
PROGRAMMING & SCRIPTING
ADOBE: Finally Tells Developers to Stop Using Flash. Once the primary means of making animation, browser games and interactive visualisations for the web, Adobe Flash has been ailing for a long time. And now — after almost everyone else recognised the massive security and performance problems with the proprietary tech — its makers Adobe have announced that it will be moving away from the platform. Adobe said that it would now encourage developers to “build with new web standards”, primarily HTML 5. Read more
[WIRED.CO.UK]
ANGULAR 2: Up Close with Google’s Angular 2 JavaScript Framework. Here’s all you need to know about Angular 2, the exciting new successor to Google’s wildly popular JavaScript framework, AngularJS. Read more
[INFOWORLD.COM]
GOOGLE: Confirms Next Android Version Won’t Implement Oracle’s Proprietary Java APIs. Google is replacing its implementation of the Java application programming interfaces (APIs) in Android with OpenJDK, the open source version of Oracle’s Java Development Kit (JDK). The news first came by a “mysterious Android codebase commit” from last month submitted to Hacker News. Google confirmed to VentureBeat that Android N will rely solely on OpenJDK, rather Android’s own implementation of the Java APIs. Read more
[VENTUREBEAT.COM]
FTC: Ruling Against Oracle Shows Why It’s Time to Dump Java. The FTC says Oracle hasn’t been uninstalling older, insecure versions of Java. It’s time for users to ditch client-side Java altogether. Read more
[INFOWORLD.COM]
FROM THE BLUE MOUNTAIN DATA SYSTEMS BLOG
CYBERSECURITY: Efficient Continuous Monitoring – Third Party Products & Resources. At Blue Mountain Data Systems, we define continuous monitoring as real-time security monitoring rather than the periodic reviews conducted weekly or monthly for compliance purposes. When providing security support for our clients, we have activities that we look at and test periodically. Read more
[BLUEMT.COM]
IT MANAGEMENT: 16 Ways to Retain Technical Staff. A recent study indicates that companies in the IT industry (amongst the Fortune 500) experience the highest turnover rate (SOURCE: PayScale). Good employees quit because they feel undervalued, underwhelmed, underpaid, or overworked. As a result, employee turnover is costing your organization more time and money than you think. Believing that technical employees are “replaceable” may appear to be satisfactory to some firms. In the long term, however, you may sacrifice more than money; customer satisfaction, business knowledge, and team morale. Read more
[BLUEMT.COM]
MICROSOFT: 12 Ways to Empower Government Users With the Microsoft Business Intelligence (MBI) Stack. Are your organization’s Federal IT resources under constant pressure, with no end in sight? Your agency is not alone. With limited access to dedicated information technology resources, non-technical end users often play the waiting game, relying on IT staff to do simple tasks like generating custom queries and embedding them within applications. Your department’s need to generate on demand, ad hoc reports gets pushed to the back burner while IT resources respond to more pressing matters. Implementing a self-service approach alleviates your IT staff from such tasks, affording them more time to focus on solving high impact problems. Read more
[BLUEMT.COM]
DOCUMENT MANAGEMENT: 18 Ways to Secure Your Electronic Documents. Are your organization’s document management security inefficiencies leaving you open to legal and economic repercussions? Compliance with mandates such as the Privacy Act, Freedom of Information Act, HIPAA and the Sedona Principals for e-discovery and disclosure are causing ongoing concern within government agencies and corporations…and increased need for solid document security. Read more
[BLUEMT.COM]
==========
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems December 2015 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-december-2015.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.
==========