PLAN OF ACTION: Angles of Exposure and Countermeasures. The increasing sophistication of outside cyber attacks has been met with advancements in outside cyber threat detection, response tools, and training methods. Still, managers must not underestimate the critical threat posed by individuals within the organization, as opposed to a third party attacker. Read more

SLIDESHOW: How to Use Big Data for a Good Cause. News of fraud and data breaches can shake confidence and cause legitimate concerns, but not all data stories have a foreboding end. Experian DataLabs wants to call attention to the good that data can do. Read more

SECURITY LEADERSHIP: Five Tips To Comply With The New PCI Requirements. Merchants that accept payment cards have five new security requirements to comply with — and significant fines and other costs if they don’t. The new rules are part of the new Payment Card Industry Data Security Standard. Here is some advice from Trustwave Holdings, a PCI compliance consulting firm.Read more


INSIDER REVIEW: 10 JavaScript Editors Compared. JavaScript programmers have many good tools to choose from — almost too many to keep track of. In this roundup, I discuss 10 text editors with good support for developing with JavaScript, HTML5, and CSS, and for documenting with Markdown. Why use an editor for JavaScript programming instead of an IDE? In a word: speed. Read more

HAPPY BIRTHDAY: JavaScript Is 20 Years Old. Who could have predicted that a strange little scripting language designed to let beginners add some action to web pages would become the language that threatens to dominate the world. Read more

SURPRISING RESULTS: Think Google Can’t Handle JavaScript? Think Again. As early as 2008, Google was successfully crawling JavaScript, but probably in a limited fashion. Today, it’s clear that Google has not only evolved what types of JavaScript they crawl and index, but they’ve made significant strides in rendering complete web pages (especially in the last 12-18 months). Read more


MEET LILY: The $499 ‘Selfie Drone’ That’s Your Personal Videographer. Yes, in 2015 we have drones to take selfies for us, because maintaining the perfect duckface while tapping a touchscreen button are sorely testing humanity’s multi-tasking capabilities. Read more

TECH REVIEW: BitTorrent’s Bleep Is a Messaging App Built for Secrecy. Yes, you read that right, BitTorrent-the same company behind everybody’s favorite music, movie and TV show, uh, sharing technology. It’s in the middle of refashioning itself into an upstanding consumer tech company. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – July 14, 2015

Leave a Reply