BEIJING, China (CNN) -- Individual computer users in China may choose whether to install a controversial content filtering system, but the system will be installed on computers in any public place, China's minister of Industry and Information Technology said Thursday.
People sit at a wireless cafe in Beijing, using their laptop computers.

People sit at a wireless cafe in Beijing, using their laptop computers.

China announced earlier this year that it planned compulsory installation of the Green Dam-Youth Escort software, ostensibly meant to protect young online users from pornography.

The installation was postponed on June 30. Minister Li Yizhong said Thursday that his ministry was still working on its plans and that the Green Dam software was also being upgraded, China's state-run news agency Xinhua reported.

"Installation is intended to block violent and pornographic content on the Internet to protect children," Li said, according to Xinhua. "Any move to politicize the issue or to attack China's Internet management system is irresponsible and not in line with reality."

Businesses and computer users complained that the software left computers open to cyber attacks, while others worried that the software represented government interference in the free flow of information.

Trade groups representing the largest international businesses in China sent a letter directly to Premier Wen Jiabao on June 26. Read more about business concerns over Green Dam

The software requirement "raises serious concerns for us and poses significant questions in relation to security, privacy, system reliability, the free flow of information and user choice," the EU Chamber of Commerce, which also signed the letter, said in a statement.
Don't Miss

* Business complaints over 'Green Dam'
* China delays Green Dam Internet filter
* In-depth: China

Companies such as Intel, Microsoft and Yahoo built their business on transparency and free flow of information. Yet for all the capitalistic reforms since 1979, public information in China is still tightly controlled and government decision-making is opaque.

At stake is a market of about 300 million Internet users, according to the China Internet Network Information Center.

Green Dam is produced by Jinhui Computer System Engineering Co., which is said to have ties to China's military and security ministry. Zhang Chenmin, general manager of Jinhui, told the state-run news agency Xinhua that his company had received more than 1,000 harassing calls and death threats since news of the requirement and Jinhui's role were first reported in The Wall Street Journal in June.

Besides angry Chinese computer users, Jinhui faces accusations from California software maker Solid Oak that Green Dam copies code from its Cybersitter software for parental Internet-access control. Jinhui has denied the claim. Learn more about how China filters the Internet »

Corporations, typically reticent to publicly squabble with Beijing, are drawing a line on Green Dam because the software "is buggy. ... It's ineffective for its advertised purpose" of filtering pornography, but also can be easily manipulated so computers can be remotely accessed by unknown third parties, said Thomas Parenty, an IT security consultant in China and a former U.S. National Security Agency programmer.

Criticism of the new policy was rampant abroad, at home and even on China's own state-run media, a sign that officials may disagree about it internally.

The software dispute is the latest in a line of controversies between Western companies and the Chinese government.

In 2000, the government backed down on laws restricting importation of encryption software that would have banned Web browsers such as Microsoft Explorer, which include encryption functions.

In 2004, the government backed down on developing its own wireless Internet standard when Intel threatened to ban sale of its chips in China as a result.

More recently, Web browsing companies have had a complicated relationship with Chinese censors.
advertisement

Early last month, Google blocked search results for Tiananmen Square in China. In late June, it was reported that Google service in China was interrupted after government claims that it was contaminating the country with pornography. In 2005, Yahoo released user information that led to the arrest and 10-year sentence of a Chinese journalist.

Technology companies say they are obeying local laws concerning Internet use in China, but the companies have been criticized by members of the U.S. Congress for bowing to pressure from Beijing.

Published: 13 Aug 2009 11:02:01 PST

By Chen Xiaomin

Li Yizhong, minister of industry and information technology, talks to reporters after the news conference yesterday. Photo: IC

The Ministry of Industry and Information Technology will not directly get involved in ongoing negotiations over iron ore prices, Minister Li Yizhong said yesterday.

The ministry, which oversees 39 industries, said the country is supposed to have a bigger influence in that market.

“We should be united in iron ore talks and pick one entity to represent the country’s steel Industry to eliminate internal conflicts and disorderly competition,” Li said in response to a reporter’s question at a press conference.

Li said he was optimistic that business relations between the world’s largest iron ore importer and the three major supplier countries would remain stable, and a solution would be worked out due to their correlated interests, without government involvement.

The country has been working to obtain at least a 40 percent cut in iron ore price from the world’s three biggest mining companies – Vale of Brazil, Rio Tinto and BHP Billiton of Australia, instead of the 33 percent reduction reached between Rio Tinto and Japanese and South Korean mills.

The annual negotiation was extended one month after the normal deadline – June 30.

While the contract price negotiation reached a deadlock, spot price soared to a 10-month high. Figures from Umetal show Indian ore of 63 percent iron content at Tianjin port climbed to 870 yuan ($127.31) per ton Wednesday, up 36 percent from 640 yuan in June.

Li also said yesterday that the ministry would speed up industrial restructuring while ensuring industrial growth in the second half of 2009 by highlighting mergers and acquisitions, curtailing energy use and emission, and implementing technical upgrades.

Li said the ministry was working on a document on mergers and acquisitions and is eliminating outdated equipment and technologies in an attempt to increase efficiency.

Mergers and acquisitions can help reduce overcapacity in some sectors, he said, explaining that overcapacity in the iron and steel industry is most noticeable. He said steel mills were urged not to start new production projects within the next three years.

The capacity was 660 million tons last year and demand was 470 million tons – an oversupply of 190 million tons.

Nevertheless, there are some new iron and steel projects with 58-million-ton new production capacities.

Saving energy and reducing emissions are priorities on the ministry’s agenda, he said, because industrial sectors consume about 70 percent of the country’s energy.

“Policies will still be carried out in the second half to encourage the replacement of old autos nationwide,” said Li.

The government spent 12 billion yuan ($1.76 billion) to encourage people to buy fuel-efficient vehicles.

It did so by cutting the sales tax in half, which led to the sale of more than 1 million vehicles for five months straight until July. The policy will expire December 31.

Li also noted that the ministry would issue guiding opinions on energy saving and emission reduction work to major industries and set up a system to encourage energy efficient programs.

Explore the World, Understand China!
Please log on www.gloaltimes.cn

A new division of Deutsche Bank AG has struck a deal with state leaders to open a technology development center and create 319 new jobs in Wake County over the next five years, Gov. Bev Perdue and the global financial services company said Thursday.

DB Global Technology, the newly formed subsidiary of Germany-based Deutsche Bank (NYSE: DB), plans to invest $6.7 million in the center. The new jobs are to pay an average wage of $88,213, plus benefits, according to the governor’s office – well above the Wake County average of $43,160.

The state’s Economic Investment Committee voted Aug. 13 to award DG Global Technology a Job Development Investment Grant valued at $9.4 million over the course of 11 years if the company meets job -creation, investment and wage requirements.

“We are extremely excited at the prospect of opening a professional IT development center in the Research Triangle, which is home to some of the most highly skilled technology talent,” said Anthony P. McCarthy, global chief information officer for Capital Markets Technology at Deutsche Bank.

The center will be located in Cary if the town approves local incentives for the project. Deutsche Bank is seeking $75,000 in cash, says Scott Fogleman, the town's budget director. The incentives will be discussed at a public meeting of the Cary Town Council on Thursday night, and it's possible a vote could be held, Fogleman says.

It was not clear what would happen if Cary declines to provide the local incentives. A bank spokesman reached by e-mail did not provide an answer to that question.

The deal with Deutsche Bank follows similar recruitment successes with financial services firms Fidelity Investments and Credit Suisse, which have also opened operations in the Research Triangle Park area in the past five years and were awarded JDIG grants.

“This new center is a great fit for North Carolina. We are a strong international competitor in both the information technology and financial sectors,” Perdue said. “Our reputation for excellence in these areas, combined with a dedicated workforce and a top business climate, continues to attract quality global companies such as Deutsche Bank.”

JDIGs are awarded to new and expanding businesses and industrial projects whose benefits exceed the costs to the state and that otherwise would not be undertaken in North Carolina. The state claims that since awarding the first JDIG in 2003, the grants have created commitments for more than 30,000 jobs and almost $6 billion in investments in North Carolina.

Reporter e-mail: aljones@bizjournals.com.

SUNNYVALE, Calif.--(BUSINESS WIRE)--Schooner Information Technology, Inc., a provider of high-performance data access appliances for information-intensive Web 2.0 and cloud computing datacenters, was selected by the Flash Memory Summit as a Best of Show award winner for 2009 in the category of Most Innovative Flash Memory Enterprise Business Application. The annual Best of Show awards provide the premier opportunity for industry recognition of innovative products and solutions, and how they are used in real-world applications.

Schooner products, including the Schooner Appliance for Memcached and the Schooner Appliance for MySQL Enterprise™, are enabled by 512 GB of Intel® X25-E Extreme™ SATA Solid-State Drives and dual quad-core Intel® Xeon™ 5500 "Nehalem" processors. Schooner appliances support up to eight times the workload of ordinary servers, and scaling is as easy as adding more Schooner appliances.

“Schooner has proven that flash is ready for the enterprise,” said Peter Zaitsev, founder and chief executive officer, Percona Consulting. “The Schooner appliances directly address real-world datacenter problems of cost, scaling and performance.”

Winning companies were judged by a panel of industry experts who evaluated each nomination according to the following criteria:

* Distinctiveness of the application, technology or product
* Central use of flash memory as a solution or innovation
* Technical and business significance to the general marketplace

“The judges of the Flash Memory Summit Awards Committee had the challenging assignment of selecting the most innovative technology application from an incredibly large pool of quality submissions,” said Jay Kramer, chairman of the awards program and vice president of worldwide marketing of SEPATON. “We are proud to select the Schooner Information Technology data access appliances utilizing Intel’s X25-E Extreme SATA Solid-State Drive for the best of show innovation award.”

Schooner Information Technology was honored at the Flash Memory Summit Awards evening reception in the Exhibit Hall on Wednesday, August 12.

In his acceptance speech, Dr. John Busch, president and chief executive officer of Schooner Information Technology, dedicated the award, “to the Schooner teams in Silicon Valley and Hangzhou, China, whose passion and commitment enabled us to deliver totally competitive, award-winning products the day we entered the market.” He continued, thanking Schooner partners IBM and Intel, and finally called out Schooner customers, saying, “Schooner is not technology for technology’s sake. We created Schooner because we saw a way to use breakthrough technology to help customers solve real-world problems, to save energy, to save money, and to help achieve their business goals.”

For a complete list of all the Flash Memory Summit Best of Show awards winners, visit www.flashmemorysummit.com.

About Schooner

Schooner Information Technology provides data access application appliances for information-intensive Web 2.0 and cloud computing datacenters. Schooner solutions are fast, scalable, cost-effective and green. Schooner customers save power and space, reduce total cost of ownership, and create new business opportunities based on rapid access to terabyte-scale data. The company is headquartered in Menlo Park, California, and is venture funded by CMEA Capital, Menlo Ventures and Redpoint Ventures. For more information, please visit www.schoonerinfotech.com or @schoonerinfo on Twitter.

About Flash Memory Summit

Flash Memory Summit is the only conference dedicated entirely to flash memory and its applications. It is intended for system designers, analysts, hardware and software engineers, product marketing and marketing communications specialists, and engineering and marketing managers. It features forums, half-day tutorials, paper and panel sessions, and expert tables. Subjects include laptops and netbooks, enterprise storage system applications, consumer products, performance, product design, caching methods, design methods, software, new technologies, market research, testing and reliability, and security. The Summit also includes exhibits of the latest products and product awards. For more information, visit www.flashmemorysummit.com. Twitter: @flashmem.

About Conference ConCepts, Inc.

Founded in 1994, Conference ConCepts is a full-service professional conference and association management company that provides extensive capabilities in all aspects of technical conference management. Conference ConCepts develops and produces events both on its own, and in partnership with associations, corporations, and publishers. The skill sets of the company’s employees and contractors, representing over 200 cumulative years of experience, enables Conference ConCepts to offer clients a choice of services, ranging from assistance with a single aspect of a conference to the complete development and administration of a full-fledged “turnkey” event. For more information about Conference ConCepts, visit: http://www.confconcepts.com.
Contacts

Schooner Information Technology, Inc.
Fred Love, 650-328-4200 ext. 7130
flove@schoonerinfotech.com
or
Schwartz Communications, Inc.
Laurie Falconer, 415-512-0770
schooner@schwartz-pr.com
Permalink: http://www.businesswire.com/news/google/20090813005902/en

American Data Company presents a half day event exploring enterprise cloud computing, featuring Amazon Web Services and Salesforce.com

LOS ANGELES, Aug. 13 /PRNewswire/ -- American Data Company, a leader in business process and technology consulting for enterprise cloud computing, is pleased to present "Demystifying the Cloud," an executive symposium that intimately connects leaders in information technology to cloud computing industry experts.

With today's current advancements in technology and new service offerings, there has never been a better time to explore cloud computing. In light of tight capital expenditures, the economic model of cloud computing has become even more attractive.

Learn why companies such as the New York Times, Dell, and the Japan Post are incorporating cloud computing into their IT strategy and explore how cloud computing can benefit your organization.

Keynote speakers include:

* Peter Coffee, Director of Platform Research at Salesforce.com
* Mike Culver, Web Services Evangelist at Amazon Web Services
* Josh Holtzman, President at American Data Company
* Greg Janecek, Business Development at Amazon Web Services

"American Data Company is excited to connect top IT executives and the leaders in cloud computing for this one of a kind executive symposium," says Josh Holtzman, President of American Data Company. "The event aims to create a forum for discussion on ways cloud computing can be applied to our participant's businesses today, to educate, and provide real world success stories of cloud computing in the Enterprise."

The event will be held in Los Angeles, California on September 16, 2009 and is limited to participants by invitation only. Visit www.demystifyingthecloud.com for more information and to request participation.

About American Data Company

American Data Company is a business process and technology consulting firm specializing in cloud computing technologies. Since 2003, the company has assisted Mid-Market and Enterprise organizations to "do more with less" by leveraging cloud computing technologies such as the Force.com platform, Salesforce.com CRM, ExactTarget, and Amazon Web Services. More information can be found at http://www.americandatacompany.com.

About Amazon Web Services

Since early 2006, Amazon Web Services (AWS) has provided companies of all sizes with an infrastructure web services platform in the cloud. With AWS you can requisition computer power, storage, and other services - gaining access to a suite of elastic IT infrastructure services as your business demands them. With AWS you have the flexibility to choose whichever development platform or programming model makes the most sense for the problems you're trying to solve. You pay only for what you use, with no up-front expenses or long-term commitments, making AWS the most cost-effective way to deliver your application to your customers and clients. And, with AWS, you can take advantage of Amazon.com's global computing infrastructure, that is the backbone of Amazon.com's (Nasdaq: AMZN) $15 billion retail business and transactional enterprise whose scalable, reliable, and secure distributed computing infrastructure has been honed for over 13 years.

Contact: Joe Garrow jgarrow@americandatacompany.com Ph: 310-996-0300 x 206


SOURCE American Data Company

With China's steel industry in turmoil over the Rio Tinto scandal, the government has instituted a three-year moratorium on applications to expand production or start new projects.

China, the world's largest iron ore buyer, needs to have more say in the global iron ore trade, Industry and Information Technology Minister Li Yizhong said yesterday.

Specifically, the country is reacting to the steel industry's production overcapacity, the minister said at a press conference in Beijing.
The government will continue backing the China Iron & Steel Association in iron ore price negotiations, but will stop the "chaotic situation" and disorderly competition among Chinese importers to address the continuous rising spot iron ore price, the minister said.

"Spot prices of iron ore are increasing sharply on the global market and we hope to see an appropriate relationship between spot prices and long-term contract prices," Li said.

Li said he hoped the world's major iron ore suppliers would consider both their own long-term interests and their long-term cooperation with China's steel industry.

Li's remarks came as Chinese police and prosecutors continue the probe of a commercial leak that, in part, caused the current deadlock in price negotiations between Chinese steel companies and foreign ore suppliers, including Australia's mining giant Rio Tinto, the world's second- largest miner.

The case involves four employees of Rio in its Shanghai office, who face years of imprisonment if convicted of trade secrets infringement and bribery.

Lawyers for the three local employees said yesterday that they still were waiting for permission to meet their clients. The lawyer for Stern Hu, an Australian national executive from Rio's Shanghai office, was still not known.

More Chinese executives are believed to be the next to be investigated, insiders have said, and the Shanghai-based Oriental Morning Post reported yesterday that two senior import executives from major steel company Shougang Group in Beijing and Laifu Steel Group in Shandong have been detained for their possible involvement in the case.

None of the companies yesterday denied the report. Press officials at both companies said they "were not informed about the process of the investigation".

Analysts said some executives might already have been investigated, and it is possible that the authorities might be using the case as a warning to those who benefit from the disordered situation in China's steel industry.

Yu Liangui, a senior analyst at Mysteel Research Institute, said the government's decision to stop production capacity expansion aims to control the unstable situation in the iron ore talks.

"China's steel capacity expansion is usually scattered among different steel mills, resulting in chaotic development, so the government's encouragement on industry consolidation and the tightening up of industrial capacity will enhance the country's steel concentration," Yu told China Daily.

Cao Li in Shanghai contributed to the story

RALEIGH, N.C. – The number of information technology job openings across North Carolina dipped in July for the second straight month as a “summer hole” developed, talent management firm SkillProof says in its latest report.

After increases in May and June, the average daily job openings dropped in July to 1,060 from 1,160 in June, a decline of 8.6 percent. In May, the average was 1,250.

The number of job openings did increase in Raleigh and Charlotte, the report noted.

A year ago, SkillProof notes, the economy needed 3,070.

Two years ago, the number of vacancies was nearly 5,600.

“While demand for IT workers in the state has been stabilizing since the beginning of the year, the current development does not come unexpected,” said SkillProof in a report issued in partnership with the North Carolina Technology Association.

“As the economy prepares for a return, IT workers in North Carolina will need to be patient,” SkillProof added.

Nationally, IT openings fell by one percent, according to SkillProof.

The most job openings in July were in systems and engineering support at 320. Software development positions averaged 270, IT architects and consultants 160.

In specific skill categories, demand was greatest for Oracle database management (210) and Windows operating system (200) followed by SQL (170).

By MarketWatch

HONG KONG (MarketWatch) -- China reversed its stance on a controversial plan that would have required all computers sold in the country to be pre-loaded with internet filtering software, opting for a scaled-back version that would apply only to computers in schools, internet cafes and other public venues.

Consumers who want the software can still install it on their own, China's Minister of Industry and Information Technology Li Yizhong was cited by the official Xinhua news agency as saying Thursday.

"Installation is intended to block violent and pornographic content on the Internet to protect children," Li said.

"Any move to politicize the issue or to attack China's Internet management system is irresponsible and not in line with reality," he said.

China said in May it wanted all computers sold within its borders to carry the software, known as Green Dam-Youth Escort, but delayed the requirement indefinitely June 30. At the time it said the delay was to give computers makers more time to comply with the edict.

Li said installation of the software had always been intended as a voluntary option, and added that confusion may be related to the lack of clarity when the regulations were unveiled by the ministry.

Taiwan's Acer Inc. /quotes/comstock/15*!acgy/quotes/nls/acgy (ACGY 10.59, +0.17, +1.63%) Asustek Computer Inc. /quotes/comstock/11i!akcpf (AKCPF 8.00, +4.85, +153.90%) , as well as China's Lenovo Group Ltd . /quotes/comstock/11i!lnvgy (LNVG.Y 9.45, -0.52, -5.22%) /quotes/comstock/22h!e:992 (HK:992 3.72, -0.09, -2.36%) are already pre-loading the software on computers destined to be sold in China, according to Dow Jones Newswires.

China's state policy on improving the quality and standards of the rare earth metal industry calls for increased supervision, promotion of enterprise integration, and products export, will be put forward after revisions, the Ministry of Industry and Information Technology (MIIT) announced in an internal meeting of the rare earth industry.

The discussion paper of the policy indicates that the rare earth industry should raise the threshold for market entry through eliminating enterprises with outdated equipment, low technical level and backward management.

In addition, the state has raised environmental requirements for rare-earth enterprises; new policy statutes and industry standards are established and promulgated, including medium and long-term development plans for the rare-earth industry; and the rare-earth industrial development policy.

According to the paper, a new project can only start after being approved by the MIIT.

China has bountiful rare metal resources and enjoys reserves in tungsten, tin, stibium, rare earths, molybdenum, indium, and titanium. As a result, China is the major producer and supplier of these metals. Therefore, the policy proposes to further strengthen the control of foreign investment into rare earth metal resources and add a 20 percent tax on some rare earth products for export.

Foreign companies are forbidden to explore and mine in China, even in joint ventures with Chinese enterprises. However, overseas companies are encouraged to invest in intensive processing industries, such as down stream products of rare earth alloys including catalyst, permanent-magnet material and hydrogen storage material and luminescent powder.

Industry insiders say that the MIIT will strive to gain financial support from the central government to inject into the industry's exploration and research.  

BEIJING: China's Ministry of Industry and Information Technology (MIIT) Thursday announced a three-year moratorium on approvals of new expansion-related proposals in the iron and steel industry, as the government pledges to eliminate outdated capacity.

MIIT Minister Li Yizhong said overcapacity in the steel industry was "the most evident" of all the industrial sectors, with this year's estimated total output capacity at 660 million tonnes, compared with estimated demand at 470 million tonnes.
He called for steel mills to stop expansions for the next three years. Projects with total capacity of about 58 million tonnes already under construction would continue, he said.

"If the trend goes down like this, the steel industry will come to a dead end," he said.

Steel mills in Hebei Province would reduce their overall capacity from 120 million tonnes to 80 million tonnes annually over the next two to three years.

Another move to step up elimination of outdated capacity was consolidation of the industry, he said.

He said the ministry was drafting steel industry consolidation guidelines aimed at reforming the world's largest market. He gave no time for their publication.

The Shanghai Securities News reported in late July that China would release the guidelines in September.

The ministry will issue another guideline on energy conservation and emissions reductions in key sectors, including the chemical and steel sectors in the second half of this year.

The country's steel mills produced 50.68 million tonnes of steel in July, up 12.69 percent year on year.

Two Southwest High School rising seniors are heading to Washington D.C. Sunday in hopes of furthering their futures.

Kenny Chadwick Jr. and Vincent Lewis, both 17, will join 18 other teens from various states as part of four-day trip with The Framsyn Initiative to the Channel @ Work: Future Tech Leaders Program, part of XChange ’09 to receive further training in the information technology field.

XChange ’09 brings together more than 250 solution providers and leading industry vendors in diverse technology areas to build business relationships. The Future Tech Leaders Program will give the teens the opportunity to attend, participate in Microsoft training and certification courses and network with the solution provider community.

“Teens skilled in technology will shape (information technology’s) future and we are keenly aware that more need to be done to make the next-generation workforce truly useful employees,” said Nancy Hammervik, managing director for Everything Channel Events in a press release. “We are looking forward to offering these teens a platform to learn and network with potential employers.”

Jacksonville native and current New York resident Dino White started working on The Framsyn Initiative about two years ago because he saw a need, he said.

The Framsyn Initiative was created to stimulate economic growth and development by providing students the opportunity to pursue a career in information technology with certification and training prior to graduation, White said.

“You want to have a focus on high school students who are bringing that type of attention to the area,” he said. “And when the schools focus on that and you’re producing that type of person professionally, then when industries and companies are looking to relocate they’ll see that Onslow County will have something different to offer.”

Framsyn is a Scandinavian word that means “foresight, future vision, view forward, looking far beyond,” which is what the program stands for, White said.

To become a part of the initiative initially, high school students submit an essay and a photograph to White. Once accepted, students study to earn various information technology certifications such as Microsoft small business specialist, the installation of office software and office systems, programming and computer engineering. Teens also participate in an internship with local computer businesses and take part in a summertime computer building camp for middle-school students.

“This program is a start to create hybrid workers. Workers who have a background in information technology and computers,” White said. “It’s just like in the old days when you either had to have the skill of knowing how to do carpentry or be an automotive mechanic — You have to have that skill basis in technology now. Any job you have is going to have some use of a computer in it.”

During the Future Tech Leaders Program, the teens will have the chance to build a computer from scratch; sit in on briefings from Microsoft, HP and Intel; and network.

“The parents of these kids will have a computer whiz in their home when they get back,” White said.

Lewis said he joined The Framsyn Initiative to help him in his future career in engineering.

“I think it’s important to have as much certification as you can because then it allows you to do a different variety of stuff,” he said.

Meeting new people and garnering additional information technology certifications are what Lewis said he is looking forward to most about the upcoming event.

While Chadwick said he doesn’t have a career in information technology in mind, he believes the training provided by The Framsyn Initiative and the Future Tech Leaders Program will be beneficial.

“With this training think it will better me with any career I choose,” he said. “I think it’s vital for any job to have some type of (information technology) training.”

White said he hopes in the future more students from Onslow County will be interested in the initiative.

“I wanted more students from other high schools … I’ve been trying for two years to get a nucleus of kids together so they could attend this and it just didn’t work out,” he said. “Hopefully with these two kids going to the event other kids in Onslow County will become interested.”

IDG News Service - China said Thursday it will not force PC makers to bundle an Internet filtering program with computers sold in the country, backing down from a plan that stirred global controversy.

China will "definitely not" require the program, called Green Dam, to be packaged with all consumer PCs, said Li Yizhong, China's Minister of Industry and Information Technology, according to a transcript of his statements on a government Web portal.

China originally ordered all foreign and domestic PC vendors to pre-install Green Dam on new machines or to include the software on a CD-ROM. That mandate, issued in May, was indefinitely postponed just hours before it was slated to take effect last month. At the time, the Chinese government said it delayed the plan only to give PC makers more time to comply, but it did not set a new date for enforcement.

Thursday's statements were the first clear sign that China would not enforce the plan, which drew strong protest from Western PC makers and industry organizations. China has insisted that the Web filter was meant to protect children from pornography, but the program was also found to block Web sites that mentioned sensitive political topics such as Falun Gong, a spiritual movement banned in China as a cult.

Concerns about the program ranged from free speech and user privacy to PC security and intellectual property violations. A California-based software maker last month said it was preparing legal action over Green Dam for its use of programming code stolen from the company.

Li said use of the filter was meant to be optional and that the plan was misunderstood because it was not explained clearly. The software can be disabled or uninstalled.

PC makers including Lenovo, Acer and Asustek Computer have gone ahead with plans to distribute the program.

China's government will go ahead with installation of Green Dam on computers in public schools, Internet cafes and other public places, Li said. It is also working to address flaws in the program and would not rule out introducing a better filter, he said.

Part two of a two-part series (Access part one):Cloud computing is not just on the healthcare horizon. Partial and pure-play cloud computing architectures are already serving healthcare information technology needs in the U.S.Denver Health uses outsourced IT for a majority of its applications. Its service provider is Siemens, whose services meet most—but not all—of the essential characteristics in a definition of cloud computing released this summer by the National Institute of Standards and Technology. And while outsourcing dominates at Denver Health, it is not exclusive. “I still have 158 people in my shop even though 70% of our applications are outsourced,” said Denver Health Chief Information Officer Gregory Veltri. For example, Denver runs its cardiology and radiology systems on-site, but “all of our primary Siemens applications are outsourced.” That includes nurse documentation and speed-sensitive computerized physician order entry, which are run out of the Siemens data center in Malvern, Pa. But Veltri said it may be a long time before hospitals move to a pure cloud environment.

CAMBRIDGE, Mass., Aug. 11 /PRNewswire/ -- Mary Harper, a senior technology leader, has joined Abt Associates as Vice President and Chief Information Officer and a member of the Senior Executive Team. In her new role Harper will be responsible for leading the company's information technology and management information systems functions, overseeing technology infrastructure, investments and deployment.

Harper joins Abt Associates from General Electric, where she spent 13 years in a variety of technology management roles. Most recently she served as Executive Director of the GE/Penn State/Oracle Software Center of Excellence. In a succession of increasingly responsible positions at General Electric, Ms. Harper implemented systems to drive business growth, reduce costs, and increase customer satisfaction; delivered large-scale, global software and hardware programs and solutions; instituted sustainable process changes; and built a number of highly successful global teams.

"The effective management and deployment of technology to support our growing global business is critical to serving our clients and staff," said Wendell Knox, President and CEO. "Mary will lead the effort to ensure we have the robust technology in place to support our knowledge intensive business."

Harper explained, "I am looking forward to applying my experience, and to leveraging processes -- including such proven tools as Six Sigma and LEAN -- to help drive change and promote business growth at Abt Associates. As a global, knowledge-based business, Abt's ability to fully leverage technology for advantage is a key success factor."

Abt Associates' new CIO earned a B.S. in computer science at Yale University.

Abt Associates, an employee-owned company, applies scientific research, technical assistance, survey, and consulting expertise to a wide range of social, economic and health policy issues; international development; clinical trials and registries; and complex business problems. Founded in 1965, the company provides services to U.S. federal, state and local governments; universities and foundations; media; and major corporations. In fiscal year 2009, the company had revenue of $264 million. Its staff of over 1,300 is located in Cambridge, Massachusetts; Atlanta, Georgia; Bethesda, Maryland; Durham, North Carolina; Lexington, Massachusetts (Abt Bio-Pharma Solutions, Inc.); New York, New York (Abt SRBI); and in Africa, Asia, Central Asia, Europe, Latin America, and the Middle East.

By Anil Sharma, TMCnet Contributor

The U.S. Army's Information Technology, E-Commerce, and Commercial Contracting Center, ITEC4, have awarded four Motorola strategic partners an indefinite delivery/indefinite quantity or IDIQ contract that includes Motorola (News - Alert) mobile computing, handheld scanning and management software products.


The awards were made to the four following Motorola strategic partners-CDO Technologies Inc., GTSI Inc., Lowry Computer Corp., and Northrop Grumman Corp.
"Motorola congratulates our partners on these awards and looks forward to working closely with them," said Jim Mears, vice president and general manager of Motorola's U.S. Federal Government Market Division.

Mears said these wins validate Motorola's channel centric go-to-market strategy and role in providing innovative AIT solutions that meet the needs of Department of Defense’s mission-critical applications.

According to Motorola officials, AIT technologies will provide standardization among government users of Automatic Identification Technology or AIT components purchased from this contract.

These mobile solutions, officials said, would deliver real-time information securely and seamlessly across multiple Department of Defense and federal agencies to improve efficiency, productivity and effectiveness.

Officials said that the mission of Product Manager Joint-Automatic Identification Technology is to provide a single point of contact for procurement and technical expertise across the suite of AIT enabling technologies that support focused logistics, total asset visibility, and the integration of global supply chains for the Department of Defense, United States Coast Guard, North Atlantic Treaty Organization, Coalition Partners, other Foreign Military Sales, other Federal Agencies, and contractors in support of DoD activities.

TMCnet in June reported that Motorola, Inc. and Etihad Atheeb Telecom (News - Alert) Company have launched a new nationwide WiMAX 802.16e network in Saudi Arabia.

Atheeb will offer wireless broadband services, including voice and high-speed data, to customers and Internet Service Providers across the Saudi Arabia. Customers will enjoy a convergence of voice, video and data services on theirWiMAX ( News - Alert) personal communication devices.

Over the past decade, electronic transactions have slowly supplanted paper-based systems in many industries. For example, individuals and Wall Street brokerage firms employ electronic trading; federal and state taxpayers increasingly e-file their returns; and attorneys e-file pleadings and federal court documents. However, a physician jotting notes on a paper chart, which will then be stored in a large filing cabinet, remains the norm.

In February, President Barack Obama signed a $787 billion economic stimulus bill, the American Recovery and Reinvestment Act of 2009, Pub. L. No. 111-005, 123 Stat. 115 (2009), which contains the Health Information Technology for Economic and Clinical Health Act encouraging health care providers to adopt electronic medical records. With billions of dollars allocated toward the digitalization of health care, the era of electronic medical records has begun in earnest.

FEDERAL HITECH ACT

The stimulus package contains several legislative and administrative initiatives to promote the use of health information technology and electronic health records in Medicare and Medicaid. The statute is designed to "assist health care providers to adopt, implement, and effectively use certified EHR technology that allows for the electronic exchange and use of health information." The law allocates more than $19 billion for health care technology implementation, including $17 billion in incentives for health care IT adoption, in the form of increases in Medicare fees. In essence, it gives certain eligible providers incentive payments, beginning in fiscal year 2011, for the adoption and "meaningful use" of a certified health care IT system.

When the incentive period expires, the statute will induce continued digitalization through deterrence. For example, those physicians and hospitals that have not adopted EHR technology by 2015 will be assessed financial penalties in the form of lower Medicare fee reimbursement.

Under the plan, eligible physicians could receive up to $44,000 over five years and hospitals up to $15.9 million if they institute and make "meaningful" use of electronic health records.[FOOTNOTE 1] Currently, "meaningful use" is a vague standard that will be developed by the Department of Health and Human Services by the end of 2009 and closely watched by software makers that need to market their EHR software packages to physicians as making "meaningful use" of EHR and therefore qualifying physicians for stimulus money reimbursement.

Accordingly, this past spring, the Health IT Policy Committee of HHS released an initial outline of what would constitute meaningful use, including a list of benchmarks to be met over the course of the next six years, with the early goals achievable through today's technology and the later goals achievable with technology that has not yet come to market.

Initially, meaningful use would achieve data capture and sharing, then involve advanced clinical processes, and finally effect improved outcomes. For example, by 2011, systems should permit the capture of coded health data and lab results and electronic prescribing; by 2013, systems should provide care coordination and clinical decision support at the point of care; and by 2015, the capabilities should include data sharing and outcome management that achieves the desired outcomes, efficiencies and cost savings for the health system, such as reducing preventable hospitalizations and redundant lab tests.[FOOTNOTE 2]

STATE INITIATIVES

State governments are also encouraging, and in some cases, mandating the adoption of interoperable electronic health records. In recent years, at least 132 HIT-related bills were enacted in 44 states and the District of Columbia.[FOOTNOTE 3]

The new initiatives involve such issues as data privacy, e-prescription programs, health care data exchange, and incentives and mandates for electronic health record adoption. For example, Massachusetts (M.G.L. Chapter 305 in the Acts of 2008) requires an interoperable Certification Commission for Healthcare Information Technology-certified electronic health record system on or before Oct. 1, 2015, as a condition of hospital licensure and Minnesota [Minn. Stat. §62J.495 (2007)] requires all providers to employ interoperable health records by 2015 within their hospital system or clinical practice setting.

In addition, recent Minnesota regulations took effect in July requiring providers to use e-billing to submit claims to institutional payers and Wisconsin previously established tax credits to physicians who install electronic medical record software or hardware [Wis. Stat. Ch. 71.07(5i)].

The switch from paper-based record keeping to electronic medical records is designed to, among other things, decrease the number of adverse events resulting from medical and prescription errors, as well as drive down health care costs resulting from inefficiency and duplicative care and administrative overhead.[FOOTNOTE 4]

It will also purportedly improve public health reporting and the coordination of care and information among hospitals, laboratories and physician offices via a nationwide infrastructure for the secure exchange of patient information using certified, national interoperability standards.

Without the HITECH Act, the Congressional Budget Office estimated that approximately 45 percent of hospitals and 65 percent of physicians would have adopted qualifying health care IT by 2019, but that the act's incentives would boost those adoption rates to about 70 percent for hospitals and about 90 percent for physicians.[FOOTNOTE 5]

BARRIERS ABOUND

However, there are numerous barriers to expanding the use of electronic medical records. First, providers are typically reluctant to implement health care IT systems because upfront costs can run between $25,000 to $45,000 per physician, with cost savings often inuring to health insurers or other entities.[FOOTNOTE 6]

The new federal law and other state initiatives have attempted to spur development of health care IT systems with financial incentives; though, the long-standing culture of paper-based charts and records will not go away overnight.[FOOTNOTE 7]

On top of hardware and software costs, medical personnel will also require training on new systems to prevent delays and errors and to overcome their initial reticence toward a new method of recordkeeping.

Second, HIT systems must be interoperable nationwide to facilitate the seamless sharing of medical records and lab results within a framework that adequately protects patient privacy.[FOOTNOTE 8]

Since 2004, the Office of the National Coordinator for Health Information Technology has sought to harmonize health care data standards, and with the passage of the HITECH Act, the ONC has been allotted $2 billion to achieve its goals. In addition, advisory committees have been formed on health care IT that are charged with working with the private sector to design an interoperable health care IT network.

Consistent with this mission, the HITECH Act established the HIT Standards Committee, which is responsible for recommending to the ONC interoperability standards and specifications, and certification criteria for the electronic exchange and use of health information.

In coordination with the HIT Standards Committee, the director of the National Institute for Standards and Technology is responsible for testing such standards and implementation specifications. This will likely be done by certifying certain organizations to perform such tasks, such as the Certification Commission for Healthcare Information Technology, a private nonprofit organization whose mission is to accelerate the adoption of interoperable health information technology by creating a credible, efficient certification process.

In addition, the Healthcare Information Technology Standards Panel, a strategic partnership established through a contract with the HHS, announced several new interoperability standards for electronic health records to conform to requirements in the Recovery Act.[FOOTNOTE 9]

Moreover, one Senate bill, the Health Information Technology Public Utility Act of 2009 (S.890), would seek to facilitate nationwide health care IT adoption, particularly among rural providers, and establish a grant program to build upon the VistA open source electronic medical records software model that is currently being used by the U.S. Department of Veteran Affairs.

Lastly, there are outstanding privacy issues concerning electronic medical records, including data security, breach notification standards and patients' general rights to privacy. Accordingly, the Recovery Act, among other things, extends the Health Insurance Portability and Accountability Act Privacy Rule and Security Rule to the business associates that process health records on behalf of medical providers. See HITECH Act, §13404.

The law also requires covered entities and business associates to comply with nationwide breach notification procedures in the event of the disclosure of unsecured protected health information. See HITECH Act, §13402, 13407.

The act also prohibits the sharing of health care data, but outlines multiple exceptions, including data sharing for certain research or public health purposes or treatment of an individual, or data sharing authorized by the HSS secretary. See HITECH Act, §13405(d).

Such sharing of data has prompted one individual to file a putative class action lawsuit that claims the HITECH Act's requirements of electronic health record adoption and information exchange violate patients' privacy rights under HIPAA and the common law. See Heghmann v. Sebelius, No. 09-05880 (S.D.N.Y. Complaint filed June 25, 2009).

CLOUD COMPUTING

With the mandate that hospitals and physicians begin adopting electronic medical records, what might such a system look like in the medical office setting? Typically, a company might buy software or contract with a software vendor to install custom software designed for its particular business needs. However, with the continued growth of the Internet and high-speed broadband access, the cloud computing model is one option with physicians adopting health care IT with the aid of the federal stimulus bill incentives.

While cloud computing has many definitions, the National Institute of Standards defines it as "a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction."

According to the Open Cloud Manifesto, whose members include tech companies like IBM, Sun, Red Hat, cloud computing has several important characteristics, including scalability on demand, data center streamlining and minimized startup costs. Ultimately, cloud computing is about furnishing computing resources on a subscription basis from a provider that handles infrastructure and system management such that customers can access their applications and data freely.

One cloud computing model is software as a service, which involves the delivery of software services remotely on a subscription basis. Under the SaaS model, the software and the data storage are hosted and delivered by the software vendor to the customer over the Internet, allowing the licensed customer to use the program without the capital expense of purchasing business hardware and licensed copies of software.

Instead, the customer pays a monthly subscription fee for a Web-based service. This arrangement eliminates the burden of a complex installation or development effort as well as the challenges of maintaining and supporting a proprietary system on internally-owned hardware. However, health care providers would necessarily have diminished control of the application, the timing of system updates and possibly limited opportunity for customization beyond add-on modules and other options.

Since the passage of the stimulus package, at least one technology company announced plans to provide bridge loans to physicians to implement its health care IT systems, with interest beginning after the physicians receive federal stimulus reimbursements.[FOOTNOTE 10]

VENDOR AGREEMENTS

As a practical matter, the SaaS model presents certain concerns that should be considered before a health care provider enters into an agreement with a health care IT software vendor. System downtime is unwanted for all businesses, but for health care providers, an inability to access patient records could have drastic effects.

In negotiating service level agreements with the SaaS provider, health care providers should discuss system outages, disaster recovery options and backup plans with the SaaS provider and determine what alternative client applications would be available should the system go down and whether such electronic information would then be integrated into the existing database when normal service is restored.

Customers might also inquire about where the data will reside. The location of the SaaS provider's servers could implicate certain state or foreign laws regarding data transfer, data breach notification, personal jurisdiction or the exposure of data to foreign governmental subpoenas.

Privacy and data security issues are also a concern in the cloud computing model and much of the customer-vendor relationship is predicated on trusting the Saas provider's security model. Given the heightened confidentiality surrounding medical records, customers must determine what, if any, access the SaaS provider has to the patient data and whether the data stored at the SaaS provider will be encrypted.

Similarly, customers should ensure that the provider has instituted tight security controls to prevent data breaches and examine whether the SaaS provider performs regular security audits of its system.

Lastly, a customer may wish to negotiate certain data security compliance provisions into the license agreement so as to fulfill contractual or regulatory requirements. For instance, beyond the HITECH Act's data security breach notification mandates, recent Massachusetts data security regulations require that covered businesses take all reasonable steps to verify that any third-party service provider with access to personal consumer information has the capacity to protect such personal information.

Richard Raysman is a partner at Holland & Knight and Peter Brown is a partner at Baker & Hostetler. They are co-authors of "Computer Law: Drafting and Negotiating Forms and Agreements" (Law Journal Press). Edward A. Pisacreta, a partner at Holland & Knight, contributed to the preparation of this article.

The seven graduates of the inaugural year of Richmond County Schools Technology Leadership Institute have completed their summer internship course, but will continue to share their skills throughout the year.

For Grady Lorenzo, in particular, this program offered the chance to blossom and develop in a more task-oriented setting than the traditional classroom.

“I think that usually when teachers try to teach a kid how to use a computer, they usually teach minute things, like ‘If you want to make a spreadsheet go to this program,’” he said. “Or, ‘if you’re working with a spreadsheet, and you want to change the value in one of the cells, just type in this formula.’ They don’t tell you why the formula works, or how it works.”

He compared most classroom computer education to using a Microsoft Wizard, without knowing why the wizard directs you to make an action.

“Here, I kind of just came in and started messing with it,” he continued. “If you just mess around with it, pretty soon you’ll learn everything there is to know about a program.”

He is now messing around with it a lot, and has set up a dual-tower and monitor design system in his bedroom where he’s creating, among other interactive graphics, a rotating, layer-peeling anatomically-correct human brain.

“He’s in Geek City,” his mother Melinda Tincher said. “He loves it.”

She agreed this type of learning environment mimicked the workplace and was better suited for him.

“Everyone has different learning styles, and he’s more of a visual learner,” she said. “I don’t really see college in his future, but I think this is great. It not only broadens his educational choices, but this is something he could actually take on as a career.

When the Fort Bragg Base Realignment and Closure Regional Task Force shared the new technology with the school systems and community colleges in its area, the charge was to incorporate it into classroom instruction.

Richmond County Schools Information Technology Director Jeff Epps said the potential for the equipment was unquestionable, but there was very little material to translate into instructional tools.

To fill that gap, the decision was made to have students design the materials in a month-long summer internship. Having graduated from the course, they will continue to update and demonstrate the materials as they are implemented in the district’s geometry classes in the upcoming school year.

RCS Information Technology Director Jeff Epps said the first day they came in he taught them everything he knew about the new technology, then the students began teaching him.

“We had a lot of hurdles to overcome with this type of cutting-edge technology we’d never used before,” he said. “But, they grasped this so quickly that pretty much after the first day the roles were literally reversed, and I became the student. They had literally surpassed me by day two.”

This internship is a unique program. The only other educational institution in the region to tackle this subject has been Fayetteville Tech, which offers a programming course.

After a field trip to that campus, at least five of the students expressed an interest in taking that course.

“Here at Richmond County Schools, we have a mission to help our students become globally competitive, and this is definitely a step in that direction,” Epps said. “Through this program, they’re building a portfolio that is going to be used in a real world scenario by the geometry teachers at the high school.

The hope is that after participating in this internship, and continuing to work with this program throughout the year, these students will be prepared to go out and enter the workplace immediately after high school in a 21st Century field that will be in high demand.”

Miles Pattan had aspirations of becoming a computer engineer even before enrolling in this program. Though he’s worked with design for some time, he said the internship has been an eye-opening experience for him and has fed his ambition.

“The main thing about tutorials, like you would typically use to learn software, is that they have certain steps, but with this - we came in and just played around with it and learned things,” he said. “It was basically trial and error, and that’s a better way to learn for me.”

Pattan and Monroe WIlliams were instrumental in designing one of the program’s first major breakthroughs - the man with the soda can. It’s a scene where a man shakes a soda can, opens it and the soda sprays everywhere.

This is important because it was the class’s first real glimpse of what could be done with the technology, Epps said.

“Everybody has their own strengths and weaknesses, and everybody brings different interests to the table,” Epps said. “One thing we really want to do through this program is help students establish their individual visions for the potential of this technology.”

For WIlliams, who is also a football player, the “Soda Can” graphic helped to crystallize his vision of the possibilities of this technology’s use.

“One of the big things that hit me was when Mr. Epps was talking about how football teams could take it, and make model players,” he said. “Me being a football player, I thought that would be neat, if I could see the players move around rather than just draw the X’s and O’s on a board. That was my first little glimpse of what could be possible.”

Cassie Russell is an aspiring artist who recently won an award for a design she developed that became the RCS’s new district logo. She, too, could see this technology being utilized in her individual discipline and interest.

“You could really take your art to a whole other level using this,” she said. “Instead of just drawing on a piece of paper, you can make it come to life when people view your work. It’s just really cool to be able to do that.”

One extrapolation she made - a virtual gallery.

“It would be really neat if colleges could view your work in an online gallery using this,” she said.

As the school year begins, these students will work with the geometry teachers to help them learn how to use this program, and Epps said other applications are already in the works.

“Ultimately, we want this to be a part of every classroom,” he said. “We’re already developing uses for this in biology, auto mechanics and other courses, and helping these students to be able to compete in the new technological workplace.”

Interested?

Anyone who’d like to get updates and view samples of the work of the RCS Technology Leadership Institute can check out their Twitter page at www.twitter.com/i3drcs.

The Q1FY2010 performance of frontline information technology (IT) companies has sprung a positive surprise, beating both our as well as street’s expectation.

Frontline IT companies have shown stability on volume growth and the decline in realisation was lower than expected, which provide comfort against lower-than-expected pricing pressure going forward.

In fact, Tata Consultancy Services (TCS) positively surprised us with 3.5% volume growth during the quarter.

The frontline IT companies exceeded our expectations on margin management. These companies have shown marked improvement of 60-290 basis point sequentially against our expectation of a 40-225 basis point decline.

The positive surprise on the margin front came on account of leverage of offshore model and cost efficiency measures.

Earnings upgrade

Recently, Cognizant, a leading offshore IT service vendor, beat street’s expectation for Q2CY2009 results and has revised upwards its guidance for CY2009.

The management also provided positive commentary on the stability of the banking, financial services and insurance (BFSI) vertical and increased demand for application development.

The strong performance from Cognizant coupled with positive surprises from Indian IT vendors indicates the improvement in the business improvement.

Given the improvement in the business environment, we believe there is scope for further consensus earnings per share (EPS) upgrade.

BPO operations

However, there are still some concerning data points such as muted growth in the business process outsourcing (BPO) vertical reflected in sharp reduction in Genpact’s (a leading pure-play BPO firm) CY2009 guidance.

Recently, Genpact has halved its CY2009 guidance to 6-9% y-o-y growth from 10-15% year-on-year (y-o-y) guided earlier.

The downward revision in the guidance was on account of greater-than-anticipated project cancellation, longer sales cycle and business volume cuts by existing clients.

Furthermore, Genpact’s revenues from GE have come down by 7% during the quarter. In our view, GE is also one of top clients for TCS and GE business cut for Genpact could have a negative implication for TCS.

Outlook

We have marginally revised upwards our earnings estimates for Infosys on the back of improvement in the business environment.

For HCL Technologies (HCL Tech), we have only considered the lower effective tax rate in FY2011 on extension of software technologies park of India (STPI) benefits and will further revisit our earnings estimates post its Q4FY2009 results (June year ending).

Given the improvement in the business environment, we see further scope to upgrade the consensus earnings of the front-line IT companies. However, we believe the street has already factored in most of the earnings up-gradation, leaving limited upside at current levels.

Hence, we maintain our HOLD recommendation on frontline IT companies. Though, we see limited upside in frontline stocks, we prefer TCS among them given its stellar performance in Q1FY2010 (leading to sharp earnings up-gradation) and stability in the BFSI vertical.

ARLINGTON, VA, August 13, 2009 /24-7PressRelease/ -- Blue River Information Technology, a provider of premiere technical training solutions, today announced its DOD 8570 Certification Training End-of-Year Incentive Plan. This limited release of special incentive pricing and delivery option plan has been anticipated now for several months. Through this vehicle, the Air National Guard and other DOD entities can access cost effective, certified training for its members to achieve full compliance with the DOD 8570 Information Assurance Directive.

The DOD 8570 Directive provides guidance and procedures for the training, certification, and management of all DOD employees performing Information Assurance functions in their line of duty. These individuals are required to carry an approved certification for their particular job classification. The most common certifications required are A+, Network+ and Security+ which cover basic computing, networks, and cyber security. DOD has worked closely with the independent certification Organization COMPTia to ensure objective, uniform standards are applied to the testing and certification process.

Matt Hempel, Blue River Training's Executive Vice President, put the Blue River DOD Incentive Training Package in context. "Towards the end of the federal government fiscal year, many DOD organizations are faced with critical decisions for their workforce, their cyber security posture and compliance with certification provisions of the DOD 8570 Directive. It's our mission to assist both our uniformed military and civilian workforce to achieve full compliancy with the directive. An added benefit to our training programs is the significant, deep competency Blue River Training students achieve in these important Information Assurance disciplines. It's all done through the Blue River Training DOD 8570 Certification Training Incentive Plan." The DOD 8570 Certification Training End of Year Incentive Packages for includes Comptia-approved curriculum, on-site delivery, instruction by certified, expert instructors and even exam administration if required. Tuition starts at $695 per student for a week long "Boot Camp" style immersion training. Blue River 8570 Training students enjoy some of the highest test pass rates in the industry and significant retention of course material long after DOD 8570 Certification Training is completed.

Blue River Information Technology (IT) has decades of collective expertise in providing full scope enterprise architecture & engineering services to a wide array of customers. Blue River IT is a full service network/server infrastructure & architectural engineering company based in Arlington, Virginia. They assess, design, assemble, test and manage networks and data storage solutions. In addition, they offer specialty services that address some of the most demanding IT infrastructure challenges facing IT Executives and Managers today. Please visit Blue River's training link: http://www.blueriverit.com/training-dod-8570-incentive-plan/
Or contact Matt Hempel - Matt@blueriverit.com

About Blue River Information Technology

Blue River Information Technology is a high growth company that features data storage and network management solutions, professional services and training products. We assess, design, assemble, manage and train in the most challenging enterprise IT environments in both the Government and Commercial spaces. Blue River IT is a small business based in Arlington, Virgina. Please contact us 1.877.505.2748, or info@blueriverit.com.