THREATS: The Programming Languages That Spawn The Most Software Vulnerabilities. PHP, ASP Web scripting languages breed more vulnerabilities than Java, .NET programming platforms, Veracode’s new state of software security report says. Read more

SWIFT: After One Week as Open Source, Swift Is the Most Popular Programming Language on Github. According to statistics provided by GitHub, in terms of “stars,” the equivalent of a Facebook like or Twitter fave (heart), Swift already has over 21,000 stars, beating Mozilla’s Rust programming language, the former leader of this ranking, which only has 14,400 stars. Read more

JAVASCRIPT: 2015 in Review. JavaScript had a remarkable year. Despite reaching the grand age of twenty in May, news, projects and interest in the language continue to grow exponentially. Can’t think of another technology which moves at a similar pace. It’s becoming increasingly difficult to keep up so hope this summary helps. Read more

APIs: Composing APIs with Node-RED and JavaScript. As the Node-RED website says “Node-RED is a tool for wiring together hardware devices, APIs and online services in new and interesting ways”. It has been possible to use Node-RED for Internet of Things scenarios on Bluemix for quite some time. With the new Connect and Compose (beta) service you can now also use Node-RED to compose complex APIs via flow editor and JavaScript. Learn how to make APIs with JavaScrips and Node-RED in this tutorial. Read more


CYBERSECURITY: Efficient Continuous Monitoring – Third Party Products & Resources. At Blue Mountain Data Systems, we define continuous monitoring as real-time security monitoring rather than the periodic reviews conducted weekly or monthly for compliance purposes. When providing security support for our clients, we have activities that we look at and test periodically. Read more

IT MANAGEMENT: 16 Ways to Retain Technical Staff. A recent study indicates that companies in the IT industry (amongst the Fortune 500) experience the highest turnover rate (SOURCE: PayScale). Good employees quit because they feel undervalued, underwhelmed, underpaid, or overworked. As a result, employee turnover is costing your organization more time and money than you think. Believing that technical employees are “replaceable” may appear to be satisfactory to some firms. In the long term, however, you may sacrifice more than money; customer satisfaction, business knowledge, and team morale. Read more

MICROSOFT: 12 Ways to Empower Government Users With the Microsoft Business Intelligence (MBI) Stack. Are your organization’s Federal IT resources under constant pressure, with no end in sight? Your agency is not alone. With limited access to dedicated information technology resources, non-technical end users often play the waiting game, relying on IT staff to do simple tasks like generating custom queries and embedding them within applications. Your department’s need to generate on demand, ad hoc reports gets pushed to the back burner while IT resources respond to more pressing matters. Implementing a self-service approach alleviates your IT staff from such tasks, affording them more time to focus on solving high impact problems. Read more

DOCUMENT MANAGEMENT: 18 Ways to Secure Your Electronic Documents. Are your organization’s document management security inefficiencies leaving you open to legal and economic repercussions? Compliance with mandates such as the Privacy Act, Freedom of Information Act, HIPAA and the Sedona Principals for e-discovery and disclosure are causing ongoing concern within government agencies and corporations…and increased need for solid document security. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – December 23, 2015

Leave a Reply