTGOV.COM]
Q & A: Meet the Alumna Serving as Acting CIO of the United States. As acting
chief information officer of the United States, University of Virginia alumna
Margaret Graves oversees the vast web of technology that supports and protects
the work of the federal government every day. It’s a big task and one to which
Graves is deeply committed. Read more.
[NEWS.VIRGINIA.EDU]
41. Penetration Testing
THREAT INTELLIGENCE: You Break It, They Buy It: Economics, Motivations
Behind Bug Bounty Hunting. Some bug hunters make 16 times the median
salary of software engineers in their home countries. As the momentum grows
in both the private and public sector for crowdsourced bug bounty programs,
freelance security researchers are increasingly finding their profession for finding
software vulnerabilities turning into a lucrative career opportunity in its own
right. Read more
[DARKREADING.COM]
42. Penetration Testing
NEXT-GEN: Using Search Engines as Penetration Testing Tools. Search engines
are a treasure trove of valuable sensitive information, which hackers can use for
their cyber-attacks. Good news: so can penetration testers. From a penetration
tester’s point of view, all search engines can be largely divided into pen test-
specific and commonly-used. Learn how ethical hackers use three search engines
as penetration testing tools: Google (the commonly-used) and two pen test-
specific ones: Shodan and Censys. Read more
[INFOSECURITY-MAGAZINE.COM]
DATA BREACH: ‘Hacking Incident’ Impacts Nearly 280,000 Medicaid Patients. A
health data breach reported to federal regulators as a “hacking/IT incident”
impacting nearly 280,000 Medicaid patients in Oklahoma has experts wondering
exactly what happened. Read more.
[GOVINFOSECURITY.COM]
43. Penetration Testing
FEDERAL GOVERNMENT: The Pentagon Opened Up to Hackers—And Fixed
Thousands of Bugs. The United States government doesn’t get along with hackers.
That’s just how it is. Hacking protected systems, even to reveal their weaknesses,
is illegal under the Computer Fraud and Abuse Act, and the Department of Justice
has repeatedly made it clear that it will enforce the law. In the last 18 months,
though, a new Department of Defense project called “Hack the Pentagon” has
offered real glimmers of hope that these prejudices could change. Find out more
[WIRED.COM]
45. Open Source
LINUX: 10 Open Source Technologies You’ll Need to Know in 2018. For most
enterprise IT departments, using and contributing to open source projects is
now a part of everyday life. Read more
[LINUX.COM]
MAPPING: An Open Source Startup Dies as Mapping Gets Hotter Than Ever. For
at least one startup, 2018 opened with a thud. On Tuesday, the open source
mapping company Mapzen announced it would shut down at the end of the
month, with its hosted APIs and support services going dark on February 1.
That’s a real pain for Mapzen users, whose ranks include civic tech organizations
like Code for America, app developers, and government agencies like the
Portland-area transportation agency TriMet. And it’s a bummer for those who
contributed to Mapzen’s wide-ranging data sets, which included detailed info on
public transportation. Read more
[WIRED.COM]
46. Open Source
APPLICATION SECURITY: Open Source Components, Code Volume Drag Down Web
App Security. The number of new Web application vulnerabilities published last
year was 212% greater than the number disclosed in 2016, Imperva says in a new
report this week. Read more.
[DARKREADING.COM]
LEARN: Meet Open Source – The Not-So-Secret to Success. Open source is a great
tool for developers, but it doesn’t solve all problems. In this article, Milen Dyankov
discusses the lessons he has learned as a long time user and advocate of open
source software, and the value of nurturing relationships. Read more.
[JAXENTER.COM]
48. Business Intelligence
BIG DATA: Three Ways to Turn Business Intelligence into a Business Advantage.
Julian Burnett, CIO at retailer House of Fraser, explains how he has placed business
intelligence (BI) front and centre at House of Fraser and offers best practice tips to
CIOs around developing a strategy, honing that capability and exploiting innovation,
including artificial intelligence (AI). Read more
[ZDNET.COM]
LEARN: 9 Ways You’re Failing at Business Intelligence. Solid business intelligence is
essential to making strategic business decisions, but for many organizations, BI
efforts are derailed by poor data practices, tactical mistakes and more. Read more.
[ITWORLD.COM]
49. Business Intelligence
WHY: Business Intelligence Requires Natural Language Generation. Stuart Frankel,
CEO of Narrative Science, discusses how Business Intelligence requires natural
language generation (NLG) technology, a subset of artificial intelligence, that
transforms data and analysis into concise, intelligent and human-sounding language
that anyone can understand. This transformation occurs in mere seconds, at a scale
only possible with AI-powered software, freeing up workers from tedious, manual
data analysis processes. Find out more
[INSIDEBIGDATA.COM]
READ: 12 Ways to Empower Government Users With the Microsoft Business
Intelligence (MBI) Stack. Are your organization’s Federal IT resources under
constant pressure, with no end in sight? Your agency is not alone. With limited
access to dedicated information technology resources, non-technical end users
often play the waiting game, relying on IT staff to do simple tasks like generating
custom queries and embedding them within applications. Here are ways to
empower your end users with the Microsoft Business Intelligence (MBI) Stack. Find
out more
[BLUEMT.COM]
50. Business Intelligence
READ: 12 Ways to Empower Government Users With the Microsoft Business
Intelligence (MBI) Stack. Are your organization’s Federal IT resources under
constant pressure, with no end in sight? Your agency is not alone. With limited
access to dedicated information technology resources, non-technical end users
often play the waiting game, relying on IT staff to do simple tasks like generating
custom queries and embedding them within applications. Here are ways to
empower your end users with the Microsoft Business Intelligence (MBI) Stack. Find
out more
[BLUEMT.COM]
51. Business Intelligence
READ: Business Intelligence vs. Business Analytics: Where BI Fits Into Your Data
Strategy. While BI leverages past and present data to describe the state of your
business today, business analytics mines data to predict where your business is
heading and prescribe actions to maximize beneficial outcomes. Find out more
[CIO.COM]
U.S. GOVT FINANCE: 11 Ways to Speed Up Government Procurement. Buying with
public money is difficult by design, but are there fair ways to fix it? Read more
[GOVTECH.COM]
53. Operating Systems
CONTAINERS VERSUS OPERATING SYSTEMS: What Does a Distro Provide? The
most popular docker base container image is either busybox, or scratch. This is
driven by a movement that is equal parts puritanical and pragmatic. The puritan
asks “Why do I need to run init(1) just to run my process?” The pragmatist asks
“Why do I need a 700 meg base image to deploy my application?” And both,
seeking immutable deployment units ask “Is it a good idea that I can ssh into my
container?” But let’s step back for a second and look at the history of how we got to
the point where questions like this are even a thing. Read more
[DAVE.CHENEY.NET]
54. Operating Systems
EUROPE: Barcelona Abandons Windows and Office, Goes with Linux Instead. In
another entire-city-abandons-Microsoft affair, Barcelona has announced that it’s
dumping Windows and Office in order to migrate to Linux and other open source
solutions. The idea is, obviously enough, to save money by not paying subscription
fees to Microsoft, because the beauty of open source software is that it’s free. Read
more
[TECHRADAR.COM]
MICROSOFT: Ends Mainstream Support for Windows 8.1. Windows 8.1 users are
now left without mainstream support, as Microsoft officially pulls the plug on the
operating system. The company will still continue to offer security updates until
2023, when all support for the platform will end. Read more.
[KITGURU.NET]
55. Operating Systems
TECH TIP: Keeping Up With the Meltdown and Spectre Bugs. Is it safe to install the
Windows patch for these new Spectre and Meltdown bugs? Do they affect Linux?
(And who names these security flaws, anyway?) Find out the answer. Read more.
[NYTIMES.COM]
57. BYOD
SECURITY: Why BYOD Authentication Struggles to be Secure. A recent Bitglass
study pointed out some interesting statistics: Over a quarter (28%) of organizations
rely solely on user-generated passwords to secure BYOD, potentially exposing
countless endpoints to credential guessing, cracking and theft. 61% of respondents
also had reservations about Apple’s Face ID technology. Given that the general
concept in security has always been to eliminate passwords and use MFA, the
results are surprising, so why the disconnect? Read more
[INFOSECURITY-MAGAZINE.COM]
58. BYOD
DOD: ‘Wrong Trajectory’ in Mobile Strategy Stifles Marines’ BYOD Ambitions. The
Marine Corps has been talking about implementing a bring-your-own-device
strategy for more than three years as one way to cut costs and speed up its
adoption of commercial smartphone technology. But the service’s chief information
officer says the goal is still a long way off, and the Marines are still struggling to
bring aboard the most modern mobile devices, even when they’re owned by the
government. Read more.
[FEDERALNEWSRADIO.COM]
TEXTBOOKS OPTIONAL: What Unbundling and BYOD Mean for Learning
Technology. Today, schools across the country look to educators to customize
learning for their unique classrooms. Here is how educators are accomplishing this
through unbundling and BYOD. Find out more
[ESCHOOLNEWS.COM]
59. BYOD
FEDERAL GOVERNMENT BYOD: The Mobile Security Conundrum. There are
currently more than 7.7 billion mobile connections around the world. Thanks to the
Internet of Things, it is predicted that the number of connected devices will reach
an astounding 20.8 billion by 2020. With the average number of mobile devices
owned per person currently estimated at 3.64, those devices are becoming
necessary equipment for today’s workers. Yet while the private sector has been
quick to establish Bring-your-own-device policies, the public sector has lagged
behind because of security and privacy concerns. Despite several initiatives —
including a White House-issued BYOD toolkit and two National Institute of
Standards and Technology documents (800-124 and 800-164) giving guidance on
securing devices that connect with government networks — many federal agencies
are still reluctant to establish BYOD policies. Read more
[GCN.COM]
61. Incident Response
ENTERPRISE IMPERATIVE: Five Tips for Improving Incident Response. While there’s
no silver bullet for incident response, Christopher Scott, global remediation lead for
IBM’s X-Force Incident Response and Intelligence Services (IRIS) team, argues that
the right processes and people make all the difference. Ultimately, that’s what
executives are looking for: ways to bridge the gap between existing response efforts
and best-of-breed solutions. Here’s what Scott names as the five key tips for
improving enterprise incident response. Read more
[SECURITYINTELLIGENCE.COM]
TUTORIAL: Incident Response: A Quick Way To Gather Lots of Files. Using
PowerShell, finding infected files can take just a few minutes to complete. Read
more
[REDMONDMAG.COM]
62. Incident Response
OPINION: The New DHS Breach Illustrates What’s Wrong with Today’s
Cybersecurity Practices. This month, the Department of Homeland Security notified
affected employees about a 2014 breach of 247,167 employee records. There are
many interesting details in the department’s disclosure, including the fact that there
was six-month privacy investigation between the discovery of the breach and the
notification, and the fact that the records were uncovered during a criminal
investigation. DHS even revealed that the records were found in the possession of a
former DHS Office of Inspector General employee. But the part that jumped out the
most was how explicit DHS was about characterizing this as a “privacy incident.” In
its public statement, the department made no mention of the incident as an insider
threat issue, despite the records being found in the possession of a former
employee. Read more.
[THEHILL.COM]
63. Incident Response
FERC: Proposes Cybersecurity Incident Reporting Rule. On December 21, 2017 the
Federal Energy Regulatory Commission (FERC) proposed a rule to direct the North
American Electric Reliability Corporation (NERC) to clarify and expand the scope of
cyber incident reporting. The rule envisions that the NERC will require reporting of
cyber incidents when there is a compromise of or even an attempt to compromise
certain network infrastructure. If the rule is finalized, cyber incidents would have to
be reported to both the Electricity Information Sharing and Analysis Center (E-ISAC),
which is required under the current standard, and the Industrial Control Systems
Cyber Emergency Response Team (ICS-CERT), which is an office within the
Department of Homeland Security (DHS). Read more.
[LEXOLOGY.COM]
65. Cybersecurity
OPINION: Cybersecurity Today Is Treated Like Accounting Before Enron. Nathaniel
Fick, the chief executive of Endgame, a cybersecurity software company, writes in
The New York Times: “Last week, we learned that researchers had discovered two
major flaws in microprocessors of nearly all the world’s computers. The revelation
came on the heels of a distressing series of major hacks: In 2017, Yahoo revealed
that all of its three billion accounts were compromised, WannaCry ransomware shut
down hospitals across the globe, and an Equifax breach affected approximately
145.5 million consumers in the United States. The latest news about the computer
security problems — whose names, “Spectre” and “Meltdown,” appropriately
convey their seriousness — is just the latest evidence that true digital security
remains out of our reach.” Read more
[NYTIMES.COM]
66. Cybersecurity
INDUSTRY INSIGHT: AI Cybersecurity: Let’s Take Some Deep Breaths. The concept
of artificial intelligence in cybersecurity has taken on nearly mythic proportions over
the past couple years. Many articles have been written on the topic, breathlessly
heralding the potential benefits and hazards posed by the rise of machine learning.
However, all the hype surrounding AI tends to obscure a very important fact. The
best defense against a potential AI cyber attack is rooted in maintaining a
fundamental security posture that incorporates continuous monitoring, user
education, diligent patch management and basic configuration controls to address
vulnerabilities. Here’s how each of these four fundamental security practices can
aid in the fight for cybersecurity’s future (and present). Read more
[GCN.COM]
67. Cybersecurity
IRS: Tax Scam Alert – The IRS Just Issued a New Cybersecurity Warning. While
cybersecurity should be a year-round concern for small business owners, income
tax filing season can bring some particular risks, according to the IRS. The agency
says it has gotten an increase in reports of attempts to obtain employees’ W-2
forms in hopes of stealing people’s personal information and identities. The scams
often go after employees in companies’ human resources and payroll departments,
but any staffer or manager could be a target. In the scam, a potential thief poses as
a company executive, sending an email from an address that might look legitimate,
and requests a list of employees and their W-2s. Read more.
[TIME.COM]
68. Cybersecurity
TRENDS: 18 Cyber Security Trends We Are Watching in 2018. If any trend is
obvious, it’s that 2018 will continue to be interesting for the cybersec industry. How
interesting? Here is are the 18 trends that will be making the headlines and should
be on your radar for 2018. Read more.
[SECURITYBOULEVARD.COM]
70. IT Management
READ: All Management Is Change Management. Change management is having its
moment. There’s no shortage of articles, books, and talks on the subject. But many
of these indicate that change management is some occult subspecialty of
management, something that’s distinct from “managing” itself. This is curious
given that, when you think about it, all management is the management of
change. Read more
[HBR.ORG]
NARA: Improvements Seen in Federal Records Management, but ‘There is Work
to be Done’. Compliance, collaboration and accountability are the themes of the
National Archives’ recommendations to agencies for improving how they handle
paper – and electronic – trails. That’s according to NARA’s 2016 Federal Agency
Records Management Annual Report. Read more.
[FEDERALNEWSRADIO.COM]
71. IT Management
FINANCIAL: Washington State’s Strategy for Tracking IT Spending. The state of
Washington’s first efforts to bring technology business management to its IT
spending practices began in 2010 when the legislature mandated annual reports
and specific evaluation requirements for investments. As interest grew in
monitoring the cost of IT along with the business services IT provides, officials in
the Washington’s Office of the CIO worked to refine the strategy through the
creation of a state TBM program. Find out more
[GCN.COM]
72. IT Management
HR: A Blueprint for Improving Government’s HR Function. Government, at its
core, is its employees and their commitment to serve the country. That fact is
too often overlooked. While technology enables employees to make better,
faster decisions, until artificial intelligence replaces the acquired knowledge of
employees, agency performance will continue to depend on the skill and
dedication of government workers. As such, civil service reform is increasingly
important because workforce rules and regulations are out of sync with current
management thinking. To use a basketball analogy, government is still shooting
two handed set shots. Read more
[GOVEXEC.COM]
74. Application Development
MOBILE APPS: What are the Advantages of Rapid Application Development?
Rapid mobile app development (RMAD) requires less know-how, but still reduces
the costs and risks typically involved in a traditional app build. Here are some of the
advantages of adopting RMAD products. Read more
[SEARCHMOBILECOMPUTING.TECHTARGET.COM]
FEDERAL GOVERNMENT: Will 2018 be the Year for Blockchain for Government?
While 2017 was the year everyone in government talked about blockchain, 2018
may finally mark the year of action. For all the discussion and hype, there are few
use cases of the technology to highlight. Jose Arrieta, former director of the
General Services Administration’s IT Schedule 70 Contract Operations, was quoted
in a recent interview that GSA’s use of blockchain to automate and speed up
contracts review for its FAStLane program was — as far as he knew — the only
actual proof of concept of a blockchain enabled system in the federal government.
Read more
[FCW.COM]
75. Application Development
APIs: Why Managing APIs is Critical for Federal Agencies. Federal IT managers are
basically software-as-a-service providers and should be prepared to act that way.
Read more.
[NEXTGOV.COM]
COMMENT: Why is There So Much Customized Software in the Federal
Government? Former federal CIO Tony Scott writes, “During my tenure as federal
CIO in the Obama administration, one of the things that shocked me most was the
enormous amount of custom code that has been (and continues to be) written
over the years to support the federal government. Nearly everywhere I looked, I
found that regardless of how old or how new (from mainframe all the way to
modern cloud), the business applications of the federal government were
invariably (and quite alarmingly) almost always based on custom software
applications.” Read more.
[FCW.COM]
77. Big Data
AI: Artificial Intelligence Proves Major Time Savings for Federal Employees. While
AI isn’t a panacea for every big-data problem in government, agency leaders say
they see value in using machine learning to handle the most tedious aspects of
handling data, which frees up human operators to address more mission-critical
issues. Read more
[FEDERALNEWSRADIO.COM]
LOCAL GOVERNMENT: Virginia Beach Puts Big Data to Work as it Plans for Sea
Level Rise. As a result of tidal flooding and severe costal storms, sea levels in
Virginia Beach have risen nearly a foot over the past 58 years. City officials are
working with researchers, state and federal authorities to develop a response to the
frequent flooding problem. They plan to develop a hydrodynamic modeling system
by using data from sensors that measure water levels and wind speeds. Read more
[GCN.COM]
78. Big Data
ENVIRONMENT: After Big Data: The Coming Age of “Big Indicators”. Remote
sensing and big data allow us to collect unprecedented streams of observations
about our planet and our impacts upon it, and dramatic advances in AI enable us to
extract the deeper meaning and patterns contained in those vast data streams. The
rise of the cloud empowers anyone with an Internet connection to access and
interact with these insights, at a fraction of the traditional cost. In the years to
come, these technologies will shift much of the current conversation focused on big
data to one focused on “big indicators” — highly detailed, continuously produced,
global indicators that track change in the health of the Earth’s most important
systems, in real time. Read more.
[SSIR.ORG]
79. Big Data
OPINION: A.I. and Big Data Could Power a New War on Poverty. When it comes to
artificial intelligence and jobs, the prognostications are grim. The conventional
wisdom is that A.I. might soon put millions of people out of work — that it stands
poised to do to clerical and white collar workers over the next two decades what
mechanization did to factory workers over the past two. And that is to say nothing
of the truckers and taxi drivers who will find themselves unemployed or
underemployed as self-driving cars take over our roads. But it’s time we start
thinking about A.I.’s potential benefits for society as well as its drawbacks. The big-
data and A.I. revolutions could also help fight poverty and promote economic
stability. Read more.
[NYTIMES.COM]
81. Internet of Things (IoT)
BIG DATA: Blockchain And The Internet Of Things: 4 Important Benefits Of
Combining These Two Mega Trends. The Internet of Things (IoT) and blockchain are
two topics which are causing a great deal of hype and excitement, not just in the
technology circle but in the wider business world, too. Many say they are set to
revolutionize all aspects of our lives, while others point out that there is a lot of hot
air around both ideas, and a lot is yet to be proved. However, the idea that putting
them together could result in something even greater than the sum of its (not
insignificant) parts, is something which is starting to gain traction. Read more
[FORBES.COM]
82. Internet of Things (IoT)
BUSINESS: Why Should You Beware of ‘Internet of Things’? Baltimore Firm
Explains. The “internet of things” — any device other than your computer, laptop,
tablet or phone that’s connected to the internet — is a rapidly expanding
technology. It includes anything from your Fitbit to your thermostat, home security
system, even your refrigerator or your child’s teddy bear. The internet of things is
making our lives more productive and entertaining — and making our privacy more
vulnerable. Read more
[WTOP.COM]
IoT & CRIME: An Internet of Things ‘Crime Harvest’ is Coming Unless Security
Problems are Fixed. Internet of Things product manufacturers must get their act
together and secure their devices or they risk creating new ways for wrongdoers to
commit crimes, a senior police officer has warned. Read more.
[ZDNET.COM]
83. Internet of Things (IoT)
DATA MANAGEMENT: The Internet of Things: Still Lots for You to Learn. IT groups
will need to provide architecture, data-mining tools and connectivity, while giving
business groups the freedom to innovate on their own with the Internet of Things.
Read more.
[INFORMATIONWEEK.COM]
85. Mobile
ENTERPRISE: How Killing Net Neutrality Will Affect Enterprise Mobility. As the FCC
prepares to eliminate net neutrality rules, allowing ISPs to charge more for some
internet traffic based on speed of delivery, companies will have to rethink how
mobile apps are created and how they host content. Read more
[COMPUTERWORLD.COM]
FINANCIAL: Most Cryptocurrency Mobile Apps Are Vulnerable. Mobile
cryptocurrency app report finds that many apps are vulnerable to cybersecurity
threats after testing the Google Play Store’s Top 30 Financial apps. Read more.
[APPDEVELOPERMAGAZINE.COM]
86. Mobile
DIGITAL WORKSPACE: DOD Creates New Security Requirements for Mobile Apps.
The Defense Department has outlined baseline standards that mission-critical and
business mobile applications need to meet. Find out more
[FEDTECHMAGAZINE.COM]
LOCAL: App Brings SA Government Contract Leads to Local Bidders. A pair of U.S.
military veterans-turned-entrepreneurs in San Antonio are banking on big returns
from a app geared toward connecting small businesses with the government
procurement process — both for municipalities seeking bids from local companies
and for businesses looking to break into the market. Find out more
[BIZJOURNALS.COM]
88. Programming & Scripting Development
Client & Server-Side
JAVASCRIPT: State of JavaScript 2017. The State of JavaScript 2017 has released its
features and opinion survey results. The report was released last month with the
promise of adding more results in the coming weeks. The features section looks at
what features developers value the most. All features were considered nice to
have, but not important. Code splitting, hot module reloading, and dead code
elimination were voted as major features, with the percent of votes almost as high
in those sections as they were for nice-to-have features. Most developers agreed
with the statements presented to them in the opinions section, such as “JavaScript
is moving in the right direction” and “I enjoy building JavaScript apps.” The only
statement that developers did not agree with was “JavaScript is over-used online.”
Read more
[SDTIMES.COM]
89. Programming & Scripting Development
Client & Server-Side
HTML: What’s New in HTML5.2. The latest version of the core web specification
gets security, commerce, and accessibility improvements. Read more
[INFOWORLD.COM]
JAVA: Top 10 Java stories of 2017: Angular, Eclipse, ML, and more. Here’s a look at
some top stories from the whole of 2017, from Java to Eclipse, Angular to ML, and
more! Read more.
[JAXENTER.COM]
AI & ML: 3 Key Machine Learning Trends To Watch Out For In 2018. What’s in
store for AI and ML in 2018? Here are three key trends for 2018 that will take AI
and ML to the next level. Read more.
[FORBES.COM]
91. Cloud Computing
STRATEGY: Cloud Computing…Three Strategies for Making the Most of On-Demand.
The cloud computing tipping point will vary for different companies, which means
different approaches are needed. Read more
[ZDNET.COM]
SECURITY: Meltdown and Spectre Target Cloud Computing Environments. Hackers
could target cloud computing environments to exploit the Meltdown and Spectre
vulnerabilities, but AWS, Microsoft and Google say their fixes are enough to bar the
doors. Read more
[SEARCHCLOUDCOMPUTING.TECHTARGET.COM]
92. Cloud Computing
FEDERAL GOVERNMENT: DoD Reshuffles Panel Tasked with Speedy Adoption of
Cloud Computing. The panel of senior leaders the Defense Department appointed
to help speed up its adoption of cloud computing is undergoing notable changes to
its membership less than four months after it was first created. The Cloud Executive
Steering Group (CESG) will grow from five voting members to seven, but will no
longer be led by Ellen Lord, the undersecretary of Defense for acquisition,
technology and logistics, according to a memo signed by deputy Defense secretary
Patrick Shanahan last week. Lord had been the chairwoman of the board since its
inception on Sept. 13. Read more.
[FEDERALNEWSRADIO.COM]
93. Cloud Computing
PREDICTIONS: How Cloud Heavyweights Microsoft, Amazon And IBM Will
Transform Cloud Computing In 2018. While each of the three biggest and most-
influential cloud-computing vendors—Microsoft, Amazon and IBM—will pursue
markedly different strategies in 2018, their individual influences will coalesce
around several key initiatives that will radically reshape the cloud marketplace for
years to come. Those initiatives reflect the rapid—and welcome—evolution of the
cloud business away from the tech-obsessed and jargon-jammed discussions that
dominate the early days of emerging marketplaces, and toward the development of
more customer-centric products, services, positioning and messaging. Read more.
[FORBES.COM]
95. Announcement
Blue Mountain Data Systems DOL Contract Extended Another Six Months
The Department of Labor has extended Blue Mountain Data Systems Inc. contract
DOLOPS16C0017 for 6 months for network administration and application
support.
U.S. Dept. of Labor, Employee Benefits Security Administration
1994 to Present Responsible to the Office of Technology and Information Systems
for information systems architecture, planning, applications development,
networking, administration and IT security, supporting the enforcement of Title I
of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue
Mountain is responsible for design, development and support for its various
enforcement database management systems, as well as all case tracking and
customer service inquiry systems. Blue Mountain also provides IT security services
to the EBSA, in the form of FISMA Assessment and Authorization, System Security
Plans, Risk and vulnerability assessments, monitoring and investigation support.
97. IT Security | Cybersecurity
SECURITY: 5 Things You Need to Know About the Future of Cybersecurity. Terrorism
researchers, AI developers, government scientists, threat-intelligence specialists,
investors and startups gathered at the second annual WIRED conference to discuss
the changing face of online security. These are the people who are keeping you safe
online. Their discussions included Daesh’s media strategy, the rise of new forms of
online attacks, how to protect infrastructure, the threat of pandemics and the
dangers of hiring a nanny based on her Salvation Army uniform. Read more
[WIRED.CO.UK]
IT MANAGEMENT: Top 5 Cybersecurity Mistakes IT Leaders Make, and How to Fix
Them. Cybersecurity teams are largely understaffed and underskilled. Here’s how to
get the most out of your workers and keep your business safe. Read more.
[TECHREPUBLIC.COM]
98. IT Security | Cybersecurity
FEDERAL GOVERNMENT: Rep. Hurd Champions Modernizing Federal Cybersecurity.
The federal government is and will continue to be a target of cyber crimes.
According to the Identity Theft Resource Center, U.S. companies and government
agencies suffered a total of 1,093 data breaches in 2016. Mid-year numbers for 2017
show 791 incidents as of the end of June – a 29 percent increase over the same
period in 2016. With that said, is the government doing enough to prepare for cyber
threats? On this episode of CyberChat, host Sean Kelley, former Environmental
Protection Agency chief information security officer and former Veterans Affairs
Department deputy chief information officer, spoke with Rep. Will Hurd (R-Texas)
about initiatives to modernize the federal cybersecurity space. Read more
[FEDERALNEWSRADIO.COM]
99. IT Security | Cybersecurity
STATE GOVERNMENT: To Simplify Cybersecurity Regulations, State Groups Ask
Federal Government for Help. A letter to the Office of Management and Budget
says that today’s regulatory environment “hampers” states in their pursuit of cost
savings and IT optimization. Find out more
STATESCOOP.COM]
100. From the Blue Mountain Data Systems Blog
Programming & Scripting
https://www.bluemt.com/programming-scripting-daily-tech-update-september-
29-2017/
Cloud Computing
https://www.bluemt.com/cloud-computing-daily-tech-update-september-18-
2017/
Business Intelligence
https://www.bluemt.com/business-intelligence-daily-tech-update-september-15-
2017/
Mobile Applications
https://www.bluemt.com/mobile-applications-daily-tech-update-september-11-
2017/
101. From the Blue Mountain Data Systems Blog
Personal Tech
https://www.bluemt.com/personal-tech-daily-tech-update-september-28-2017/
Databases
https://www.bluemt.com/databases-daily-tech-update-september-21-2017/
Penetration Testing
https://www.bluemt.com/penetration-testing-daily-tech-update-september-26-
2017/
Incident Response
https://www.bluemt.com/incident-response-daily-tech-update-september-14-
2017/
102. From the Blue Mountain Data Systems Blog
Security Patches
https://www.bluemt.com/security-patches-daily-tech-update-september-22-
2017/
Operating Systems
https://www.bluemt.com/operating-systems-daily-tech-update-september-20-
2017/
Encryption
https://www.bluemt.com/encryption-daily-tech-update-september-19-2017/
Cloud Computing
https://www.bluemt.com/cloud-computing-daily-tech-update-september-18-
2017/
103. From the Blue Mountain Data Systems Blog
Open Source
https://www.bluemt.com/programming-scripting-daily-tech-update-september-
5-2017/
CTO, CIO and CISO
https://www.bluemt.com/cio-cto-ciso-daily-tech-update-september-6-2017/
Programming & Scripting
https://www.bluemt.com/programming-scripting-daily-tech-update-september-
5-2017/
104. From the Blue Mountain Data Systems Blog
Security Risks Most Prevalent in Younger Workers
https://www.bluemt.com/security-risks-most-prevalent-in-younger-workers/
The Security World’s Maturation
https://www.bluemt.com/the-security-worlds-maturation/
Data Breach Concerns Keep CISOs Up At Night
https://www.bluemt.com/data-breach-concerns-keep-cisos-up-at-night/
Personalized Govt Equals Instant Gratification for Citizens
https://www.bluemt.com/personalized-govt-equals-instant-gratification-for-
citizens/
105. From the Blue Mountain Data Systems Blog
People-Centric Security
https://www.bluemt.com/people-centric-security/
Pentagon Tries BYOD To Strike Work/Life Balance
https://www.bluemt.com/pentagon-tries-byod-to-strike-worklife-balance/
Open Source Model Considered for MS Windows
https://www.bluemt.com/open-source-model-considered-for-ms-windows/
Open Internet: To Be or Not to Be?
https://www.bluemt.com/open-internet-to-be-or-not-to-be/
106. From the Blue Mountain Data Systems Blog
Malware Stays A Step Ahead Infecting One Third of Websites
https://www.bluemt.com/malware-stays-a-step-ahead-infecting-one-third-of-
websites/
Machine-Generated Data: Potential Goldmine for the CIO
https://www.bluemt.com/machine-generated-data-potential-goldmine-for-the-
cio/
Government Legacy Programs: Reuse vs. Replacement
https://www.bluemt.com/government-legacy-programs-reuse-vs-replacement/
It Takes a Whole Village to Protect Networks and Systems
https://www.bluemt.com/it-takes-a-whole-village-to-protect-networks-and-
systems/
107. From the Blue Mountain Data Systems Blog
Governance For the CIO
https://www.bluemt.com/governance-for-the-cio/
Help Desk Consolidation – Lessons Learned
https://www.bluemt.com/help-desk-consolidation-lessons-learned/
One Year Later, Companies Still Vulnerable to Heartbleed
https://www.bluemt.com/one-year-later-companies-still-vulnerable-to-
heartbleed/
Federal Projects Cultivate Worker Passion
https://www.bluemt.com/federal-projects-cultivate-worker-passion-2/
108. ABOUT US
Blue Mountain Data Systems Inc.
Blue Mountain Data Systems Inc. is dedicated to application
and systems development, electronic document management,
IT security support, and the automation of workflow processes.
Read more about our experience here:
>> http://bluemt.com/experience
109. Recent Experience
U.S. Dept. of Labor
Employee Benefits Security Administration
1994 to Present
Responsible to the Office of Technology and Information Systems for information
systems architecture, planning, applications development, networking,
administration and IT security, supporting the enforcement of Title I of the
Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue
Mountain is responsible for design, development and support for its various
enforcement database management systems, as well as all case tracking and
customer service inquiry systems. Blue Mountain also provides IT security services
to the EBSA, in the form of FISMA Assessment and Authorization, System Security
Plans, Risk and vulnerability assessments, monitoring and investigation support.
110. MANAGEMENT
Paul T. Vesely
Founder, President, CEO and Principal Architect
Mr. Vesely is a recognized thought leader in systems
architecture and delivery, having designed and
delivered many enterprise wide information and
document management solutions. Mr. Vesely’s history
includes 33 years experience in the information
systems industry, with Unisys, Grumman, PRC and a
host of clients in both government and private sectors.
111. CONTACT US
Contact Us Today to Discuss Your Next IT Project
HEADQUARTERS
366 Victory Drive
Herndon, VA 20170
PHONE 703-502-3416
FAX 703-745-9110
EMAIL
paul@bluemt.com
WEB
https://www.bluemt.com