Articles

Affichage des articles du janvier, 2015

Learn How To Buy Cloud From GovLoop & ViON

Image
"Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since the transaction doesn’t involve any physical entity, procedures and processes associated with the inspection, acceptance, inventory and management of IT may not apply. New parallel policies that apply to virtual the delivery of virtual services must, instead, be developed and put in place." ( Feds & The Cloud: Management Approach Must Evolve, InformationWeek ) Do you know how to buy cloud? What are the common procurement misconceptions? What key terms you need to be looking for in a cloud? What are the common cloud procurement mistakes and how do we avoid them? How do we write cloud computing procurements? What are the different types of cloud and what are the best procurement methodologies for each? What is FedRAMP and what does it mean to me? Date: Thursday, Februar...

A VETS 360 BENEFIT - LATINO FILM INDUSTRY POST OSCAR PARTY

Image
    GUESS WHO SUPPORTS  VETS 360? You can support them too at the: THE OFFICIAL LATINO FILM INDUSTRY POST OSCAR PARTY The Veterans 360 mission is to support our young combat veterans as they integrate into civilian life. In line with their four pronged approach (engagement, education, employment, and healing), and to help veterans get the skills necessary to obtain employment with a solid future, they leading the way with emerging technology courses.     Vets360 Will Offer Two Exciting Courses  In Q1 2015 Cloud Technology Course : 6 weeks—virtual & classroom—Information Session Jan 22nd, Class starts beginning of March—actual date TBD Certified Ethical Hacker : 8 weeks—virtual & classroom course—graduate with a CEH credential –Information Session Mid-February. Class starts late March 2015 I would like to thank the Latino Film Industry for their generous support of Veterans 360.  The Official Latino Film Industry Post Oscar Party February 22, 2015, 7pm-4am Proceeds Benef...

South Asia’s Biggest Tech Event - “Digital World 2015”

Image
 I am proud and honored to announce that I have been added as a speaker at SouthAsia’s biggest tech event “Digital World 2015” , 9th - 12th February, 2015 at the Bangabandhu International Conference Center Dhaka, Bangladesh.   The event will also be attended by the Honorable Prime Minister of Bangladesh Sheikh Hasina along with local and International Ministers. Digital World 2015 will: Showcase achievements of Bangladesh in ICT Provide a platform for free-flow of ICT related ideas where global ICT think tanks share their thoughts resulting in enriching Bangladesh's Knowledge and guiding toward achieving Vision 2021. Showcase of tangible achievements (in terms of Software Products and IT Enabled Services) of Bangladesh in ICT sector; and Provide an ICT knowledge and idea sharing platform 500,000 attendees are expected to enjoy the five specific zones: BASIS Softexpo - Although over the last couple of years BASIS SOFTEXPO has drawn signi...

Fear Hackers? First invest in an IT security culture change

Image
by Kevin L.Jackson  With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increase. Some 61% of over 1600 security expert respondents to a recent survey said “yes” that a major attack causing widespread harm would occur by 2025 , according to the Pew Research study. The cold hard fact, however, is that fear of the cyberterrorist and hackers, while definitely valid, is mostly misplaced.  I hold this contrarian view, because when you pull back the curtain on many of the recent breaches, you’ll likely see a mirror! In a recent case, sensitive data including passwords seem to have been stored in the clear which is against all recommended best practices. There also may have been significant involvement from a company insider.  Focusing on application hacks, some of the most devastating have been due to a failure of the applicati...