Subscribe

Cloud Computing, IT Perspective
We are going to take a simple but often misunderstood AWS methodology / feature and drag it out into the unapologetic sunlight via my way of looking at things. I tend to deal with IT professionals from all spectrums of the scale, so in the finest tradition of compromise, we are going to soar between 30,000 and 500 feet on this one.
Cloud Computing
Amazon Web Services (AWS) is a very large sprawling platform. As such, it has a very large collection of API’s to issue commands against. The AWS Command Line Interface (CLI) team has done a great job in the last few years of standardizing the commands – both in syntax and function.
Digital Design
Flood risk assessment and mitigation is a critical part of any civil engineer’s job. After Superstorm Sandy devastated the New Jersey/New York shore in 2012, it was discovered shortly thereafter that federal flood maps drawn up by FEMA were wrong. Unfortunately for many home and business owners, developers relied on FEMA’s assessment of risks when they built new homes near the water and property owners made decisions about whether to buy flood insurance based on those maps.
Cloud Computing
Transitioning to the cloud? Chances are, when you make the transition, you’ll take baby steps – assessing your workloads in totality and individually, determining the most efficient platform, preparing thoroughly and then migrating just that workload, then the next, and so on. It’s standard procedure and is the best way to proceed with minimal risk. What you’ve done here is create a hybrid environment. Most of your IT is still on-premise, but certain workloads are in the cloud. And it’s likely to stay that way.
Cybersecurity, Data
Cloud computing has made collecting, storing, and processing data easier and cheaper than ever. Agencies are increasingly leveraging big data to drive actionable insights and improve cyber threat detection. Furthermore, more than 60% of agencies are using big data to reduce costs and operating expenses, writes Information Week.
Cybersecurity
Our very own Chief Cybersecurity Technologist and Institute for Critical Infrastructure Technology (ICIT) fellow, Don Maclean, recently joined fellow fellows Robert Lord (Protenus), John Menkahart (Securonix), Dr. Ron Ross (NIST) and ICIT co-founder and senior fellow, Parham Eftekhari on Capitol Hill to discuss the risks and threats associated with cyber attacks on healthcare facilities.