Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Tech Update 
Summary 
from 
Blue Mountain 
Data Systems 
November 2014
For CTOs, CIOs & CISOs 
Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the B...
For the CTO, CIO & CISO 
SURVEY SAYS: According to a recent survey conducted by Verizon 
Communications, more CIOs, embold...
For the CTO, CIO & CISO 
FOR THE CIO: 5 ways to deal with shadow IT. With every cloud there might be a 
silver lining, but...
For the CTO, CIO & CISO 
ONLINE CHAT: Ask the CIO with FEMA’s Adrian Gardner, the chief information 
officer at the Federa...
For the CTO, CIO & CISO 
PROJECT MANAGEMENT APPS: How three popular picks stack up – Trello, Asana 
and Smartsheet. Read m...
For the CTO, CIO & CISO 
GOOGLE: How Google Sold Its Engineers on Management. Since the early days of 
Google, people thro...
For the CTO, CIO & CISO 
SELF-REPAIRING SOFTWARE: CTOs should know about this. University of Utah 
computer scientists hav...
For the CTO, CIO & CISO 
LokiJS: A lightweight JavaScript document-oriented, in-memory database. LokiJS 
supports field in...
For the CTO, CIO & CISO 
REALITY CHECK: IT spending reality check: 2014’s mixed message. Tech budgets 
and hiring are down...
Healthcare IT 
BREACHES: The healthcare & electric power industries share many of the same 
security issues as enterprises...
Programming & Scripting Development 
Client & Server-Side 
FIREBASE: Google recently announced the acquisition of Firebase...
Programming & Scripting Development 
Client & Server-Side 
POSSIBILITIES: AngularJS, HTML5, Groovy, Java and MongoDB All T...
Programming & Scripting Development 
Client & Server-Side 
HTML5: What is important to learn when deploying a single app p...
Programming & Scripting Development 
Client & Server-Side 
JQUERY VALIDATION PLUGIN: This jQuery plugin comes bundled with...
Programming & Scripting Development 
Client & Server-Side 
JAVA: The Eclipse Foundation is launching a free Java stack for...
Programming & Scripting Development 
Client & Server-Side 
ANGULARJS CHEAT SHEET: AngularJS WGW (What Goes Where) guide fr...
Cloud 
ASK YOURSELF: Is it Time to Move Your Databases to the Cloud? Faster time to 
market increasingly drives firms of a...
Cloud 
SUCCESSFUL CLOUD INITIATIVES: NIST puts a sharper point on cloud 
computing. National Institute of Standards & Tech...
Cloud 
APPLE: Apple extends two-factor authentication to iCloud. It has enabled two-factor 
authentication for its iCloud ...
Cloud 
CLOUD STORAGE: 11 Classic Cloud Storage Mistakes. More than ever, CIOs and 
other IT decision-makers are opting for...
Cloud 
MICROSOFT AZURE: DocumentDB: Customer Test Drive – Microsoft NoSQL 
database (and MongoDB competitor) gets a trial ...
Open Source 
SOFTWARE DEVELOPMENT: Why all software needs a license. All software 
developers should add a copyright licen...
Open Source 
MICROSOFT: We shall set you FREE across ALL PLATFORMS. Microsoft, fixin’ to broaden 
the appeal of its .Net s...
Big Data 
ZERO-TRUST MODEL: Network security needs big data. As the inadequacies of 
perimeter-centric defenses become cle...
Federal Agencies 
HEALTHCARE OPEN ENROLLMENT: The healthcare open enrollment period 
starts soon (November 15th) at Health...
Federal Agencies 
POST OFFICE HACK: Postal Service Discloses Major Theft of Its Employees’ 
Personal Data. The Postal Serv...
Federal Agencies 
VETERAN AFFAIRS: VA reorg could further centralize IT. The “Road to Veterans 
Day” initiative, the revie...
Federal Agencies 
NGA: The National Geospatial Intelligence Agency is taking advantage of open 
source and crowdsourcing t...
Federal Agencies 
NTSB & FAA: The federal government is celebrating a big win against the 
emerging drone industry. The Na...
Federal Agencies 
FCC: Delays Net Neutrality Rules Until 2015. The Federal Communications 
Commission will not vote on new...
Federal Agencies 
SOCIAL SECURITY ADMINISTRATION: Retiring? Boston University economist Larry 
Kotlikoff wants to tell you...
Federal Agencies 
FCC: Expects To Be Sued Over Net Neutrality No Matter What It Does. In 2010, 
the FCC enacted net neutra...
Federal Agencies 
CALIFORNIA: Program transforms California inmates into software coders. The 
nonprofit that developed th...
IT - State & Local Governments 
VA, ND & LA: How $190 million will expand broadband in rural communities. 
Federal grants ...
IT Security | Cybersecurity 
CONTINUOUS MONITORING OF ENTERPRISE ASSETS: Commerce Department, 
Nuclear Regulatory Commissi...
IT Security | Cybersecurity 
MALWARE: ‘Dridex’ malware brings back Microsoft Word macro attacks. Macro 
attacks fell out o...
IT Security | Cybersecurity 
HOME DEPOT HACK: Home Depot lost 53 million email addresses (this POS 
story isn’t getting an...
IT Security | Cybersecurity 
CLOUD: Protecting the Perimeter From the Cloud…Defending Against Hackers 
Who Automate Monito...
IT Security | Cybersecurity 
DARK WEB SITES: ‘Dark’ Network of Illegal Websites Targeted by U.S. and 
European Police. An ...
IT Security | Cybersecurity 
APPLE VULNERABILITY: The U.S. government warned iPhone and iPad users to be 
on the alert for...
IT Security | Cybersecurity 
HOW DO YOU KNOW: When your computer is infected? Unfortunately, there is no 
particular way t...
IT Security | Cybersecurity 
BIG DATA CAN SAVE THE DAY: Big Data as Superhero: Fighting Crime and Boosting 
Security. The ...
IT Security | Cybersecurity 
APPLE RESPONDS TO MASQUE ATTACK: Apple responds to that scary-sounding 
Masque Attack: Heed w...
IT Security | Cybersecurity 
SECURITY: Don’t Rush the Security Breach Notification Timeline. Despite the 
expectation to r...
IT Security | Cybersecurity 
GOOGLE APPS: Users Gain More Control of Account Security. A new device and 
activity dashboar...
IT Security | Cybersecurity 
JAVA: Java Reflection API Woes Resurface in Latest Oracle Patches. Problems with 
the maligne...
IT Security | Cybersecurity 
OCTOBER PATCH TUESDAY: Microsoft updates Windows, IE, Office in busy Patch 
Tuesday. A total ...
IT Security | Cybersecurity 
WINDOWS HACK: Russian hackers used a bug in Microsoft Windows to spy on 
several Western gove...
IT Security | Cybersecurity 
FROM ISIS TO FISMA: Conversation with Jim Lewis on Terror Cyberthreat, Stalled 
Cyber Legisla...
IT Security | Cybersecurity 
MAKE NOTE: FBI Director James B. Comey sharply criticized Apple and Google on 
Thursday for d...
IT Security | Cybersecurity 
WINDOWS: Shellshock-like Weakness May Affect Windows. As more people dig 
into the severity a...
IT Security | Cybersecurity 
NATIONAL CYBER SECURITY AWARENESS MONTH: Why Cyber Security Matters To 
Everyone. October is ...
Web Development 
ACCESSIBLE VIDEOS: 508 Accessible Videos—Why (and How) to Make Them. 
Making Web content and video access...
Application Development 
ANDROID: How to Tell if An Android App is Potentially Dangerous. Google doesn’t 
manually approve...
Application Development 
ASYNC: Unit Testing Asynchronous Code. Unit testing is a cornerstone of modern 
development. The ...
Application Development 
SWIFT: Why Apple’s Swift programming language is a diamond in the rough. Swift 
development langu...
Application Development 
AURORA MySQL : Amazon announces new code tools, Aurora MySQL database 
engine at AWS re:Invent. A...
Application Development 
2014 PREDICTIONS: 15 hot programming trends — and 15 going cold — reported in 
early 2014. In you...
From the Blue Mountain Blog 
SECURITY BREACHES: After-Hours Inspection Finds Security Issues at GSA’s Open 
Office. Read m...
From the Blue Mountain Blog 
WEARABLE TECHNOLOGY: DHS' Tech Vision for the Next Generation First 
Responder. Read more 
[B...
From the Blue Mountain Blog 
DATA LINKS: Unsecured File Sharing – Agencies Behaving Badly. Read more 
[BLUEMT.COM] 
SECURI...
From the Blue Mountain Blog 
SECURITY: A Software Upgrade for Biometrics. Read more 
[BLUEMT.COM] 
SURVEY: FYI: Americans ...
ABOUT US 
Blue Mountain Data Systems Inc. 
Blue Mountain Data Systems Inc. is dedicated to application 
and systems develo...
MANAGEMENT 
Paul T. Vesely 
Founder, President, CEO and Principal Architect 
Mr. Vesely is a recognized thought leader in ...
CONTACT US 
Contact Us Today to Discuss Your Next IT Project 
HEADQUARTERS 
366 Victory Drive 
Herndon, VA 20170 
PHONE 70...
Upcoming SlideShare
Loading in …5
×

Tech Update Summary from Blue Mountain Data Systems November 2014

541 views

Published on

For CTOs, CIOs & CISOs Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue Mountain Data Systems Blog. We hope you will visit our blog for the latest information >> https://bluemt.com/blog/

Published in: Technology
  • how to lose belly fat in 2 weeks without exercise-lose weight naturally ★★★ https://tinyurl.com/bkfitness4u
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

Tech Update Summary from Blue Mountain Data Systems November 2014

  1. 1. Tech Update Summary from Blue Mountain Data Systems November 2014
  2. 2. For CTOs, CIOs & CISOs Every business day, we publish a Daily Tech Update for Federal & State CTOs ,CIOs & CISOs on the Blue Mountain Data Systems Blog. We hope you will visit our blog for the latest information. You can also receive these updates via email. Click here to subscribe. Here’s the summary of the Daily Tech Updates for November 2014. Hope the information and ideas prove useful. Best, Paul Vesely President and Principal Architect Blue Mountain Data Systems Inc.
  3. 3. For the CTO, CIO & CISO SURVEY SAYS: According to a recent survey conducted by Verizon Communications, more CIOs, emboldened by stronger internal processes and a maturing market for rented software, are working with their business peers to select cloud technology. Why? Credit shadow IT with helping triggering this shift, with CIOs realizing they’d better become proactive in choosing cloud services before the business beats them to it. Read now [BLOGS.WSJ.COM] CLOUD COMPUTING: A recent survey reports that employees are bypassing company policy on website and technology usage. This means that cloud security is “stormy”. More than half (55%) of the 1,864 IT and IT security practitioners surveyed admitted they were “not confident” that IT knows all the cloud computing services in use at their company. Read now [CLOUDCOMPUTING-NEWS.NET]
  4. 4. For the CTO, CIO & CISO FOR THE CIO: 5 ways to deal with shadow IT. With every cloud there might be a silver lining, but as many CIOs are discovering, ICT in the cloud has its shadow too. Read now [INFORMATION-AGE.COM] WHY THEY LEAVE: This is why people are leaving your organization. If you have a high turnover rate, here’s how to recognize the reasons why–and turn it around. Read more [FASTCOMPANY.COM] HOW TO GET THEM TO STAY: If you are consistently losing your tech staff, you may sacrifice more than money. You are risking customer satisfaction, business knowledge, and team morale. Here are 16 ways to retain technical staff. Read more [FASTCOMPANY.COM]
  5. 5. For the CTO, CIO & CISO ONLINE CHAT: Ask the CIO with FEMA’s Adrian Gardner, the chief information officer at the Federal Emergency Management Agency, joins Federal News Radio for a free online chat. DATE: Today, Thursday, Nov. 6, 2014. TIME: 3 – 3:30 p.m. Sign up now [FEDERALNEWSRADIO.COM] ENTERPRISE: What CIOs need to know about procurement systems. Inefficient procurement tools cost businesses in North America more than $1.5 billion annually and waste 32 million work hours, according to a new survey by cloud provider SciQuest. It found that only 28 percent of sourcing procurement professionals believe their procurement system increases productivity. The study recommends five rules to bridge a “massive productivity gap eating away at bottom lines. Sign up now [CIOINSIGHT.COM]
  6. 6. For the CTO, CIO & CISO PROJECT MANAGEMENT APPS: How three popular picks stack up – Trello, Asana and Smartsheet. Read more [PCWORLD.COM] OPEN SOURCE: Taiga, a new open source project management tool with focus on usability. Read more [OPENSOURCE.COM] 2015 HIRING OUTLOOK: 2015 IT Career Outlook: New Job Roles for IT. Discover the six critical IT roles that organizations will need to stay competitive in 2015 and beyond. Read more [BLUEMT.COM]
  7. 7. For the CTO, CIO & CISO GOOGLE: How Google Sold Its Engineers on Management. Since the early days of Google, people throughout the company have questioned the value of managers. That skepticism stems from a highly technocratic culture. So here’s the challenge Google faced: If your highly skilled, handpicked hires don’t value management, how can you run the place effectively? How do you turn doubters into believers, persuading them to spend time managing others? As it turns out, by applying the same analytical rigor and tools that you used to hire them in the first place-and that they set such store by in their own work. Read more [HBR.COM] NoSQL & THE CIO: The Weather Company CIO Bryson Koehler sorts out the traits of MongoDB, Riak, and Cassandra. Best of all, he says, ‘NoSQL doesn’t lock you in.’ Read more [INFORMATIONWEEK.COM]
  8. 8. For the CTO, CIO & CISO SELF-REPAIRING SOFTWARE: CTOs should know about this. University of Utah computer scientists have developed software that not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them. The software then prevents the invader from ever infecting the computer again. Read more [NEWSWISE.COM] SOCIAL SOFTWARE & THE CIO: CIOs Use Social Software to Help the Help Desk. CIOs are turning to employee-curated social software to manage the corporate knowledge-base, an asset long obscured and often rendered useless by outdated information and even poorer performing search tools. Read more [BLOGS.WSJ.COM]
  9. 9. For the CTO, CIO & CISO LokiJS: A lightweight JavaScript document-oriented, in-memory database. LokiJS supports field indexing for faster document access and performs at near 500,000 ops/s on those. Its built-in DynamicView class also enables to utilize indexes on data subsets for even faster performance. Read more [I-PROGRAMMER.INFO] HTML5: Its “Dirty Little Secret” – It’s Already Everywhere, Even In Mobile. Just look under the hood, says EmberJS co-founder Tom Dale. Find out more [READWRITE.COM]
  10. 10. For the CTO, CIO & CISO REALITY CHECK: IT spending reality check: 2014’s mixed message. Tech budgets and hiring are down from earlier optimistic projections, but IT’s confidence is holding steady. Read more [INFOWORLD.COM] PROJECT MANAGEMENT APPS: Projects and people differ, and so should project management apps. Compared to the biggest project management apps available, Zoho, Podio and LiquidPlanner tackle tasks in unique ways. Read more [PCWORLD.COM]
  11. 11. Healthcare IT BREACHES: The healthcare & electric power industries share many of the same security issues as enterprises. But they also have a risk profile that makes them singularly unprepared for sophisticated threats. Read now [DARKREADING.COM] MANAGEMENT: How to search for qualified healthcare IT security personnel. Finding qualified healthcare security personnel remains a challenge in an industry where new threats make protecting patient data more complex by the day. Read more [HEALTHITSECURITY.COM]
  12. 12. Programming & Scripting Development Client & Server-Side FIREBASE: Google recently announced the acquisition of Firebase, a back-end-as-a-service (BaaS) provider that supports real-time synchronization. One of Firebase’s most attractive features is its integration with AngularJS, an open source JavaScript framework sponsored by Google that includes MVC, or model-view-control capability. Read more [PROGRAMMABLEWEB.COM] WEB TOOLS: Why Web Tools Like AngularJS Need To Keep Breaking Themselves. Backward compatibility may be a casualty of Internet speed. Read now [READWRITE.COM] ANGULARDART: The Angular team has released AngularDart 1.0, a port of the AngularJS framework for the Dart language. It is inspired in AngularJS’ features such as directives, data binding, and dependency injection while taking advantage of some of Dart’s features like metadata, types, and classes. AngularDart is also the first version of Angular built on emerging web standards like Shadow DOM. Read now [INFOQ.COM]
  13. 13. Programming & Scripting Development Client & Server-Side POSSIBILITIES: AngularJS, HTML5, Groovy, Java and MongoDB All Together: What Could Possibly Go Wrong? Read now [JAVA.DZONE.COM] AMAZON WEB SERVICES: Why Amazon’s new Lambda cloud service is a huge deal for devs – and the cloud market. Instead of configuring and maintaining virtual-server infrastructure, developers give Amazon instructions or rules to carry out when certain things happen. Read more [VENTUREBEAT.COM] MICROSOFT: Open-sources .Net server-side cloud stack. The company is embarking on a broad-based strategy for mobile and cloud development, including major upgrades to Visual Studio. Read more [INFOWORLD.COM]
  14. 14. Programming & Scripting Development Client & Server-Side HTML5: What is important to learn when deploying a single app platform in HTML5. One app platform or many, the choice is yours, but this IT team saved a large amount of time and avoided considerable frustration by eliminating the silo effect of multiple app versions that could not interact. Read more [SDTIMES.COM] SASS: Sass is a mature, stable, and powerful professional grade CSS extension language. There are an endless number of frameworks built with Sass. Compass, Bourbon, and Susy just to name a few. Read more [SASS-LANG.COM] ANGULARJS & JAVA 8: trackr: An AngularJS app with a Java 8 backend – Part I. Read more [BLOG.TECHDEV.DE]
  15. 15. Programming & Scripting Development Client & Server-Side JQUERY VALIDATION PLUGIN: This jQuery plugin comes bundled with a useful set of validation methods, including URL and email validation, while providing an API to write your own methods. All bundled methods come with default error messages in english and translations into 37 other languages. Read more [JQUERYVALIDATION.ORG] PHP: One year timeline determined for the delivery of PHP 7.0, with a projected release date of November 2015. Read more [WIKI.PHP.NET] C# & VISUAL BASIC: Microsoft with its Roslyn .Net compiler project is getting ready to upgrade its C# and Visual Basic languages. Read now [INFOWORLD.COM]
  16. 16. Programming & Scripting Development Client & Server-Side JAVA: The Eclipse Foundation is launching a free Java stack for IoT called Open IoT Stack for Java. It’s an open-source development platform for consumer and enterprise IoT systems that supports three major standards: MQTT, CoAP and Lightweight M2M. Read now [COMPUTERWORLD.COM] RUBY ON RAILS: Why Ruby Is the Crown Jewel in a Developer’s Resume. Demand for Ruby on Rails talent continues at a steady pace, and developers with the skills and knowledge of this language are red-hot in a tight IT job market. Read now [CIO.COM] HTML5 & JAVASCRIPT & JAVA: DukeScript brings Java to HTML5, JavaScript. DukeScript, its name derived from Duke, the Java mascot, gives Java developers a way to build HTML5 and JavaScript applications within the comfort of the Java language. Read now [JAVAWORLD.COM]
  17. 17. Programming & Scripting Development Client & Server-Side ANGULARJS CHEAT SHEET: AngularJS WGW (What Goes Where) guide from Dmitri Moore, a full stack programmer. Determine “where stuff should really go.” Read more [DEMISX.GITHUB.IO] TUTORIAL: AngularJS Tutorial: A Comprehensive 10,000 Word Guide from Todd Motto, a Google Developer Expert, Lead Front-End Engineer at Appsbroker and open source evangelist. Read more [AIRPAIR.COM] FREE ONLINE TOOLS: Visit Text-Utils.com for online tools to help you format programming languages and other text handling tasks, such as remove duplicate characters, empty lines, text sorter and much more. Go there [TEXT-UTILS.COM]
  18. 18. Cloud ASK YOURSELF: Is it Time to Move Your Databases to the Cloud? Faster time to market increasingly drives firms of all sizes to move their databases to the cloud. Options range from managed services to more of a databases-as-a-service. Even companies used to rolling their own technology solutions are drawn to cloud databases. Read now [CIO.COM] TRANSFORMATION: Three Companies That Transformed Their Businesses Using Cloud Computing. What do an insurance company, grocery chain and educational service have in common? This may sound like the opening question to a riddle, but the answer is serious business. They’re all using the cloud. Read now [FORBES.COM] DO THE MATH: The true cost of cloud computing. And show your work — otherwise, hidden and overlooked expenses can overwhelm your cloud computing budget. Read more [INFOWORLD.COM]
  19. 19. Cloud SUCCESSFUL CLOUD INITIATIVES: NIST puts a sharper point on cloud computing. National Institute of Standards & Technology issues 10 key recommendations for successful cloud initiatives. Read more [ZDNET.COM] ISO STANDARDS FOR CLOUD: It’s pointless to define cloud computing. ISO joins the list of organizations looking to define cloud computing for the industry — but it doesn’t matter. Read more [INFOWORLD.COM] iCLOUD PASSWORDS: In an effort to increase the security level of iCloud accounts, Apple is now requiring app-specific passwords for some third-party apps. Read more [CNET.COM]
  20. 20. Cloud APPLE: Apple extends two-factor authentication to iCloud. It has enabled two-factor authentication for its iCloud storage service, more than a year and a half after the company first turned the protective measure on for iTunes purchases and Apple ID. Read more [THREATPOST.COM] AMAZON: HP builds load testing service on Amazon Web Services Cloud. Hewlett Packard has announced StormRunner, a new solution that provides a cloud-based platform for application quality testing and delivery. Read more [DATACENTERKNOWLEDGE.COM] MICROSOFT: Adds 3D printing via cloud to application, allowing creation and printing of 3D objects with unconventional materials such as metals and ceramics. Users of Microsoft’s 3D Builder application will be able to create 3D models, get them printed remotely, and then get the end product delivered to their doorstep. Read more [PCWORLD.COM]
  21. 21. Cloud CLOUD STORAGE: 11 Classic Cloud Storage Mistakes. More than ever, CIOs and other IT decision-makers are opting for a cloud model to accommodate their storage needs. Yet there are many missteps which can make for a shaky cloud transition. Read now [CIOINSIGHT.COM] TECH TRENDS: Cloud computing is one of the 10 strategic technology trends for 2015, according to analysis from Gartner. Read now [CLOUDCOMPUTING-NEWS.NET] CLOUD STRATEGY: FedRAMP, Akamai, and Microsoft: Better together. Multiplying the value of its cloud strategy must be at the top of the list for every Federal agency today. Agencies should explore the FedRAMP JAB-certified Akamai Content Delivery Network and Microsoft’s FedRAMP-certified Azure cloud solution, both of which remain unique in their achievement of the FedRAMP JAB’s highest certification. Read now [MICROSOFT.COM]
  22. 22. Cloud MICROSOFT AZURE: DocumentDB: Customer Test Drive – Microsoft NoSQL database (and MongoDB competitor) gets a trial run at Xomni. So far, so good, but search options and SDK “need work.” Read now [INFORMATIONWEEK.COM] ENTERPRISE APPS: Most enterprise business customers today face a plethora of challenges in order to migrate their massive applications to the cloud environment. There are three essential reasons put forth for why customers should migrate their current applications to a public, private or hybrid cloud environment. Read now [CLOUDTIMES.COM] NINE BEST PRACTICES FOR CLOUD IMPLEMENTATION: 84 percent of CIOs say they’ve cut costs by moving applications to the cloud, and these applications deliver an average of 70 percent more ROI than on-premise ones. Read how [CIOINSIGHT.COM]
  23. 23. Open Source SOFTWARE DEVELOPMENT: Why all software needs a license. All software developers should add a copyright license. Why? Because open source licensing is all about granting permission in advance. Read more [INFOWORLD.COM] MySQL: Why the open source database is better off under Oracle. Oracle’s stewardship has been good for the MySQL database argues Percona CEO Peter Zaitsev. Read more [OPENSOURCE.COM] SOFTWARE DESIGN: Attacks on open source call for better software design. Another day, another major vulnerability for government systems, it seems. This time it affects Drupal, a popular, open source content management system that’s been used for an increasing number of agency websites, including the White House. Read more [GCN.COM]
  24. 24. Open Source MICROSOFT: We shall set you FREE across ALL PLATFORMS. Microsoft, fixin’ to broaden the appeal of its .Net software development platform, has committed to delivering a new version of the toolset that is not only language agnostic but also cross-platform and entirely open source. Read more [THE REGIS TER.CO.UK]
  25. 25. Big Data ZERO-TRUST MODEL: Network security needs big data. As the inadequacies of perimeter-centric defenses become clearer, the zero-trust model grows more appealing. As for ZTM, it will need big data to succeed. This aggressive approach to network security monitors every piece of data possible, under the assumption that every file is a potential threat. Find out more [COMPUTERWORLD.COM] PROJECT SUCCESS: Five ways to make your project a success. Big data is a big deal, but how do you get started and get it right? Here’s some advice from IT experts working on successful projects. Find out more [ZDNET.COM]
  26. 26. Federal Agencies HEALTHCARE OPEN ENROLLMENT: The healthcare open enrollment period starts soon (November 15th) at Healthcare.gov – and lasts until February 15, 2015. Read more [BLOG.USA.GOV.COM] CYBER ATTACKS: Federal government struggles against cyberattacks. A $10 billion-a-year effort to protect sensitive government data, from military secrets to Social Security numbers, is struggling to keep pace with an increasing number of cyberattacks and is unwittingly being undermined by federal employees and contractors. Read more [FEDERALNEWSRADIO.COM]
  27. 27. Federal Agencies POST OFFICE HACK: Postal Service Discloses Major Theft of Its Employees’ Personal Data. The Postal Service on Monday became the latest government agency to announce a major theft of data from its computer systems, telling its roughly 800,000 employees and retirees that an attack “potentially compromised” databases containing postal employees’ names, birth dates, addresses and Social Security numbers. Read more [NYTIMES.COM] FEDRAMP: The FedRamp Security Assessment Test Case Workbook has been updated to reflect significant changes to baseline control descriptions, enhancements and associated test procedures accordingly to NIST SP 800-53 Revision 4. Read more [CLOUD.CIO.GOV]
  28. 28. Federal Agencies VETERAN AFFAIRS: VA reorg could further centralize IT. The “Road to Veterans Day” initiative, the review of department practices and policies by Secretary Robert McDonald, promises improvements to customer service, and a vet-focused organizational structure called “My VA.” The goals are to rebuild trust, improve service delivery, and set a course for long term reforms. Read more [FCW.COM] HOUSE: Management to Be a Focus in House. The House Republican leadership plans to continue a focus on agency management in the new Congress that convenes in January, according to a planning document that cites “government competency” as a major issue to be addressed through oversight hearings and legislation. Find out more [FEDWEEK.COM]
  29. 29. Federal Agencies NGA: The National Geospatial Intelligence Agency is taking advantage of open source and crowdsourcing through the GitHub platform to help it develop apps across 16 different topics ranging from an anti-piracy to a request for information generator for geospatial analysts. GitHub is an open source platform that provides registered users the opportunity to suggest changes to software in a collaborative process. Read more [FEDERALNEWSRADIO.COM] OPM: According to the Office of Personnel Management, nearly two-thirds of government’s career senior executives will be eligible to retire by 2016, and similar trends can be seen throughout the federal workforce. In the face of these challenges, a new approach to hiring and onboarding is necessary to help reduce turnover and fill open positions quickly and efficiently. By applying talent science principles and technology to human capital management processes, agencies can create a completely new model to choose the right employee for the right job. Read more [FCW.COM]
  30. 30. Federal Agencies NTSB & FAA: The federal government is celebrating a big win against the emerging drone industry. The National Transportation Safety Board ruled the agency is allowed to regulate the controversial aircraft. But, it’s what else the FAA said this week that has every aircraft operator up in arms. Read more [NBC-2.COM] FEDERAL RESERVE: The U.S. Federal Reserve has launched a review of how it oversees major banks, calling on its inspector general to help with the probe after a series of critical reports. Separate studies to be undertaken by the Fed’s Washington-based Board of Governors and its Office of Inspector General are meant to ensure that “divergent views” about the state of large banks are adequately aired. Read more [REUTERS.COM]
  31. 31. Federal Agencies FCC: Delays Net Neutrality Rules Until 2015. The Federal Communications Commission will not vote on new net neutrality rules before 2015, with commission Chairman Tom Wheeler caught between the wishes of President Barack Obama and Internet providers like Comcast on how the agency can best ensure all Web traffic is treated equally. Read more [USNEWS.COM] OPINION: What’s the FCC to do? According to writer Gene Marks, “Netflix and YouTube now consume 50% of the Internet.” Is the argument for Net Neutrality weakening? Read more [FORBES.COM] ADVICE FOR THE FEDERAL CIO: Five winning strategies of successful CIOs. With so many competing demands how do tech chiefs know what to focus on and when? Here are five ways CIOs can help make the right choices. Read more [ZDNET.COM]
  32. 32. Federal Agencies SOCIAL SECURITY ADMINISTRATION: Retiring? Boston University economist Larry Kotlikoff wants to tell you how to get an extra month of Social Security benefits for free. Read more [PBS.ORG] FAA: Drone Rules Are Too Narrow, But They’re Better Than Nothing. If you’re a drone pilot—or one of many drone entrepreneurs—the good news is that it may soon be legal to fly unmanned aerial vehicles for commercial purposes. The bad news is that the FAA rules may be much more strict than most drone aficionados hoped. Read more [WIRED.COM]
  33. 33. Federal Agencies FCC: Expects To Be Sued Over Net Neutrality No Matter What It Does. In 2010, the FCC enacted net neutrality rules aimed to prevent Internet service providers from blocking, slowing down, or speeding up access to websites based on how much they pay — and the agency was sued by Verizon for overstepping its authority. Now that the FCC is reconsidering those rules to either make them weaker or possibly reclassify ISPs so that the agency can enforce neutrality. But no matter how it moves forward, the agency expects to be sued. Read more [CONSUMERIST.COM]
  34. 34. Federal Agencies CALIFORNIA: Program transforms California inmates into software coders. The nonprofit that developed the six-month program says it could be a model for other states and a solution to address California’s growing prison population. Dubbed Code.7370, the program may be one solution to address California’s growing prison population and its high rate of recidivism. Inmates in the San Quentin State Prison are taught the skills they need to work as entry-level web developers. Read more [STATETECHMAGAZINE.COM]
  35. 35. IT - State & Local Governments VA, ND & LA: How $190 million will expand broadband in rural communities. Federal grants and loans will go to 19 states to support more than two dozen telecommunications projects. Read more [STATETECHMAGAZINE.COM]
  36. 36. IT Security | Cybersecurity CONTINUOUS MONITORING OF ENTERPRISE ASSETS: Commerce Department, Nuclear Regulatory Commission and other Agencies put continuous monitoring into action as they work toward a comprehensive cybersecurity strategy. Read now [FEDTECHMAGAZINE.COM] PEOPLE & SECURITY: In security, people are the weakest link. CIOs must therefore educate and empower employees to understand the risks and make better security decisions — and executives must lead by example. Read now [CNET.COM] CYBER SECURITY: Security awareness can’t be just a one off. Initiatives such as the US’ National Cyber Security Awareness Month are all well and good, but day-to-day attitudes must change too. Read more [ITPRO.CO.UK]
  37. 37. IT Security | Cybersecurity MALWARE: ‘Dridex’ malware brings back Microsoft Word macro attacks. Macro attacks fell out of favor for a while but are coming back. It’s malware that aims to steal your online banking credentials…reviving a decade-old technique to install itself on your PC. Read more [COMPUTERWORLD.COM] FISMA REFORM: The House and Senate have hit a road bump trying to update a 2002 law that collects binders of paper once a year, as a way of monitoring federal computer security. Folding an overhaul of the Federal Information Security Management Act, or FISMA, into an annual must-pass defense law is one possibility for swift enactment, a congressional aide said. But other sources familiar with negotiations say inclusion of FISMA in the 2015 National Defense Authorization Act is now unlikely. Read more [NEXTGOV.COM]
  38. 38. IT Security | Cybersecurity HOME DEPOT HACK: Home Depot lost 53 million email addresses (this POS story isn’t getting any better). Home Depot Inc. said hackers got into its systems last April [but now says] the breach was worse than earlier thought…around 53 million customer email addresses were stolen as well. Read more [COMPUTERWORLD.COM] CUSTOMER DATA PROTECTION: Customer data protection is a corporate social responsibility. It’s time for businesses to start protecting customer privacy and data as conscientiously as they protect their own. Read more [ZDNET.COM]
  39. 39. IT Security | Cybersecurity CLOUD: Protecting the Perimeter From the Cloud…Defending Against Hackers Who Automate Monitoring of Targets. The truth is, as more data and technologies move to the cloud and more and different types of devices become connected to the Internet and each other, more endpoints are being added to a company’s perimeter. For hackers, more endpoints mean more doors and windows to open and exploit. Read more [GOVINFOSECURITY.COM] HACKING THE HACKERS: On the Hunt for Wall St. Hackers, but Not the Spotlight. Lawrence Baldwin is a dark hero of the Internet whom you have probably never heard of — and for good reason. Read more [NYTIMES.COM]
  40. 40. IT Security | Cybersecurity DARK WEB SITES: ‘Dark’ Network of Illegal Websites Targeted by U.S. and European Police. An international task force executed a series of raids and arrests in 16 countries on Friday aimed at shutting down a secret network of websites. These so-called dark sites matched anonymous sellers and buyers in a thriving black market for illicit goods and services including drugs, stolen credit cards, weapons and killers for hire. Read more [NYTIMES.COM] ROUTER BUG: Serious bug in Belkin N750 router locally exploitable without authentication to gain full router control. The good news is that the bug has already been patched by Belkin. The bad news is that approximately nobody installs router firmware updates. Read more [THREATPOST.COM]
  41. 41. IT Security | Cybersecurity APPLE VULNERABILITY: The U.S. government warned iPhone and iPad users to be on the alert for hackers who may exploit a vulnerability in Apple Inc’s (AAPL.O) iOS operating system that would enable them to steal sensitive data. There was the potential for hacks using a newly identified technique known as the “Masque Attack,” the government said in an online bulletin from the National Cybersecurity and Communications Integration Center and the U.S. Computer Emergency Readiness Teams. Read more [REUTERS.COM]
  42. 42. IT Security | Cybersecurity HOW DO YOU KNOW: When your computer is infected? Unfortunately, there is no particular way to identify that your computer has been infected with malicious code. Some infections may completely destroy files and shut down your computer, while others may only subtly affect your computer’s normal operations. Be aware of any unusual or unexpected behaviors. If you are running anti-virus software, it may alert you that it has found malicious code on your computer. The anti-virus software may be able to clean the malicious code automatically, but if it can’t, you will need to take additional steps. Find out more [US-CERT.GOV]
  43. 43. IT Security | Cybersecurity BIG DATA CAN SAVE THE DAY: Big Data as Superhero: Fighting Crime and Boosting Security. The future lies in analyzing data that gives security professionals a comprehensive view of their security posture. Tell them what is at risk, how severe the risk, how important the asset is, and how to fix it. Read more [FORBES.COM] MALWARE: Backoff POS Malware Evolves Attackers Encrypting Latest ‘ROM’ Version Communications. The developers behind the pernicious Backoff point-of-sale malware that’s infected more than 1,000 U.S. businesses have continued to refine their attack code. Read more [INFORISKTODAY.COM] SECURITY BEST-PRACTICES: Why cyber security starts at home. Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens anywhere on the Internet can eventually affect us all. Read more [DARKREADING.COM]
  44. 44. IT Security | Cybersecurity APPLE RESPONDS TO MASQUE ATTACK: Apple responds to that scary-sounding Masque Attack: Heed warnings and you’ll be fine. Read more [THENEXTWEB.COM] NO CROSS-SITE SCRIPTING: 11 dev rules former Twitter security engineer Neil Matatall swears by. Neil Matatall hates cross-site scripting. The practice where, roughly speaking, HTML gets automatically generated or gets borrowed from another site. They flat out don’t do it at Twitter, where he was a security engineer for almost three years. Read more [TECHNICAL.LY] WEB SITES: Five ways your website may be attacking customers. Attackers are increasingly using trusted websites to distribute malware, steal user credentials and commit fraud. Read more [FIERCECIO.COM]
  45. 45. IT Security | Cybersecurity SECURITY: Don’t Rush the Security Breach Notification Timeline. Despite the expectation to report findings almost immediately, officials should use caution and avoid communicating information too quickly. Read more [GOVTECH.COM] HOW-TO: Build a strong incident response team. A successful incident response effort must involve the right mix of people, processes and technology. It must also be a continuous effort that never stops. Is your team ready? Find out how [ITPROPORTAL.COM]
  46. 46. IT Security | Cybersecurity GOOGLE APPS: Users Gain More Control of Account Security. A new device and activity dashboard will give enterprise users a quick way to assess the security of their Google accounts, the company said. Find out more [EWEEK.COM] SECURITY CAMERA: Thinking of buying a security camera? Read this first. Why? Because security cameras come with vulnerabilities too. Find out more [INFOWORLD.COM] BROWSER: Starting in January 2015, Google’s Chrome browser will block all old-school Netscape Plug-In API (NPAPI) plugins. This doesn’t come as a huge surprise, given that Google started its efforts to remove NPAPI plugins more than a year ago. Find out more [TECHCRUNCH.COM]
  47. 47. IT Security | Cybersecurity JAVA: Java Reflection API Woes Resurface in Latest Oracle Patches. Problems with the maligned Java Reflection API, the molten core of far too many exploited Java vulnerabilities in 2013, have surfaced again. Read now [THREATPOST.COM] DETECTING USER THREATS: Using Logs to Detect User-Based Threats. A common theme at the Splunk user conference is the idea that the users are the greatest threat. Even in a well-regulated enterprise where no one has more privileges than what’s needed to do their job, a typical user has more than enough ability to steal massive amounts of data or cause widespread problems. Read more [INFOQ.COM] PRIVACY: ‘Fingerprinting’ tool challenges privacy safeguards for federal websites. A recently discovered tool for tracking computer identities could threaten the privacy of visitors to thousands of popular websites, including dozens of federal sites. Read more [FCW.COM]
  48. 48. IT Security | Cybersecurity OCTOBER PATCH TUESDAY: Microsoft updates Windows, IE, Office in busy Patch Tuesday. A total of 24 vulnerabilities, many severe and a few being exploited in the wild, have been revealed and patched. Read more [ZDNET.COM] CYBERSECURITY CENTRAL?Washington D.C. wants to become a hub for cybersecurity companies. Can it be done? Montgomery County will be home to the first federally funded research and development center focused solely on advancing cybersecurity technology, a facility that officials recently said will be operated by McLean-based Mitre and Maryland’s top research universities. Read more [WASHINGTONPOST.COM] IT SECURITY STRATEGY: Cyber security failing in execution, says ex-US cyber czar. Read more [COMPUTERWEEKLY.COM]
  49. 49. IT Security | Cybersecurity WINDOWS HACK: Russian hackers used a bug in Microsoft Windows to spy on several Western governments, NATO and the Ukrainian government. Microsoft to release patch today to fix vulnerability that allowed outsiders to control PCs. Read more [NYTIMES.COM] HEALTH INFO CYBERSECURITY: 5 tips for managing third-party risk. Data sharing is an unavoidable aspect of business in healthcare. The tricky part is that we can’t completely control the security of our data once it’s in the hands of third-party vendors. Read more [GOVHEALTHIT.COM]
  50. 50. IT Security | Cybersecurity FROM ISIS TO FISMA: Conversation with Jim Lewis on Terror Cyberthreat, Stalled Cyber Legislation. Jim Lewis doesn’t see Congress doing much legislating on cybersecurity, at least for the remainder of the current session that adjourns at year’s end. And the nation won’t be much worse off by the inaction. He also discounts a significant cyberthreat from the terror group Islamic State. Read more [BANKINFOSECURITY.COM] RISK: Business Leaders’ Cybersecurity Divide. Relentless attacks from hackers have C-suites and boards of directors divided roughly into two groups, a top cybersecurity lawyer said. One is thinking “we need to spend more and do more to beef up our security.” The other is thinking: “Oh come on, if they can’t keep hackers out, what the hell are we supposed to do?” Read more [BLOGS.WSJ.COM]
  51. 51. IT Security | Cybersecurity MAKE NOTE: FBI Director James B. Comey sharply criticized Apple and Google on Thursday for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices – even when they have valid search warrants,” report The Washington Post’s Craig Timberg and Greg Miller. Read more [WASHINGTONPOST.COM] SHELLSHOCK MAC: Apple releases fix for ‘Shellshock’ virus. The “Shellshock” flaw allows the user to gain remote control of a computer or system. The problems affects devices running Linux and Unix operating systems and Apple’s OS X. Read more [UPI.COM] BEWARE: Malware Attacks Drain Russian ATMs – Interpol Warns Attacks Could Spread Worldwide. Read more [INFORISKTODAY.COM]
  52. 52. IT Security | Cybersecurity WINDOWS: Shellshock-like Weakness May Affect Windows. As more people dig into the severity and depth of Bash vulnerabilities, it appears that similar Shellshock-like remote code execution is possible on Windows systems, with Windows servers in particular at risk for RCE attacks. Read more [THREATPOST.COM] IT SUPPORT: 10 Things Federal Customers Want from an IT Support Experience. In today’s competitive market, customer satisfaction is key. What are the 10 factors that make the IT support experience better for Federal customers? Read more [BLUEMT.COM] [SLIDESHARE.NET] HACKED: Cyberattack Against JPMorgan Chase Affects 76 Million Households. A cyberattack this summer on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever. Read more [DEALBOOK.NYTIMES.COM]
  53. 53. IT Security | Cybersecurity NATIONAL CYBER SECURITY AWARENESS MONTH: Why Cyber Security Matters To Everyone. October is National Cyber Security Awareness Month — as good a time as any to remind people that their cyber security hygiene doesn’t just affect them, but everyone around them. And in the globally connected world we live in, that literally is everyone. Read more [FORBES.COM] DEPARTURE: Federal CIO’s Exit: Impact on IT Security. The unexpected departure of Steven VanRoekel as the federal chief information officer likely will have little direct impact on the Obama administration’s cybersecurity initiatives. View now [GOVINFOSECURITY.COM] BYOD: Eight steps for comprehensive BYOD governance. BYOD governance is not a destination, but a journey. It begins with this eight step roadmap for safe and effective BYOD policies. Read more [SEARCHCIO.COM]
  54. 54. Web Development ACCESSIBLE VIDEOS: 508 Accessible Videos—Why (and How) to Make Them. Making Web content and video accessible to people with disabilities is the law. Ensuring a video is accessible requires planning. Read more [DIGITALGOV.GOV] FIREFOX DEVELOPER EDITION: Built for those who build the Web. Introducing the only browser made for developers. You can inspect and debug an app across any browser or device with Valence — a powerful, pre-installed extension that you’ll only find in Firefox Developer Edition. Read more [MOZILLA.ORG] GOOGLE CHROME: How to exchange encrypted messages on any web site. A new browser extension called ShadowCrypt brings simple encrypted messaging to any webmail or social networking site. Read more [TECHNOLOGYREVIEW.COM]
  55. 55. Application Development ANDROID: How to Tell if An Android App is Potentially Dangerous. Google doesn’t manually approve apps like Apple does, but they do scan apps in the Google Play Store for malware. Permissions, reviews, and other reputation information can also tell us a lot. Take a few basic precautions and you can avoid these potentially dangerous apps. Read more [HOWTOGEEK.COM] IT FAILURE REBOUND: How to rebound from a large-scale IT failure. As the Healthcare.gov site prepares for another year’s open enrollment season, it also serves as a prime example of how to recover from a major, high-visibility failure. Read more [FCW.COM]
  56. 56. Application Development ASYNC: Unit Testing Asynchronous Code. Unit testing is a cornerstone of modern development. The benefits of unit testing for a project are pretty well understood: Unit testing decreases the number of bugs, reduces time to market and discourages overly coupled design. Those are all nice benefits, but there are further advantages more directly relevant to developers. Read more [MSDN.MICROSOFT.COM] SQL SERVER 2014: Video tutorial – XML and database – An Introduction. Watch Now [YOUTUBE.COM]
  57. 57. Application Development SWIFT: Why Apple’s Swift programming language is a diamond in the rough. Swift development language, which operates on both iOS and Mac OS X and is a compiled language as same as Objective C (Apple’s original object oriented programming language), comes with great new enhancements such as the advent of the playground, which allows developers to check out code snippets in real time. Read more [THESTREET.COM] JAVA 8: 10 Things You Need to Know About Java 8 Adoption. According to a new study, nearly two-thirds of Java developers have already migrated to Java 8, or are committed to doing so within the next year. The survey, conducted in September 2014 by Typesafe, which helps developers build applications on Java Virtual Machine (JVM), indicates that developers are upgrading ahead of the predictions made in Typesafe’s March survey. Find out more [CIOINSIGHT.COM]
  58. 58. Application Development AURORA MySQL : Amazon announces new code tools, Aurora MySQL database engine at AWS re:Invent. Amazon paraded out a cavalcade of new products and services at its AWS re:Invent conference in Las Vegas, unveiling several new code-management and deployment tools, the Amazon Aurora MySQL database engine, and more. Find out more more [SDTIMES.COM] BACKBONE & TYPESCRIPT: How to Build a Backbone Application with TypeScript, Part 1: Getting Started. Here are some best practices for creating a Single-Page Application with TypeScript. Find out how [VISUALSTUDIOMAGAZINE.COM] DATABASES: Amazon Web Services Inc., has released of a new, cloud-based relational database service called Amazon RDS for Aurora that it claims will deliver better performance at a fraction of the cost of on-premises installations. Read more [SILICONANGLE.COM]
  59. 59. Application Development 2014 PREDICTIONS: 15 hot programming trends — and 15 going cold — reported in early 2014. In your opinion, how did these predictions hold up this year? Find out more [INFOWORLD.COM] RED HAT & MOBILE APPS: FeedHenry 3 adds collaboration and access control for distributed mobile app developers. Red Hat’s latest acquisition enhances its mobile app development platform with collaboration features that promote agility and increase security. Find out how [ZDNET.COM] NEW APP DEVELOPERS: Top tips for new app developers: Here’s what you need to know. The mobile applications landscape has evolved faster than anyone anticipated. According to Markets and Markets research, the total global mobile applications market is expected to be worth $25 billion by 2015. Read more [GIGAOM.COM]
  60. 60. From the Blue Mountain Blog SECURITY BREACHES: After-Hours Inspection Finds Security Issues at GSA’s Open Office. Read more [BLUEMT.COM] MEDICAL IT: Google X’s Nano Project May Detect Health Problems. Read more [BLUEMT.COM] FINDING TECH TALENT: Tech Help Wanted: Degree Not Needed. Read more [BLUEMT.COM] EDUCATION: White House Announces Grants for College IT Programs. Read more [BLUEMT.COM] NETWORK SECURITY: How to Use Gamification for Network Security. Read more [BLUEMT.COM]
  61. 61. From the Blue Mountain Blog WEARABLE TECHNOLOGY: DHS' Tech Vision for the Next Generation First Responder. Read more [BLUEMT.COM] TECH CAREERS: 2015 IT Career Outlook: New Job Roles for IT. Read more [BLUEMT.COM] CYBERSECURITY: Survey Indicates Spotlight On Insider Threats. Read more [BLUEMT.COM] EMAIL MANAGEMENT: Manage Your Email Faster with Microsoft Clutter. Read more [BLUEMT.COM] HOW-TO: Learn Sneaky Hack Attacks for Smarter Defense. Read more [BLUEMT.COM]
  62. 62. From the Blue Mountain Blog DATA LINKS: Unsecured File Sharing – Agencies Behaving Badly. Read more [BLUEMT.COM] SECURITY: Cyber Attacks Are Inevitable – Be Prepared Read more [BLUEMT.COM] HELP DESK: Mobile Device Management: Get Ready! Read more [BLUEMT.COM] WORK FROM HOME: Federal Telework Gains Popularity This Year. Read more [BLUEMT.COM] PURCHASING: Business Intelligence Software – 9 Mistakes to Avoid. Read more [BLUEMT.COM] FCC: Net Neutrality Spells Equality. Read more [BLUEMT.COM]
  63. 63. From the Blue Mountain Blog SECURITY: A Software Upgrade for Biometrics. Read more [BLUEMT.COM] SURVEY: FYI: Americans Worry Most About Hacking, Says Gallup Poll. Read more [BLUEMT.COM]
  64. 64. ABOUT US Blue Mountain Data Systems Inc. Blue Mountain Data Systems Inc. is dedicated to application and systems development, electronic document management, IT security support, and the automation of workflow processes. Read more about our experience here: >> http://bluemt.com/experience
  65. 65. MANAGEMENT Paul T. Vesely Founder, President, CEO and Principal Architect Mr. Vesely is a recognized thought leader in systems architecture and delivery, having designed and delivered many enterprise wide information and document management solutions. Mr. Vesely’s history includes 33 years experience in the information systems industry, with Unisys, Grumman, PRC and a host of clients in both government and private sectors.
  66. 66. CONTACT US Contact Us Today to Discuss Your Next IT Project HEADQUARTERS 366 Victory Drive Herndon, VA 20170 PHONE 703-502-3416 FAX 703-745-9110 EMAIL paul@bluemt.com WEB http://bluemt.com

×