Arlington, VA, August 30, 2009 --(PR.com)-- Blue River Information Technology, a globally recognized leader in Data Center Enterprise Architecture, IT Consulting & Training Services, today announced their first awarded Multiple Award General Services Administration (GSA) Schedule Contract #GS-35F-0624V for Information Technology Professional Services.

This competitively awarded, Multi Service GSA Contract in accordance with SIN 132-51 IT Professional Services, offers unlimited IT related services & products, as well as, full management/maintenance services to all Federal Agencies. A few of the Labor Categories included are: Just a few of Blue River’s Labor Categories include Program Management, Engineering, Systems Analysis, Quality Assurance & Web Design. Blue River was also recently awarded additional categories in Training & Curriculum Development, as well.

Just weeks after headlining the expansion of their existing headquarters in Arlington, VA, with a new, fully functional, data storage laboratory; the new GSA contract promises additional opportunity in servicing their new & existing Government vehicles.

Blue River began its operations, only a year ago, and has already succeeded in establishing a huge influence among the DOD, Federal & State agencies, as well as, an impeccable reputation among the contracting community. Partnering with the most sought-after, technology leaders, has given this promising & enterprising small business, the leading edge above its competitors.

“We are highly anticipating this new contract to provide our customers with a complete range of opportunity & overall mission success in the procurement process,” said Blue River’s co-founder & CEO, David McLaughlin.

With expanded offices in San Diego, Munich, Germany, Hampton Roads, VA & New Bern, NC, Blue River offers GSA “best-practices & services” as value added integrators.

The time has come to declare that the beginning of the end for the traditional approach to Information Technology. The party is over.

The End of IT 1.0 As We Know It – has begun. To borrow a phrase from my previous IBM colleagues who wrote, “The End of TV As We Know It” with which I became familiar while working on IP Television (IPTV).

You may wonder whether it’s too early to make the call given the lack of interoperability standards, security concerns, and common definition of cloud computing. Well, the IPTV space shares many of the same similarities – emerging technology, emerging standards, emerging adoption, varying definitions, and yet the call was made in that space.

Cloud computing is a shot across the bow for the giants of the IT industry. They are on notice. Certainly, some will make the transition, slowly, at the speed which the overall market develops or slower, as they have no incentive to drive the market and rapidly cannibalize their existing businesses for a less lucrative business model even if it is more cost effective, flexible, and efficient for most of their clients.

Just think of the companies that provide hardware, software, services, consulting and systems integration. Now consider the cloud computing paradigm.

* No packaged software to order, install, configure, test, implement, manage, support, and maintain on client premise.
* No hardware to order, install, configure, test, implement, manage, support, and maintain on client premise.
* No hardware and software / systems integration on client premise.

Now look at the companies that provide these services today, EMC, HP, IBM, Oracle, SAP, Accenture, Infosys, and others. Are these giants ready to quickly accelerate the cannibalization of their own product and services offerings? Will they transition from mega projects to micro projects? How will many of these companies who rely upon an on-premise installed base make the transition to the much lower revenue model that cloud computing represents?

To be fair, most of the high tech leaders already have cloud computing groups, and many of the technologies that underpin cloud computing capabilities comes from these very companies. Certainly, they face many challenges ahead as the industry further transitions to this computing paradigm.
One can easily see the giants of IT playing with other large non-IT industry leaders which will leverage cloud computing through an on premise model, and provide many custom services for those clients.

Besides, for many years to come there will still be a need for large (non-cloud) IT projects and large, financially stable companies to undertake those, that’s why it’s not the end of the end, or the middle of the end, but the beginning of the end for some companies, as not all will survive the transition.

Not to worry though, traditional IT will still be around for many years to come, even if the days of traditional IT are numbered.

THE country’s largest mobile operator, Econet on Friday launched the 3G technology that will allow subscribers to access internet on their mobile phones in a boost for the country’s information and technology sector that has undergone years of under investments.


Econet subscribers will now have access to the internet on their mobile phones, one of a range of services 3G technology will make possible in the near future.


General Packet Radio System (GPRS) will enable subscribers with compatible handsets to send and receive emails on the move.


GPRS can also be used by banks and shops to support payment devices for credit cards.
While the roll-out of GPRS is itself very exciting, the real excitement will be on the launch of a range of new generation services under 3G, Douglas Mboweni, Econet CEO said.


He says for business users, the most important application “will not only be what you can do with your cellphone but what you can now do with your computer or laptop”.


“A computer can be linked directly to the 3G network using a data card, which will be available at Econet service centres,” he said.


This eliminates the need for a dial-up line or expensive satellite dishes.


The bandwidth speeds on the 3G system as well as the capacity is unprecedented, according to Mboweni.
He said the mobile operator has installed an earth station just to uplink the 3G system.


“This is probably the most advanced cellular technology in the world," said Mboweni.


Zimbabwe has 2.5 fixed lines per 100 inhabitants, 6.5 mobile lines per 100 and less than 9.5 internet users per 100 meaning that the country is ranked below all the Sadc countries except the Democratic Republic of Congo, according to the Global Information Technology Report 2008-2009.


But Information Communication Technology Minister Nelson Chamisa believes the sector is on its upward trend spurred on by massive roll out programmes by operators.


All the three mobile operators - Econet, Net One and Telecel - have announced massive roll out programmes to increase the subscriber base.

Arizona has formed a state committee designed to target federal broadband stimulus dollars and spread the technology into rural areas.

The Arizona Broadband Advisory Committee will feature representatives from 10 state agencies as it looks for ways to capture some of the $1.6 billion that will be available initially for broadband grants.

The Arizona Government Information Technology Agency will support the committee. GITA’s director, Chad Kirkpatrick, will serve as committee chairman.

The advisory committee will prioritize federal broadband grant applications and make recommendations to the governor as to which of those projects would best deliver broadband services to unserved and underserved areas in Arizona, Kirkpatrick said.

The group will work on grants from the U.S. Department of Commerce’s National Telecommunications and Information Administration. The state agencies participating include the Arizona Health Care Cost Containment System and the state departments of Administration, Commerce, Education, Health Services, Homeland Security, Public Safety, Transportation and Land.

VANCOUVER — Curtailed spending by customers due to the global recession sent Epic Data International Inc.'s (TSXV:EKD) revenues down 59 per cent, trimming its third-quarter profits.

The manufacturing and data collection systems software and technology provider said net income for the quarter ended June 30 fell to $113,000 or a penny a share. That compared with year-earlier profits of $452,000 or four cents a share.

The Vancouver company said Friday that revenues plunged close to 60 per cent to $1.4 million versus $3.4 million in the year-ago period.

"Each of hardware, software and professional services revenue was down significantly compared to the same period in 2008, in part as customers curtailed spending in light of the global economic downturn," the company stated in a release.
A single project with a major U.S. defence contractor also accounted for higher revenues in the year-ago period, it added.

"We continue to see our customers in North America and Europe delay capital expenditure programs in light of the current economic conditions," said president and chief executive Robert Nygren.

He said that the company will continue to focus on sales and marketing initiatives as well as product development to deliver long-term success.

Shares of the Epic Data last traded Thursday at eight cents on the TSX Venture market.

THIBODAUX — Business students at Nicholls State University have new options for high-tech classes this year because of a partnership with IBM.
Working with the International Technology Corp., Business College administrators and faculty revamped computer-information-systems curriculum to offer new courses that better prepare students for jobs after graduation.

"Just the three letters IBM are exciting," said Bryan Samaha, a senior majoring in computer-information-systems and president of the information-systems student organization. "This will help students in the long run."

By teaming with professionals at IBM, many of whom are veterans in business technology, school administrators were able to reshape the department. Computer-information-systems classes will now include skills that students might not have learned until they were in the workforce.

Neset Hikmet, an information-systems professor involved with the changes, said students will be able to choose courses to fit their intended careers.

The new classes began this fall, and Hikmet said they have already received a great deal of interest, even drawing students to Nicholls from other schools.

Hikmet said computer-information-systems classes teach students how to make computer systems work for businesses. The program includes classes in a wide range of business-related fields: accounting, economics, marketing and computer systems.

Samaha said the field is perfect for students who love technology but don't want to sit behind a computer all day.

The new classes will be offered to students across all levels, including undergraduate and MBA students.

Also at Thursday's meeting were representatives from area businesses looking to capitalize on a local source of technology-savvy business graduates. Organizations represented included Thibodaux Regional Medical Center, Assumption Parish School Board and the Baton Rouge branch of Exxon Mobil.

"Here's a whole area of job opportunities in information technology that are real, very much alive," said Sherry Welch, an IBM representative.

Welch also said there will be a strong emphasis on internships and other job experience that will benefit both students and businesses.

"They become our new key employees," she said.

For information about the program or new classes, call 448-4176 or go to www.nicholls.edu/cis/.

HANOI, Aug. 28 (Xinhua) -- The fourth World Information Technology Forum (WITFOR 2009) ended here on Friday, calling for great cooperation among countries in information technology development, Vietnam News Agency reported.

At the forum, delegates agreed that the development of information technology plays an important role in boosting the growth of the economy. It is the "infrastructure of the infrastructure" of each country's economy and the global economy.

Information technology has a deep impact on different aspects of the social life, and helps to bridge the gap among developed and developing countries, and between urban and rural areas, said the delegates.

Speaking at the closing session, Vietnamese Deputy Minister of Information and Communications Nguyen Minh Hong said countries need to enhance cooperation in the information and communication technology (ICT) and information exchanges.

Hong urged countries to further cooperate and share knowledge on ICT development in order to develop an informatic society.

The forum is co-organized by the International Federation for Information Processing (IFIP) and the Vietnamese Ministry of Information and Communications. It is the first time the forum is held in Asia.

The Veterans Affairs Department faces systemic problems in managing and executing complex information technology projects, according to a new report from the VA inspector general.

The report focused on the failure of one key project, a $167 million program to develop a patient scheduling system for VA hospitals, begun in 2000 and put on hold earlier this year by Roger Baker, the department's new chief information officer.

Mounting problems with the replacement scheduling application led the VA Office of Information and Technology in 2008 to ask the Navy's Space and Naval Warfare Systems Command (SPAWAR) for help on engineering and application development under a 2007 interagency agreement. But the IG concluded, "We do not believe this to be a viable solution because our review of the SPAWAR contract found that most of the work was being performed by contractors, not SPAWAR government employees."

The IG identified four 2008 task orders from Veterans Affairs to SPAWAR for work on the replacement scheduling application, but said in its report that "VA was unable to determine exactly what work was to be performed on or relating to [the replacement scheduling application] by SPAWAR, what deliverables were required under the [statements of work], or which VA personnel were monitoring or tracking the work."

When the inspector general asked the current but unnamed RSA program manager to identify the work SPAWAR was supposed to do under those contracts, he said, "I have not been able to locate anything regarding these four SOWs. The first and last were not technically assigned to RSA, but were created to support RSA and HealtheVet from other parts of the organization. I have not received a copy of them and the person who created them is now gone."

According to the IG, the department's lack of supervision over the work performed on the replacement scheduling application is consistent with findings from a June report concluding VA "relinquished oversight" of information technology work to SPAWAR.

In March, VA awarded an $11 million contract to CACI Inc. to "support all operational and technical requirements associated with the systemic analysis planning, and budgeting, and execution of IT investments," according to a letter from Sen. Richard Burr, R-N.C., the ranking member of the Senate Veterans Affairs Committee to the IG. In the letter Burr asked, "Why does VA appear not to have the capability to manage these projects internally?"

Though CACI issued a press release on the award, the IG said no one in the department's Office of Acquisition and Logistics had "knowledge of any contract meeting that description."

The VA Office of Information and Technology told the inspector general that the $11 million contract with CACI was awarded through the General Services Administration. But the report noted that evidence of the transaction was lacking. "No one in VA had a copy of the task order issued by GSA, only a statement of work, which may or may not have been the statement of work included in the contract," said the report.

The IG said a spreadsheet the Office of Information and Technology maintains showed that since 2007 GSA has awarded at least 68 contracts valued at more than $77 million for services including software licenses. But, the inspector general said, "There is essentially no visibility within VA over these procurements. VA appears to merely fund the contracts through GSA."

CIO Baker launched a program to tightly manage IT projects. "This new rigorous approach to IT proactively manages projects, provides frequent delivery milestones and enforces aggressive oversight," the department said in response to the IG report.

Ed Meagher, a former deputy CIO at VA and director of strategy for health affairs at contractor SRA International, said the inspector general's report highlighted the very difficult job that lies ahead for Baker and his team. "There are no easy or quick fixes to the issues raised by the RSA debacle," Meagher added.

Harold Gracey, a consultant with Vienna, Va.-based Topside Consulting who served as VA chief of staff from 1994 to 1998, agreed that Baker has a daunting task, but believes he is the person who can straighten out the department's IT department.

SYS-CON Events announces that Jill Tummler Singer, Deputy Chief Information Officer at the Central Intelligence Agency (CIA), will be delivering the opening keynote at the 1st Annual Government Conference & Expo (www.GovITExpo.com) on October 6th in Washington DC.

Sponsor & Exhibit at 1st Annual Government IT Expo!
Register Today and Save!

Ms Singer was appointed in November 2006 and is responsible for ensuring CIA has the information, technology, and infrastructure necessary to effectively execute its missions. Prior to her appointment as Deputy CIO, Ms. Singer served as the Director of the Diplomatic Telecommunications Service (DTS), United States Department of State, and was responsible for global network services to US foreign missions.



GovITExpo builds on the success of SYS-CON's Cloud Computing Expo, the fastest-growing conference anywhere in the world devoted to the delivery of massively scalable IT as a service using Internet technologies. Data storage, security and software services are among the major themes of the technical program, which offers breakout sessionsdivided into three parallel tracks covering

Cloud Computing/Virtualization
Service Oriented Architecture
Security & Compliance

There will be breakout sessions on the security issues that are unique to the Cloud, such as the crucial distinction between Private and Public clouds. Expert speakers from government and the software industry alike will be looking at issues such as the requirements for how companies can handle government information and how information can be most successfully shared by multiple clouds. Doing more with less is the new reality for most IT departments, and the Government is no exception. So the cost-effectiveness of technologies such as Virtualization will also be foremost on the agenda.

With GovITExpo, SYS-CON Events widens and broadens its reach to embrace those who are bringing technology into the Federal domain. This high-energy event will be a must-attend for senior technologists involved in Government IT at every level including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.

According to the Washington Post, the U.S. Census Bureau is using Salesforce's cloud to manage the activities of about 100,000 partner organizations across the country. And the Defense Department's technology arm has already set up a cloud to let the military rent storage space or use remote software programs. Companies like online application provider NetSuite, have shifted their focus to federal sales, on the basis that what works for Enterprise IT can also work for Government.

"Agency CIOs and CTOs need the flexibility to choose the best tools to accomplish their mission regardless of platform," notes Conference Chair Kevin L. Jackson, a senior information technologist specializing in information technology solutions that meet critical Federal government operational requirements. "Come explore the wide range of currently available technology choices for yourself," he adds. "Join us at the 1st Annual Government IT Conference & Expo on October 6, 2009, in Washington, DC - either as a delegate, sponsor, exhibitor, or speaker. I look forward to meeting you at this important event!"

NEW YORK -- Tata Consultancy Services, a unit of India's Tata Group conglomerate, said Thursday it was selected as a strategic information technology vendor for BP PLC, one of the world's biggest oil and gas companies.

Terms were not disclosed.

The deal is part of a year-old effort by BP to lower costs by consolidating its information technology vendors for application development and maintenance.

Tata will work on refining, manufacturing and corporate IT maintenance.

SRA International Inc. will help protect information technology systems from cyberattacks at the Transportation Security Administration under a task order worth up to $53 million.

Under the contract, SRA will lead a team that will monitor the agency’s IT systems and assess various security threats to those systems, company officials said Aug. 25. The work includes detection, analysis and coordinated response to threats and attacks, the officials said. The SRA-led team will provide the services via a security operations center.

SRA’s team includes InScope Solutions Inc., SE Solutions LLC and Verizon Business.

TSA, a component of the Homeland Security Department, is responsible for the security of the nation’s transportation systems. The task order was awarded through DHS' Enterprise Acquisition Gateway for Leading Edge Solutions contract.

Among the other deals SRA won in recent months is a $63 million contract to upgrade communications infrastructure for the Defense Department’s Joint Staff Information network.

SRA, of Fairfax, Va., ranks No. 26 on Washington Technology’s 2009 Top 100 list of the largest federal government prime contractors.

Government and industry information technology experts have identified critical functions of the country's key information technology assets, some specific risks to the IT's sector's performance and potential mitigation strategies. That information is in a baseline assessment of threats to the IT sector.

The Homeland Security Department and the Information Technology Sector Coordinating Council (IT SCC) released the document, the IT Sector Baseline Risk Assessment (ITSRA), Aug. 25 as part a joint effort to bolster protection of IT assets considered to be critical infrastructure. IT is one of 18 critical infrastructure and key resources sectors that the government identified under DHS’ National Infrastructure Protection Plan.

Approximately 80 experts, mostly from industry but also from the government, came up with the ITSRA, said Bob Dix, chairman of the IT SCC and vice president of government affairs and critical infrastructure protection for Juniper Networks. The IT SCC is made up of IT companies, professional service firms and IT trade associations.

Officials say the document is meant to provide an all-hazards risk profile that the IT sector can use to inform resource allocation for research and development and other protective program efforts. The assessment is “a baseline of national-level risk” and doesn’t deal with all threat scenarios faced by the IT sector, the document states.

In one example, the group identified the risk from the production or distribution of an untrustworthy critical product or service using an attack on a vulnerability in the supply chain. The experts said the consequence of this type of attack would be high but the likelihood of it occurring was low. The group also identified existing mitigations for that threat such as supply chain resiliency, sourcing strategies and product recall in response to compromised production.

The experts used virtual collaboration tools in their process to develop the document. The effort included three phases:
* Developing “attack trees” that describe how a function can be destroyed, incapacitated, exploited or diminished.
* Evaluating risk.
* Analyzing and reporting.

Unisys was awarded a task order for about $106,000 to test new encryption and "bit-splitting" technology at the U.S. Joint Forces Command.

The Blue Bell-based information technology firm said Thursday that it will be testing the Unisys Stealth Solution for Network, which is designed for information sharing for government and commercial organizations operating at different levels of security.

The one-year task order, awarded through the Defense Information Systems Agency's Encore II contract, will have Unisys providing tech support at the agency's sites in Norfolk and Suffolk, Va.

"This technology can address a long-standing challenge for the Department of Defense and other government agencies: how to simplify their networks without sacrificing security, while delivering significant cost savings," said Jim Geiger, managing partner, Department of Defense, Unisys Federal Systems.

By Romit Guha

Of DOW JONES NEWSWIRES

BANGALORE (Dow Jones)--Australia's Foster's Group Ltd. (FGL.AU) said Friday it is in talks with Wipro Ltd. (WIT) to outsource some of its information technology operations in the U.S., the U.K. and Australia, as the beer and wine maker tries to cut costs and consolidate its technology requirements by hiring a single service provider.

This would be the third such deal that Wipro, India's third largest software exporter, has received or is close to receiving in as many days. ...

The Association of Information Technology Professionals (AITP) offers professionals within the Pittsburgh area and Information Technology field, a way to connect.

AITP’s mission is to provide their members with programs and activities that will help them with career growth and community involvement. A majority of their Board of Directors are information technology professionals, but also mention representatives from other industries such as Manufacturing, Health Care Utilities, and Accounting Firms.


What you can find on the AITP Website:

* A Job Postings Page
* An Events Page
* Newsletter
* Discounts on Technical Products and Accessories

Belonging to AITP and networking with other like minded professionals can help you to advance in your career, knowledge, and skills.

Today, access to information is vital for a large portion of the “connected” population; connected to everyday’s information: News, emails, appointments, text messages, calls and videos. Via a variety of devices. Everywhere. Ubiquitous.
The paradox arises when there is a big change on how IT market operates. Before, IT products struggled to have a wide base of users. Today, users have their devices –PCs, servers, laptops, smart-phones, etc; ready to explore IT from everywhere. They longest jump came with the cell-phone to smart-phone transformation, their price drop result of the technology advances and commoditization of the data services for mobile devices.
Now think: potential users, avid to explore, and to take advantage of their data plans. Easy to use devices (full keyboards, wide screens, touch screens). Plenty of opportunities not only for the traditional IT vendors; but also for those who have a good idea and published it, like in the iPhone, Blackberry and Symbian communities.
Then, who has the power here? The users? The IT vendors? It seems to be a win-win situation, not even better than after a good negotiation. For the IT vendors, tons of possibilities, only limited by creativity; for the users, the opportunity to have their senses informed. It used to be “at your fingertips”, nowadays, listening and watching—even wearing. For the users: is there a real need to have the information ready all the time? Do you think the need is created by the products and services available?

Nokia Morph Concept
http://www.nokia.com/about-nokia/research/demos/the-morph-concept
http://www.youtube.com/watch?v=Zto6aTZM9t0

Job Description: BLH Technologies, Inc., is seeking an experienced Director of Information Technology with demonstrated success in planning, organizing, and executing all IT functions for its Rockville, MD, headquarters. The IT Director will be responsible for business plan development, team management, and project management and client relations. Primary responsibilities: direct and manage an IT division; formulate IT policies, procedures, and programs; ensure data and system integrity; evaluate overall operations of computing and information technology functions; and make recommendations for enhancements based upon strategic initiatives and directions.

Job Requirements: Education required: Bachelor’s degree in Information Technology, Management Information Systems, or Computer Science; Master’s degree preferred. Previous experience required: 8-10 years experience in IT sector with increasing responsibilities, 5 years of IT department management experience, 3-5 years of experience in software and database development, preferably in a Microsoft environment, and a broad understanding of computer systems, application, and operating systems, as well as analytical and problem solving skills. Must have demonstrated experience in implementing effective and innovative software development methodologies in order to manage a System Development Life Cycle as well as Federal contracting experience responding to RFPs, and securing new business, particularly with GSA buys.

The law firm Nixon Peabody LLP recently sent to clients an article explaining provisions of the Department of Health and Human Services' recent rule governing breaches of unsecured protected health information. Health Data Management received permission from the firm to publish the article. The firm emphasizes that the article is intended as an information source and readers should not act upon the information without professional counsel. Linn Freedman, a partner and head of the firm's health information technology division, is the author. The following is the article:

HHS issues breach notification requirements for covered entities and business associates

On August 19, 2009, the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued an interim final rule ("the Rule") related to the Health Information Technology for Economic and Clinical Health Act (HITECH) requiring covered entities under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and their business associates to provide notification to individuals of breaches of unsecured protected health information to unauthorized individuals. In addition, HHS issued an update to its guidance specifying the technologies and methodologies that render protected health information (PHI) unusable, unreadable, or indecipherable. Section 13402 of HITECH, enacted on February 17, 2009, requires HIPAA covered entities and their business associates that "access, maintain, retain, modify, record, store, destroy, or otherwise hold, use, or disclose unsecured protected health information" to notify the affected individual and the Secretary of HHS following the discovery of a breach of unsecured PHI. In addition, in some instances, HITECH requires notification of a breach to the media. Covered entities must provide the Secretary of HHS with a log of breaches on an annual basis, and the Secretary of HHS will post the list of entities that experienced breaches of unsecured PHI involving more than 500 individuals on the HHS website.

A breach means, generally, "the unauthorized acquisition, access, use, or disclosure of protected health information which compromises the security or privacy of such information."

HITECH defines "unsecured protected health information" as "protected health information that is not secured through the use of a technology or a methodology specified by the Secretary in guidance." The Secretary of HHS issued guidance on April 17, 2009, listing encryption or an encryption algorithm and destruction as two technologies rendering PHI unusable, unreadable, or indecipherable. HHS issued further guidance in the Rule that access controls do not meet the statutory standard for rendering PHI unusable, unreadable, or indecipherable, and that only encryption and the destruction of paper PHI render PHI unusable, unreadable, or indecipherable and therefore will relieve a covered entity or business associate from the breach notification requirement. Further guidance on accepted technologies and methodologies includes the requirement that encryption keys should be kept on a separate device from the data that they encrypt or decrypt and that valid encryption processes for data at rest and data in motion are consistent with NIST Special Publications.

The importance of covered entities and business associates implementing the technologies and methodologies outlined by HHS cannot be overemphasized. If a covered entity or business associate secures or destroys PHI by implementing encryption technology and destroying paper records according to the specified technologies and methodologies, then in the event of a breach, the covered entity will not be required to notify individuals of a breach.

The Rule distinguishes the definition of a "breach" from that of HITECH. Both HITECH and the Rule limit the definition of a "breach" to a "use or disclosure that compromises the security or privacy" of the PHI. The Rule clarifies that the definition, "compromises the security or privacy of PHI," means "poses a significant risk of financial, reputational, or other harm to the individual," which is more consistent with state breach notification laws. Accordingly, to determine whether a breach has occurred, covered entities and business associates will need to perform a risk assessment regarding the level of harm that may befall the individual as a result of the disclosure. It is important for covered entities and business associates to establish breach notification policies and procedures in order to comply with the Act, and regulations as a specific risk assessment must be done on a case-by-case basis.

The Rule outlines an exception to the breach notification requirement relating to a limited data set (created by removing 16 direct identifiers of PHI). If there is a breach of a limited data set, a covered entity or business associate will have to undergo a risk assessment as in any other breach, but if the information disclosed does not include ZIP codes or dates of birth and the risk assessment indicates that the risk of re-identification poses no significant risk of harm to any individuals, then breach notification to the individual is unnecessary.

The Rule also provides three exceptions to the definition of breach:

1. The unintentional acquisition, access, or use of PHI by an employee or individual acting under the authority of a covered entity or business associate if it was made in good faith, within the course and scope of employment or professional relationship, and does not result in further use or disclosure
2. Inadvertent disclosure of PHI between similarly authorized personnel or within the same facility
3. A disclosure in which an unauthorized person to whom PHI has been disclosed would not have been able to retain the information

The rule requires a covered entity to notify an individual "without unreasonable delay and in no case no later than sixty (60) calendar days after the date the breach was discovered by the covered entity." The purpose is to give covered entities and business associates time to conduct an investigation and to determine whether there was a breach of unsecured information that poses a significant risk of harm to any individual. The notice must be written in plain language and must include:

1. a brief description of what happened, including the date of the breach and discovery of the breach;
2. a description of the type of unsecured PHI that was involved in the breach;
3. any steps individuals should take to protect themselves from potential harm resulting from the breach;
4. a description of the investigation into the breach, mitigation of harm to individuals, and protection against further breaches; and
5. contact procedures, which must include a toll-free telephone number, an email address, website, or postal address.

If the breach involves more than 500 individuals, notice must be provided to prominent media outlets and to the secretary of HHS through a press release. Interestingly, the Rule provides that if the breach involves individuals residing in more than one state, notification to prominent media outlets is required only if more than 500 individuals of one state are involved. Accordingly, if there was a breach of information of 600 individuals, 200 individuals residing in three different states, notification would be required to the individuals and the Secretary of HHS, but notification to the media would not be required. For breaches involving fewer than 500 individuals, a covered entity must maintain a log and submit the log annually to the Secretary of HHS.

HITECH and the Rule require a business associate to provide notification of a breach to the covered entity so that the covered entity can notify affected individuals. In addition to the specific identification of the affected individuals, business associates must provide any other available information that the covered entity is required to include in the notification to the individual and therefore, the Rule suggests that the business associate not delay initial notification of the breach to the covered entity in order for the covered entity to be able to collect the information needed for the specific notification.

HITECH and the regulations require covered entities and business associates to develop and document policies and procedures for notification of individuals, train workforce members on the policies and procedures and implement sanctions for a failure to comply with the policies and procedures. In addition, covered entities and business associates should maintain documentation regarding notifications made, the risk assessment performed and the analysis made to determine that an exception applied to substantiate that notification was not required.

It is extremely important that the breach notification compliance program of covered entities and business associates contain sufficient documentation of the risk assessment and response to the breach as they bear the burden of demonstrating that no breach occurred because it did not pose a significant risk of harm to the individual. In addition, in order to invoke the exception with respect to limited data sets, the covered entity must be able to demonstrate that the information did not include ZIP codes or dates of birth.

Finally, the Rule acknowledges that many states have adopted breach notification laws that may be contrary to the federal regulation. Accordingly, the Rule proclaims that contrary state breach notification laws will be preempted by the HHS breach notification regulations. A state law is contrary if "a covered entity could find it impossible to comply with both the state and federal requirements or if the state law stands as an obstacle to the accomplishment and execution of the full purpose and objectives of the breach notification provisions in the Act." Accordingly, a covered entity, as part of its breach notification policies and procedures, will have to determine whether the state law of the state in which the individual resides is contrary to the federal breach notification regulations to determine whether preemption applies.

The regulations will be effective 30 days after they are published in the Federal Register and include a 60-day public comment period. Based on concern expressed during the comment period, discretion will be used in imposing sanctions for failure to provide notifications of breaches that are discovered before 180 calendar days from the publication of the Rule.

It is imperative that covered entities--including physicians, dentists, ambulatory care centers, kidney dialysis centers, family planning clinics, home care services, mental health and drug rehabilitation centers, medical laboratories, hospitals and nursing facilities, health insurance firms, third-party administrators, health plans, and pharmacies--and their business associates develop and implement breach notification policies and procedures, including a procedure for risk assessment, in order to comply with the HITECH Act breach notification regulations.

For more information on related topics, visit the following channels:

* Data Security
* Policies/Regulation
* Stimulus
* Hospitals
* Group Practices
* Payers

AMR Corp., the parent of American Airlines, said Wednesday that it plans to scrap its computer system for a next-generation version centered around passenger data and built by Hewlett Packard Co.

The new technology will be rolled out over the next four years and will largely replace Sabre, the 50-year-old computer platform at the heart of American's operations.

That early computer reservation system, created by Texas-based American and New York-based IBM Corp. in the 1950s, was largely adopted – or copied – by the rest of the airline industry and eventually spun off into a separate company.

"This is big news," said Henry Harteveldt, travel analyst with Forrester Research Inc. "What American is doing is the equivalent of a brain transplant, heart transplant and a lot of plastic surgery, all simultaneously."

But changing information technology at airlines rarely goes smoothly, given the size and complexity of their operations, noted aviation consultant Robert Mann.

Passengers have suffered myriad problems this decade, from kiosk meltdowns to lost reservations, as airlines tried to upgrade or install new technology.

Adding to the challenge for American: it plans to create a brand-new system with HP rather than install technology from the dozen or so vendors that cater to the airline industry.

Air Canada earlier this month announced that it was suspending work on Polaris, a new reservation system developed by ITA Software that was running about two years behind schedule.

"The track record on large-scale airline systems developed by so-called 'next-gen' vendors has been pretty dismal," Mann said. "It's been late and not-so-great."

American officials are convinced they will change how airlines are run by employing state-of-the-art hardware and software.

The nation's second-largest carrier, like its peers, has separate databases for reservations, frequent-flier programs, fares and operations, Harteveldt said.

But American plans to create a single database for all of its operations, built around passenger information rather than ticket transactions. Doing so will minimize systems crashes. The carrier will be able to use travel patterns as it tailors its marketing to individual customers, or to quickly identify service break-downs that they identify.

To control costs and minimize the shock to its system, American plans to tackle the overhaul in piecemeal fashion, installing one "module" at a time over a four-year stretch, Monte Ford, American's chief information officer told reporters during a conference call Wednesday.

Many of the breakthroughs of the news system -- faster processing speeds, greater flexibility and reliability -- would not be noticeable to customers.

But the new platform would allow American to use social networking tools to help workers coping with massive delays at an airport share information with each other, and with passengers, Ford said.

Ford wouldn't discuss how much American is spending on its new computer system, but analysts think its expenditures could easily run into the hundreds of millions of dollars.

"We'll certainly be looking at how capital expenditures change to get some insight into this," Harteveldt said. "But American would not be investing in this if it were not providing tangible benefits to the rest of the company."

jjohnsson@tribune.com

Syracuse University students are very lucky to have an exceptionally comprehensive and helpful Information Technology Services department. But I want to give you a few tips to keep your electronics and personal information safe while getting the most out of the technology Syracuse University offers.

Setting up your Internet connection is the first step. By now, most of you have figured out how to connect a computer to AirOrangeX. If not, give ITS a call at 315-344-2677 or visit their new wiki Web site, answers.syr.edu.

If you ever need to visit ITS there are two locations: the Goldstein Student Center and the Center for Science & Technology in the Life Sciences Complex. When you go, be sure to bring a copy of your computer's operating system on a CD or DVD. If you left it at home, I would suggest having someone living at home mail it to you.

You can visit an ITS center if your hard drive crashes or you lose information at some point for any reason, but, while ITS is always kind and efficient, they can't always retrieve your data. Get a backup hard drive and use it on a daily or weekly basis (120 gigabytes should be enough). To be on the safe side, also be sure you are using some form of antivirus software on your computer - yes, even if you have a Mac.

When it comes to your pictures, be careful which ones you chose to share and with whom. Let me put this easily and frankly: If you wonder whether or not it's a good idea to put it on Facebook, it's probably not. The same applies for any sort of public posts. They are there forever, even if you delete them. Just think twice, and consider utilizing the site's privacy settings.

In orientation they also introduced you to the servers that hold your online information for SU: SUmail, MySlice and Blackboard, all of which use your NetID and password. This is great because students don't have to memorize numerous names and number combinations for all SU Internet applications.

That being said, it is also quite risky to have all your personal information locked with the same code. What that means is never, ever give anyone your password. You wouldn't give anyone your bankcard and pin number, so why give your NetID password? With a single password, people can have access not simply to your classes but also your Bursar account, financial aid and housing. If you ever, for whatever reason, feel that your information may be compromised, contact ITS immediately.

It's not simply your personal information that needs to be protected; your computer does, too. Though I wouldn't say robbery is a major problem on campus, you can never be too safe. With that in mind, don't leave your computer unattended anywhere. Or if you are going to leave it, be sure to lock it up with a security cable that can be purchased at the SU Bookstore. Furthermore, if you want to be extremely safe, get another one for your TV and, if you have one, your video game system. Also, always lock your dorm door.

Have a great year and be safe both on and offline.



Ben Tepfer is a sophomore television, radio and film major and the technology columinst . His column appears every Tuesday. He can be reached bstepfer@syr.edu.

Venture capitalists invested more in health care than information technology last quarter for the first time in a quarter this decade. That shift is likely to correct itself as the economy improves, but there is a trend that does have legs: emerging opportunity at the intersection of both fields.

IBM’s Anatomic Symbolic Mapper Engine, which allows doctors to visualize patient medical records.

New efforts to overhaul the health care system is creating opportunity for a new generation of health care-IT hybrids. The federal stimulus law, which allocates $19 billion to health care-IT, combined with Congress’s efforts to provide health insurance to the uninsured, is enticing entrepreneurs and investors alike. “I have seen a marked increase in deal flow to capture the $19 billion in stimulus spending,” said Michael Greeley, general partner of Flybridge Capital Partners.

In the second quarter, venture firms injected $90 million into 19 financing rounds for medical software companies, up from $63 million in 15 rounds in the first quarter, according to VentureSource, which, like this newsletter, is owned by Dow Jones & Co. While this investment area is still small relative to the entire health care sector, the uptick signals a shift in VCs’ view of health care-IT, historically a minefield for small companies, which have struggled with the long sales cycles of hospitals, insurers and other big clients.

Part of the shift can be traced to the success of athenahealth Inc., a provider of physician-billing and practice-management services that went public in 2007 and is now valued at $1.3 billion. Bryan Roberts, a partner with athenahealth backer Venrock, said health-IT is starting to draw VCs who haven’t invested in the field before.

“I’ve gotten calls from a variety of venture firms, saying, ‘Hey, we’re really interested in this area, will you come talk to us about it?’” he said. One Venrock medical-IT start-up has received 10 term sheets in three weeks for a Series B round, at a material step-up in valuation, he said.

The stimulus law provides financial incentives for physicians to exchange paper health records for electronic ones, which creates opportunity for providers of solutions to store and share sensitive patient data. Technologies for monitoring patients remotely, and keep them out of the hospital, will also be in demand because of their ability to hold down health care spending, some investors contend.

But any start-up seeking to sell a medical-IT business idea to venture firms must show that its product improves cash flow, said Venrock’s Roberts. “The real hitch has been whether the product is a nice–to-have or a have-to-have,” he said. “If you’re a have-to-have, the sales cycle is tolerable; if you’re a nice-to-have, it’s awful.”

Hospitals aren’t the only potential targets for health-IT tools. Consumers are increasingly being called upon to manage their own health care, and will need tools to do so. That opportunity is drawing firms such Atlas Venture and Ignition Partners, which are bankrolling a stealthy San Francisco start-up, Keas Inc., which plans to provide patients with custom action plans to improve their health.

At the sweet spot where information technology, joint forces and industry intersects lies perhaps the most important strategy in a new era of warfare: the coalition of capabilities, said the vice chairman of the Joint Chiefs of Staff, Marine Corps Gen. James E. Cartwright, at the Air Force’s annual IT conference Monday.

The “tremendous advantages in networking organizations” available to today’s warfighter is a valuable tool that will be necessary to conquer an enemy constantly on the move, Cartright said, according to reported remarks. Cartwright made his remarks during a keynote address at the Air Force Information Technology Conference in Montgomery, Ala.

While advanced IT may be the AK-47 of modern warfare, military and government will need to move faster to leverage any lead U.S. forces may have over the adversary. Such a move will require a cultural shift that incorporates a willingness to take risks, Cartwright said.

“There are no laws against moving faster. There are policies against moving faster – policies we wrote. Policies are things we can control, if we can move the culture with us,” Cartwright said, according to a report from the American Forces Press Service.

IT’s rapid development presents a major hurdle for a military procurement timeline that typically requires several years from design to deployment of new capabilities, he said.

Richard Lombardi, director of the 554th Electronic Systems Wing, agreed with Cartwright, the Air Force News Service noted. Faster evolution of the Air Force and Defense Department as a whole relies on three key tenets: rapid acquisition, operability at the core and the ability to fight through a cyber attack, Lombardi said.

The Anita Borg Institute for Women and Technology (ABI) announced today the winners of this year’s Anita Borg Social Impact and Technical Leadership Awards and the Denice Denton Emerging Leader Award. The winners will be honored for their accomplishments and contributions to women in technology at an awards ceremony on October 1, 2009, during ABI’s 9th Grace Hopper Celebration of Women in Computing (GHC) in Tucson, Arizona.

The Anita Borg Social Impact Award honors an individual or team that has caused technology to have a positive impact on the lives of women and society or has caused women to have a significant impact on the design and use of technology. The 2009 award winner is Ekaterina Fedotova. Ekaterina Fedotova is the IDEA (Information and Dissemination & Equal Access) Project Director, a community-based network providing basic and job-related computer skills training to increase employability among underserved, disadvantaged populations in 51 cities across Russia's 22 regions. As Director of the IDEA project, she has motivated social change and empowerment through technology and opened the minds of generations of women and the broader community, to how they can use technology to improve their lives. The Anita Borg Social Impact Award is underwritten by Microsoft.

The Anita Borg Technical Leadership Award is given to a woman who has inspired the women’s technology community through outstanding technological and social contributions. This year’s winner, Ruzena Bajcsy is Professor of Electrical Engineering at the University of California, Berkeley where she is also Director Emerita of the Center for Information Technology Research in the Interest of Society (CITRIS), Over the past four decades Bajcsy has had an astounding impact in the fields of active vision, computer vision algorithms for medical imaging and telepresence. Dr. Bajcsy has pioneered new research fields, guided national policy regarding and lead the computing community in addressing social issues. She has broken barriers and opened up access for women as a role model, mentor and advocate. The Anita Borg Technical Leadership Award is underwritten by Cisco.

The Denice Denton Emerging Leader Award is given each year to a junior non-tenured faculty member under the age of 40 at an academic or research institution pursuing high-quality research in any field of engineering or physical sciences while contributing significantly to promoting diversity in his/her environment. The 2009 Denice Denton Award winner is Nadya Mason, Assistant Professor of Physics at the University of Illinois at Urbana-Champaign. Dr. Mason's research focuses on electron behavior in low-dimensional, correlated materials, where enhanced novel interactions are expected to give novel results. In addition to her research, Dr. Mason is a spokesperson for increasing diversity in physics and for creating a climate in academia that embraces and supports minorities and women. The Denice Denton Award is underwritten by Microsoft.
The world’s largest gathering of women in computing in industry, academia, and government, GHC is a four-day technical conference designed to bring the research and career interests of women in computing to the forefront. Conference registration is open until September 25, 2009. For more information, go to www.gracehopper.org.

About the Anita Borg Institute for Women and Technology (ABI)

The Anita Borg Institute provides resources and programs to help industry, academia, and government recruit, retain, and develop women leaders in high-tech fields, resulting in higher levels of technological innovation. ABI programs serve high-tech women by creating a community and providing tools to help them develop their careers. ABI is a not-for-profit 501(c)(3) charitable organization. ABI Partners include: Google, Microsoft, HP, Cisco, Intel, National Science Foundation, NetApp, SAP, Sun Microsystems, Symantec, IBM, Lockheed Martin, Thomson Reuters, CA, Intuit, Amazon, Facebook, Raytheon, and Genentech. For more information, visit www.anitaborg.org.

The US Department of Homeland Security and the Information Technology Sector Coordinating Council (IT SCC) have released the ‘IT Sector Baseline Risk Assessment’ (ITSRA) to identify and prioritize national-level risks to critical sector-wide IT functions while outlining strategies to mitigate those risks and enhance national and economic security.

The ITSRA validates the resiliency of key elements of IT sector infrastructure while providing a process by which public and private sector owners and operators can continually update their risk management programs. The assessment links security measures to concrete data to provide a basis for meaningful infrastructure protection metrics.

“The IT Sector Baseline Risk Assessment is an example of what can happen when public and private sector partners work together and represents a major step forward in mitigating risks to critical infrastructure functions that are essential to both homeland and economic security,” said DHS Assistant Secretary for Cybersecurity and Communications Gregory Schaffer. “While elements of the assessment have already been adopted, the establishment of this iterative platform for assessing IT sector risk will also enable us to address ever more sophisticated threats.”

“Private sector owners and operators of this nation’s critical infrastructure manage risk on behalf of their customers and their internal operations every day, and the risk assessment validates the overall resiliency of that infrastructure. Industry and government, however, need to understand the risk across the entire IT Sector,” said IT SCC chairman Bob Dix. “This dynamic process and its tangible results provide an opportunity to collectively manage risk at the national level, and we are already working on applying the findings of the IT Sector Baseline Risk Assessment to better mitigate risk, making the IT sector and the nation more resilient and secure.”

The ITSRA also identified overarching areas for additional study that will further enhance the sector’s resiliency, including further evaluation of the risks to the identity management function; analysis of the risks of manmade unintentional threats; and evaluation of the feasibility of establishing a national-level testing and simulation risk assessment capability.

8/25/2009 - MAXWELL AIR FORCE BASE, Ala. (AFNS) -- The Air Force Information Technology Conference opened Aug. 24 in Montgomery, Ala., with keynote addresses from the vice chairman of the Joint Chiefs, the Air Force chief of staff and the CEO of McAfee, Inc.

Collaboration emerged as a key theme in the opening day of the conference, which is now in its 26th year.

The modern warfighter has found "tremendous advantages in networking organizations," Gen. James Cartwright, vice chairman of the Joint Chiefs, told attendees, saying that the conference is a valuable tool in learning how to leverage information technology advantages, he said.

The event boasts more than 200 vendors, 120 seminars and 5,800 registered attendees.

"My hat is off to you in the information technology community," Gen. Norton Schwartz, Air Force chief of staff, said in his address. "You are key to how we concentrate our efforts and collaborate."

The IT backbone allows interconnectivity between advanced weapon and command and control systems, the general noted, maximizing effectiveness in air, space and cyberspace operations.

Professionals from across the government and private sectors will gather for the next three days to collaborate and share on the latest technology and its benefits for the Air Force and the Department of Defense as a whole.

"We're proud of the relationship we have with the Air Force," said Mr. David DeWalt, McAfee CEO and a keynote speaker. "We need to develop stronger threat intelligence. This relationship provides a great opportunity."

Collaboration was also on the mind of U.S. Representative Bobby Bright, the congressional representative from the 2nd District in Alabama, which includes the city of Montgomery.

"This is the ideal event to mesh small business and our military community together," said Mr. Bright, who serves on the House Armed Services Committee.

Mr. Bright welcomed the group to Alabama. The congressman, as well as Mr. John Caporal, deputy director of the Air Force's Small Business Programs, will speak to the small business forums taking place later in the week.

Conference forums and events support the conference theme, "The Warfighter's Edge in Battlespace," highlighting how information technology contributes to the joint fight.

The rapid evolution of the Air Force and the Department of Defense necessitates focus on three tenets, according to Richard Lombardi, the 554th Electronic Systems Wing director. These are rapid acquisition, operability at the core and the ability to fight through a cyber attack.

Winning, both on the battlefield and in cyberspace, requires the leveraging of a variety of cyber systems, General Cartwright said.

"In the art of war, where does (information technology) fit?" the nation's second highest ranking military officer asked.

And risk, though inevitable, cannot stop progress toward applying technology on the battlefield.

"Can we afford to step aside because there might be risk?" the general asked. "The answer is no."

The Department of Defense, in collaboration with private industry, must learn to find a balance between the vulnerabilities and advantages of technology, he said.

Conference attendees will have the opportunity to hear other keynote speakers on a variety of topics throughout the week, including Lt. Gen. William Lord, chief of warfighting integration and chief information officer for the Air Force, and Lt. Gen. Carroll Pollett, director of the Defense Information System Agency and commander, Joint Task Force-Global, Network Operations.

(Jessica Casserly contributed to this article)

Matt Chapman, Vice President & Information Technology Manager. (PRNewsFoto/Oxford Bank Corporation)

OXFORD, MI UNITED STATES




OXFORD, Mich., Aug. 25 /PRNewswire-FirstCall/ -- Oxford Bank, a subsidiary of Oxford Bank Corporation (OTC Bulletin Board: OXBC), announced today the appointment of Matt Chapman to vice president and information technology manager.

(Photo: http://www.newscom.com/cgi-bin/prnh/20090825/DE65929 )

Mr. Chapman brings 12 years of experience in the technology field to his new position, including three years in senior-level management positions. Most recently, he served as the vice president of information systems for a community bank located in Fenton, Michigan. His new responsibilities will include the oversight of all IT operations; specifically the selection, design, implementation and support for all information and operating systems, computer hardware, data and voice communications, software applications and data processing.

A resident of Fenton, Michigan, Mr. Chapman holds a Bachelor of Science degree in computer technology and information technology from Central Michigan University.

Oxford Bank Corporation is a registered holding company. Its subsidiary, Oxford Bank, is the oldest commercial bank in Oakland County, celebrating its 125th year in 2009. The Bank was recently voted the Best Bank in Oakland County by the readers of the Oakland Press and has earned the 1st Place Readers Choice for Best Bank by the readers of the Clarkston News (July, 2009), and Oxford Leader and the Lake Orion Review (December, 2008). It operates eight full-service offices in Clarkston, Davison, Dryden, Goodrich, Lake Orion, Oakland Township, Ortonville and Oxford, along with a consumer lending center in Oxford and a commercial banking office in Lake Orion. The Bank has operated continuously under local ownership and management since it first opened for business in 1884. For more information about Oxford Bank and its complete line of financial services, please visit www.oxfordbank.com.

The Healthcare Information Technology market in Southeast Asia, China, Japan and Australia (APAC) grew nearly 12 percent annually between 2005 and 2008, according to new data published by international research hub Frost & Sullivan.


Although the APAC HIT market represents currently only 2.1 percent of the total healthcare market worldwide, Frost & Sullivan (News - Alert) estimates it grew to $5 billion in 2008. That’s a figure could double if not triple that in the next 10 years, the research firm contends.

And when that happens, these regions will see significant improvements in patient safety and efficiency – plus a reduction in adverse events caused by human error.

“The HIT is here to stay with even more ubiquitous presence in all aspects of healthcare delivery systems,” said Dr. Pawel Suwinski, a Frost & Sullivan senior consultant who covers the APAC market. “Moreover, it will be the main factor and driver in the transformation of healthcare industry towards translation care by providing common collaboration platform for information processing and exchange between related sciences and industries.”

In recent years, healthcare organizations have set aside substantially more money on computer technologies, Suwinski notes. In fact, the health-care industry is now one of the major consumers of Information and Communication Technologies (ICT) products and services. As more APAC healthcare organizations upgrade their equipment and adopt new computer-based technologies, analysts say preventable human errors – those external and internal variables that can affect the quality of care – will drop off.

"Fifty percent of the medical practice activities can be controlled,” Suwinski says. “The remaining 50 percent depends solely on human judgment and cognitive functions that when unfavorable conditions are present could lead to substandard care.”

Frost & Sullivan noted that the implementation of HIT can improve the quality of care by providing up to 80 percent better control in the medical setting.

One caveat: While decreasing the legal risks of traditional medical practices, the use of HIT introduces legal implications. For example, a hospital might become the subject of corporate negligence action if they violate the standard of care (perhaps through inadequate oversight of staff physicians) by allowing an electronic health record or other technology to be used in such a way to cause harm to patients.

However, this kind of snafu can be avoided by taking proper preventative measures, Suwinski notes. These include as training staff to ensure efficient use of new systems, documenting all information thoroughly, and preventing alterations to records without proper documentation.

Follow ITEXPO (News - Alert) on Twitter: twitter.com/itexpo

There is a big scandal brewing at the Veterans Affairs Office. According to the VA's inspector general, $24 million in bonuses has been paid to thousands of technology office employees for the past two years. There are also allegations of nepotism in the technology office.

Bonuses to high-level VA employees for the past two years included sums of $73,000, $59,000 and $58,000. In all, 4,700 VA employees received a bonus in 2007. The average bonus was $2,500. A now-retired VA official, Jennifer S. Duncan, received $60,000 in bonuses herself and engaged in nepotism, claims the VA inspector general. Other VA employees, the report charges, paid college tuition for other employees.

Why are bonuses being handed out like candy at the VA? Bureaucrats playing around with taxpayers' money is, unfortunately, nothing new. However, what makes this particular corruption so outrageous is that while the VA has been tossing our tax dollars to each other, many veterans, including wounded ones seeking disability checks they earned on battlefields, have been left waiting for their checks.

The VA's technology office, where the alleged corruption has occurred, has been charged by President Barack Obama to improve its information technology so that a current backlog of disability checks can be eliminated. The administration wants checks to be issued seamlessly and without delay.

As we mentioned, so far that has not happened. Many disabled vets have been waiting months for their delayed checks. How disgusting that the VA office entrusted with helping our vets spent a considerable amount of energy handing money to each other.

This isn't the first time the VA has slapped obscenely large, unearned bonuses to employees. In 2006, VA employees received $3.8 million in bonus checks.

Apparently nothing was learned from that incident of greed. It is frustrating to witness so many cases of persons entrusted with our tax dollars spending recklessly or greedily filling their own coffers. Look at the health care debate, where Big Pharma fills pols' campaign coffers with hundreds of billions of dollars and wins such cost-busting concessions as long delays before super-expensive medications can go generic in the U.S.

Members of Congress have promised an investigation into the VA's latest financial shenanigans. We hope they do a thorough job and that it leads to the VA cleaning up its operations. A better emphasis on getting checks to vets and an end to bonuses would be a great start.

Aug 26, 2009 (M2 PRESSWIRE via COMTEX) -- TC | Quote | Chart | News | PowerRating -- Las Vegas CRWENews.com reveals a stock highlight watch on NewMarket Technology, Inc. (Pinksheets:NWMT - News) and NewMarket Colombia, SAS, a wholly-owned foreign subsidiary headquartered in Bogota, Colombia, announced August 25, 2009 a three-year, $33 million outsourcing agreement with WBA (Wireless Broadband Access) Telecommunications, S.A. of Bogota, Colombia, under which WBA will outsource substantially all of its current operations to NewMarket Colombia. This is NewMarket's second major outsourcing agreement signed this year. NewMarket previously announced a similar agreement in Shanghai, China earlier this year. Approximately $25 million of NewMarket's $95 million in annual revenue reported in 2008 came from Latin America through the Company's operations in Brazil, Chile and Venezuela.
Thompson Creek Metals Company Inc. (TSX: TCM; NYSE: TC | Quote | Chart | News | PowerRating) (the "Company") announced August 25, 2009 that it has entered into an agreement with a syndicate of underwriters for a bought deal public offering of 15,500,000 common shares of the Company (the "Securities") at a price of C$14.00 per common share. The Company has also granted to the underwriters an over-allotment option, exercisable for a period of 30 days from the date of closing of the offering, to purchase up to an additional 2,325,000 Securities at the offering price.

SRA International, Inc. (NYSE: SRX), a leading provider of technology and strategic consulting services and solutions to government organizations and commercial clients, announced August 25, 2009 it has been awarded a task order by the U.S. Department of Homeland Security (DHS) Transportation Security Administration (TSA) under the EAGLE contract vehicle to monitor their information technology (IT) enterprise and assess IT security threats. The task order value is over $53 million, if all options are exercised, and will provide core primary and failover security operations center (SOC) services for up to five years.

Sign up and receive FREE Stock-PR alerts from CRWENews.com

http://www.crwenewswire.com/c/stock-pr About CRWENews.com

CRWENews.com is an independent electronic informative online financial news publication company dedicated in providing company associates, business and financial professionals with economic and investment information, as well as stock highlights. CRWENews.com is a division of Crown Equity Holdings, Inc.

CRWENews.com is not a registered investment advisor or broker-dealer. CRWENews.com and Crown Equity Holdings, Inc., (CRWE) affiliates, officers, directors, contractors and employees, including may buy and sell additional shares in any company mentioned herein and may profit in the event those shares rise in value. Please do your own Due Diligence before investing in any of the stocks mentioned above.

We encourage investors to join and receive FREE Stock-PR alerts from CRWENews.com. http://www.crwenewswire.com/c/stock-pr and view our full disclaimer.

Forward-Looking Statement: This release may contain forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. All forward-looking statements and/or Safe Harbor Statement under the Private Securities Litigation Reform Act of 1995 are inherently uncertain as they are based on current expectations and assumptions concerning future events or future performance of the company. Readers are cautioned not to place undue reliance on these forward-looking statements, which are only predictions and speak only as of the date hereof. Risks and uncertainties applicable to the company and its business could cause the company's actual results to differ materially from those indicated in any forward-looking statements.

CONTACT: Kenneth Bosket, Crown Equity Holdings, Inc e-mail: ccollins@crownequityholdings.com Tel: +1 702 448 1543 Fax: +1 702 258 9007 WWW: http://www.crwenewswire.com

((M2 Communications disclaims all liability for information provided within M2 PressWIRE. Data supplied by named party/parties. Further information on M2 PressWIRE can be obtained at http://www.presswire.net on the world wide web. Inquiries to info@m2.com.

To receive FREE Mobile Stock Alerts formatted especially for your cell phone, text the word "press" in the subject line to 68494.

*** This free service can be discontinued at any time by replying to any one of the alerts with the word "stop."

For more information, please visit www.WallStreetNewsAlert.com and you can also follow Wall Street News Alerts on Twitter at http://twitter.com/wsna.

There is important news coming from NewMarket Technology, Inc. (PINKSHEETS: NWMT), as the company has just announced its second major outsourcing agreement signed this year. Yesterday after the markets closed, the company and NewMarket Colombia, SAS, a wholly-owned foreign subsidiary headquartered in Bogota, Colombia, announced a three-year, $33 million outsourcing agreement with WBA (Wireless Broadband Access) Telecommunications, S.A. of Bogota, Colombia, under which WBA will outsource substantially all of its current operations to NewMarket Colombia.

This is NewMarket's second major outsourcing agreement signed this year. NewMarket previously announced a similar agreement in Shanghai, China earlier this year. Approximately $25 million of NewMarket's $95 million in annual revenue reported in 2008 came from Latin America through the Company's operations in Brazil, Chile and Venezuela.

"We are excited to enter the Colombian market with WBA and expand our reach in Latin America," stated President of Managed Services, Bruce Noller. "We believe NewMarket's financial and operational resources combined with WBA's existing Information Technology and Telecommunications expertise can lead WBA to winning larger contracts with private and public clients."

Francisco Teran, President of WBA, stated, "We believe that because of NewMarket's track record of experience and presence in Latin America we will be able to offer an even greater array of services in Colombia and throughout the region."

The stock closed yesterday at Fifty Three cents a share.

For an in-depth profile of NewMarket Technology, visit http://www.wallstreetnewsalert.com/view-company-profiles.php?profile=NWMT_082409.
CIO, CTO & Developer Resources

Dell Inc (NASDAQ: DELL) down 1.4% on 26.1 million shares traded.

Dell Inc. listens to customers and delivers innovative technology and services they trust and value.

Apple Inc. (NASDAQ: AAPL) up 0.2% on 11.5 million shares traded.

Apple ignited the personal computer revolution in the 1970s with the Apple II and reinvented the personal computer in the 1980s with the Macintosh. Today, Apple continues to lead the industry in innovation with its award-winning computers, OS X operating system and iLife and professional applications.

Market Commentary:

Oil News: U.S. crude oil dropped $2.32 to settle at $72.05 a barrel, down from a high of $75, in the biggest percentage loss since August 14. Brent crude dropped $2.44 to $71.82.

Let Wall Street News Alert help advertise for your company using our effective awareness campaigns. If you're interested in telling your story, we can help. Contact us at info@wallstreetnewsalert.com.

WSNA's email alert service is free to those investors who sign up on the WSNA home page. The alert service is designed to notify investors of often-overlooked stocks. Subscribers are introduced to Special Situation companies that have the potential of showing increased activity. The Wall Street News Alert home page has experienced over 200 million hits. To subscribe to this free service, visit the Wall Street News Alert home page at http://www.wallstreetnewsalert.com.

*** It has come to the attention of Wall Street News Alert (WSNA), that various persons or companies distribute faxes bearing similar names to Wall Street News Alert. Wall Street News Alert is not affiliated with faxes bearing names such as: Wall Street Stock Alert, Wall Street Investor Alert, Wall Street News Alert or any other fax using various combinations of the generic words Wall Street.***

Wall Street News Alert is a division of Wall Street Capital Funding LLC (WSCF). WSCF also maintains a contractual, working relationship with Stock Market Alerts LLC and its' Wall Street Enews brand. WSCF is not a registered broker/dealer and may not sell, offer to sell or offer to buy any security. WSCF profiles are not a solicitation or recommendation to buy, sell or hold securities. An offer to buy or sell can be made only with accompanying disclosure documents from the company offering or selling securities and only in the states and provinces for which they are approved. The material in this release is intended to be strictly informational. The companies that are discussed in this release have not approved the statements made in this release nor approved the timing of this release. All statements and expressions are the sole opinion of WSCF and are subject to change without notice. Information in this release is derived from a variety of sources including that company's publicly disseminated information, third parties and WSCF research. The accuracy or completeness of the information is not warranted and is only as reliable as the sources from which it was obtained. WSCF disclaims any and all liability as to the completeness or accuracy of the information contained and any omissions of material fact in this release. The release may contain technical inaccuracies or typographical errors. It is strongly recommended that any purchase or sale decision be discussed with a financial adviser, or a broker-dealer, or a member of any financial regulatory bodies. Investment in the securities of the companies' discussed in this release is highly speculative and carries a high degree of risk. WSCF is not liable for any investment decisions by its readers or subscribers. Investors are cautioned that they may lose all or a portion of their investment if they make a purchase in WSCF profiled stocks.

This profile is not without bias, and is a paid release. WSCF has been compensated for dissemination of company information on behalf of one or more of the companies mentioned in this release. For current services performed for NewMarket Technology, Inc. (PINKSHEETS: NWMT), WSCF has been compensated a total of Fifteen Thousand Dollars by third party, Everest Limited Inc., who is non-affiliated and may hold a significant position in the stock. WSCF holds no shares of the stock. WSCF may receive additional compensation for extension of its services. Any additional compensation will be disclosed at such time that WSCF is aware of a client's desire to extend the original services. WSCF may have received shares of a company profiled in this release prior to the dissemination of the information in this release. WSCF may immediately sell some or any shares in a profiled company held by WSCF and may have previously sold shares in a profiled company held by WSCF. WSCF's services for a company may cause the company's stock price to increase, in which event WSCF would make a profit when it sells its stock in a company. In addition, WSCF's selling of a company's stock may have a negative effect on the market price of the stock.

This release contains "forward-looking statements" within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E the Securities Exchange Act of 1934, as amended and such forward-looking statements are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. "Forward-looking statements" describe future expectations, plans, results, or strategies and are generally preceded by words such as "may," "future," "plan" or "planned," "will" or "should," "expected," "anticipates," "draft," "eventually" or "projected." You are cautioned that such statements are subject to a multitude of risks and uncertainties that could cause future circumstances, events, or results to differ materially from those projected in the forward-looking statements, including the risks that actual results may differ materially from those projected in the forward-looking statements as a result of various factors, and other risks identified in a company's annual report on Form 10-K or 10-KSB and other filings made by such company with the Securities and Exchange Commission. You should consider these factors in evaluating the forward-looking statements included herein, and not place undue reliance on such statements. The forward-looking statements in this release are made as of the date hereof and WSCF undertakes no obligation to update such statements.

Contact:
Company: Wall Street News Alert
Contact email: Email Contact
URL: http://www.wallstreetnewsalert.com

MONTGOMERY, Ala. - The U.S. military must leverage information technology to deliver capabilities to the battlefield and needs to catch up with technology before the nation falls behind in cyberspace, the vice chairman of the Joint Chiefs of Staff said here, Aug. 24.

Marine Corps Gen. James E. Cartwright shared his thoughts about cyberspace at the annual Air Force Information Technology Conference.

Most military capability has been built in reaction to known threats, the general said, but information technology can change that by providing processing power and storage that allow more comprehensive predictive analysis to the battlefield.

Cartwright compared manned fighter jets to unmanned systems, admittedly hitting close to home for the audience of airmen. "A fighter has -- among other things -- radar, and it carries bombs and missiles," he said. "The radar detects a target and feeds the information to the bomb or missile. It hits the target, and everything else that was detected or known by that platform is thrown away.

"If the enemy changes the target or affects the detection," he continued, "the platform is unusable, and we don't know what happened for several series of sorties, and events and days and weeks and months. Then, when it's time to change [the aircraft] because we've figured out what the adversary's doing, an upgrade can usually take years, because we want to make sure we're doing it perfectly the first time. Meanwhile, the enemy has moved on."

On the other hand, Cartwright noted, an unmanned aircraft system ""collects everything, records everything, and saves everything or [sends] it down to the ground."

Compared to a fighter, the unmanned aircraft system is more energy-efficient and can spend more time on station, and its information processing and storage capabilities can "fundamentally change what you don't know about the enemy," the general said.

The growth of information technology is so rapid that the military faces a huge challenge with procurement timelines that take two years to design a platform, three years to manufacture it and another year to field it, Cartwright said. This requires a change in the military's culture, he added.

"There are no laws against moving faster," he said. "There are policies against moving faster -- policies we wrote. Policies are things we can control, if we can move the culture with us."

Cartwright said that the shift in culture and policy requires leaders to be willing to accept some risk. He cited National Military Command Center in the Pentagon as an example. For decades, he said, the center relied solely on secure voice communications to reach key military and government decision makers during crises, because policy prevented the use of other communication methods. In July 2006, North Korea test-launched long- and short-range missiles, and thunderstorms in Washington caused the secure voice communications to fail.

"Decisions are made much quicker, and they are much better informed, when information can be exchanged visually and digitally," Cartwright said, "but we have policies against it because we don't want to risk that system being compromised. But our voice and circuit-based systems have vulnerabilities, too. Everything has vulnerabilities. The question is, how do you balance the risk and the advantage, and how do you keep moving in that environment, because it is never static?

"You have a thinking adversary who's going to try to outwit you; who's going to try to take away your leverage. "That's war. That's the business we're in," he continued. "So eliminating all possibility of failure is [impossible]. You get paid to work in those environments of ambiguity and diversity. You have to have fallback systems. But the resilience of networks far [outweighs] the resilience of circuit-based systems."

Cartwright challenged the audience to consider first how information technology can help to prevent and deter warfare, but also how it can ensure that no matter what happens in warfare, the United States will win.

"These are the things I expect from you, as officers, as [military] leaders and as industry leaders: that you lead through change and find the competitive advantage for this nation and for our military," he said. "It's absolutely essential."

Northrop Grumman Corp. will continue to provide the Army with information technology and network operations services under a five-year award that could be worth as much at $430 million if all options are exercised.

The indefinite delivery, indefinite quantity contract from the Army’s Intelligence and Security Command at Fort Belvoir, Va., calls for Northrop Grumman to maintain its full-spectrum information operations and computer networks operations services to the 1st Information Operations Command (Land) at Fort Belvoir, and its regional Computer Emergency Response Teams.

Northrop Grumman has provided that support to the Army’s 1st Information Operations Command since 1997, company officials said.

IO coordinates multiple battlefield functions such as electronic warfare, military deception, psychological warfare, operations security and CNO to disrupt enemy decision-making while protecting information necessary for U.S. warfighters to make critical decisions, the officials said.

Northrop Grumman’s teammates on the contract include JB Management, Alexandria, Va.; Quantum Research International Inc., Huntsville, Ala.; Lockheed Martin, Bethesda, Md.; SAIC, San Diego; and Booz Allen Hamilton and QinetiQ North America, both of McLean, Va.

Northrop Grumman, of Los Angeles, ranks No. 3 on Washington Technology’s 2009 Top 100 list of the largest federal government prime contractors.

A Wells Fargo analyst upgraded the offshore information technology and business process outsourcing sector on signs that its business slump may be bottoming.

Jennifer Fritzsche raised her rating on the sector to "Market Weight" from "Underweight." While cautioning that a business upturn is not yet apparent, she said there are signs the market is stabilizing especially in financial services as well as the North American market.

She cited anecdotal comments that point to a tick up in demand, although companies remain oriented towards short-term purchases with an eye towards keeping costs down.

However, prices seem to have bottomed out, Fritzsche said in a research note.

Leading companies in the sector have strengthening balance sheets, with "significant" net cash holdings that provide a buffer against the unknown, Fritzsche said.

Still, the analyst expects the economy to recovery slowly and thus revenue growth for the top offshore IT providers will take longer to rebound as well.

"While we seem to be past the near-death experience of this past winter ... a return to normal, pre-downturn pace, is unlikely before mid-2010, or later," Fritzsche said.

Shares of Cognizant Technology Solutions Corp. rose 39 cents to $34.85 while ExlService Holdings Inc. fell 14 cents to $12.54. Genpact Ltd. declined 23 cents to $12.80.

Infosys Technologies Ltd. shares advanced 28 cents to $42.53 and Syntel Inc. jumped 69 cents to $39.68. Wipro Ltd. shares rose 3 cents to $15.50 and WNS Holdings Ltd. slid 51 cents to $15.04

HP recently announced that it been selected by the U.S. Air Force via contract number is FA8771-05-A-0611, to provide new HP workstation and desktop PCs as part of USAF’s desktop, laptop and servers quarterly enterprise buy.


The Air Force Information Technology Commodity Council, which includes top Air Force officials, is said to have evaluated vendors’ submissions for the QEB and their ability to deliver quality enterprise computing in the toughest of environments. HP was chosen as the “best value” vendor through this evaluation process.

With this agreement, the company claims to have supplied more than 400,000 units of HP client products to the USAF throughout the continental U.S., Europe and Asia Pacific.

“This award demonstrates HP’s standing as a long-time premier technology provider and trusted IT innovator for the U.S. Defense market,” said Stephen DeWitt, senior vice president and general manager, personal systems group, HP.

“HP’s portfolio of products and solutions contributes to the daily administration and protection of our nation,” added DeWitt.

As per the terms of the deal, HP will include customized security configurations in compliance with USAF requirements and is said to meet strict specifications and tests.
The company also clarified in its statement that USAF facilities worldwide will use various HP platforms, including HP workstations and mobile workstations.

The QEB deal will include the HP xw4600 Workstation, along with Dual PCIe X16 Gen2 graphics interfaces which is said to offer up to four times the performance of previous graphics interfaces, along with the ability to power multiple displays. Additionally, with an 80 PLUS efficient power supply standard and electronic products environmental assessment tool registered configurations available, the HP xw4600 is designed to optimize energy use and maintain high-performance power.

Company officials also clarified that its EliteBook 8730w Mobile Workstation will be delivered in both standard and customized secure configurations to meet the USAF’s secure product category requirements.

The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) announced that EnerNex Corporation, Knoxville, Tenn., was awarded a contract to help NIST sustain the accelerated development of the hundreds of compatible standards that will be required to build a secure, interoperable smart electric power grid. NIST is obligating a portion of the American Recovery and Reinvestment Act funds allocated to NIST through the Department of Energy to the contract.



Awarded under an unrestricted, fully open and competitive process, the contract will run for up to two years if all options are exercised with an estimated cost of about $8.5 million.



EnerNex’s first task will be to establish and administer a Smart Grid Interoperability Standards Panel to identify, prioritize and address new and emerging requirements for Smart Grid interoperability and security. This work will further develop the initial NIST Smart Grid Interoperability Standards Framework (Release 1.0), expected to be released in September for public comment.



Release 1.0 will identify the first set of key standards and provide a road map for developing new or revised standards critical to Smart Grid development. It also will describe a reference model to help organize the Smart Grid and identify linkages among many varied Smart Grid components - including household appliances, utilities, windmills and electric vehicles.



The panel will interact with expert working groups, a cyber security coordination task group, and other volunteer technical bodies established by NIST during this first phase of its Smart Grid efforts.



The panel will consist of key Smart Grid stakeholders, including utilities, independent power producers, federal agencies, state regulators, equipment manufacturers, consumer groups and developers of information technology applications and devices. They will engage their peers in meetings set to begin the week of November 16, 2009, in Denver.



EnerNex will also work with NIST, the private-sector, and non-profit organizations to begin establishing a testing and certification infrastructure that will ensure Smart Grid-related software, hardware and services conform to standards.



In addition, the contract calls for EnerNex to build a publicly accessible “interoperability knowledge base.” It will contain information on Smart Grid standards, relevant activities of standards development organizations, and other types of information needed to guide standards development over the long term.



Under the Energy Independence and Security Act (EISA) of 2007, NIST has “primary responsibility to coordinate development of a framework that includes protocols and model standards for information management to achieve interoperability of Smart Grid devices and systems.”



The Smart Grid integrates information and networking technologies into the nation’s electric system to enable advanced control and communication capabilities. It is a key component of President Obama’s plans to achieve energy independence and to address climate change.



Greater efficiency, increasing use of renewable energy, and other Smart Grid benefits are expected to create jobs, reduce U.S. dependence on foreign oil, and help U.S. industry develop, apply and export clean energy technology.



As a non-regulatory agency, NIST promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

BY JUSTIN LAHART

It is summer storm season in Florida, and when lightning threatens, technicians at cable channel HSN fire up eight massive generators to ensure the home-shopping network won't lose power.

This time of year, HSN's generators get switched on two or three times a day. The St. Petersburg company is at the western edge of what meteorologists call Lightning Alley, a 50-mile-wide swath across Florida that gets more lightning than any other place in the U.S. To lose power, or even to have a brief surge or sag in its flow, could create havoc for the high-tech equipment on which the ...

WASHINGTON, Aug 25, 2009 (BUSINESS WIRE) -- Washington Management Group, the leading government contract consulting services firm, has released its newest round of GSA Schedule rankings for the following GSA Schedule contracts:

-- Schedule 70: General Purpose Commercial Information Technology Equipment, Software, and Services

-- Schedule 541: Advertising & Integrated Marketing Solutions (AIMS)

-- Schedule 23 V: Vehicular Multiple Award Schedule (VMAS)

-- Schedule 736: Temporary Administrative and Professional Staffing (TAPS)

Washington Management Group releases GSA Schedule rankings weekly, through its Wednesday Weekly newsletter.

WMG compiles the figures and provides rankings on top 10 large and small contractors, sales by SIN, market size, or year-over-year sales analysis.

While these figures are available directly through the General Services Administration (GSA), WMG takes the overall figures and provides them in a snap-shot view, most useful for government contractors.

In addition to the schedule information, the WMG Wednesday Weekly newsletter provides the latest GSA Schedule and VA Schedule contract news from a range of sources in and around the beltway - including WMG's own consultants.

To sign up to receive the Wednesday Weekly newsletter each Wednesday via e-mail, go directly to the "Contact Us" page of the Washington Management Group website.

For more information on Washington Management Group services, go to www.washmg.com, or call 866-964-9200.

About Washington Management Group

With more than 30 years of experience, Washington Management Group is the leading GSA Schedule contract and VA Schedule contract consulting services firm in the nation. Our knowledge of selling to the government is unsurpassed. In fact, members of our senior staff are former Assistant Commissioners at GSA, two of whom were the actual architects of the current GSA Schedule contract program.

WMG's subject matter experts provide GSA Schedule contract consulting services. We will help you prepare successful GSA Schedule contract proposals and pricing strategies, conduct contract negotiations, meet stringent compliance regulations, perform risk management duties and more. Headquartered in Washington, DC, our GSA consultants successfully represent hundreds of companies selling a wide array of services and products to the federal government.

SOURCE: Washington Management Group

ENC Marketing & Communications
Caryn Fox, 703-288-1620 x-104
cfox@encmarketing.com
www.washmg.com