IT SECURITY
NATIONAL CYBER SECURITY AWARENESS MONTH: Why Cyber Security Matters To Everyone. October is National Cyber Security Awareness Month — as good a time as any to remind people that their cyber security hygiene doesn’t just affect them, but everyone around them. And in the globally connected world we live in, that literally is everyone. Read more
[FORBES.COM]
DEPARTURE: Federal CIO’s Exit: Impact on IT Security. The unexpected departure of Steven VanRoekel as the federal chief information officer likely will have little direct impact on the Obama administration’s cybersecurity initiatives. View now
[GOVINFOSECURITY.COM]
BYOD: Eight steps for comprehensive BYOD governance. BYOD governance is not a destination, but a journey. It begins with this eight step roadmap for safe and effective BYOD policies. Read more
[SEARCHCIO.COM]
APPLICATION DEVELOPMENT
AGILE & WATERFALL: Is a hybrid approach best for enterprise app development?
Agile-only approach leads to lower quality code, research suggests. Read the rest
[COMPUTERWORLDUK.COM]
MOBILE APPS: Simplifying Cross-Platform Mobile App Development with Xamarin.Forms. Lots of decisions go into creating cross-platform apps. Without Xamarin.Forms, the decision process is almost too unwieldy. Here’s how it can simplify your mobile development. Read more
[VISUALSTUDIOMAGAZINE.COM]
DOCUMENT MANAGEMENT SYSTEMS
METADATA: Leverage Metadata for Document Management. Managing data assets based on their metadata attributes simplifies saving, organizing, securing, searching, processing and archiving documents. Read more
[ENTERPRISEAPPSTODAY.COM]
TECH EDUCATION
FREE TECH/PROGRAMMING BOOKS: Ada, Agda, Alef, Android, APL, Arduino, ASP.NET MVC, Assembly Language, Non-X86, AutoHotkey, Autotools, Awk, Bash, Basic, BETA, C, C#, C++, Chapel, Cilk, Clojure, COBOL, CoffeeScript, ColdFusion, Cool, Coq, D, Dart, DB2, Delphi/Pascal, DTrace, Elasticsearch, Emacs, Erlang, F#, Firefox OS, Flex, Force.com, Forth, Fortran, FreeBSD, Git, Go, Groovy, Gradle, Grails, Spock Framework, Graphical user interfaces, Graphics Programming, Hadoop, Haskell, HTML / CSS, Bootstrap, Icon, IDL, iOS, Isabelle/HOL, J, Java, Spring, Spring Boot, Spring Security, Wicket, JavaScript, Javascript frameworks, Node.js, Jenkins, Language Agnostic, Algorithms & Datastructures, Cellular Automata, Cloud Computing, Compiler Design, Database, Datamining, Information Retrieval, Licensing, Machine Learning, Mathematics, MOOC, Networking, Open Source Ecosystem, Operating systems, Parallel Programming, Partial Evaluation, Professional Development, Programming Paradigms, Regular Expressions, Reverse Engineering, Security, Software Architecture, Standards, Theoretical Computer Science, Web Performance, LaTeX, Limbo, Linux, Lisp, Lua, MarkDown, Mathematica, MATLAB, Maven, Mercurial, Mercury, Meta-Lists, MySQL, .NET Framework, Neo4J, NoSQL, Oberon, Objective-C, OCaml, Octave, OpenGL ES, OpenMP, OpenSCAD, Oracle PL/SQL, Oracle Server, Parrot / Perl 6, PC-BSD, Perl, PHP, PicoLisp, PostgreSQL, PowerShell, Processing, Prolog, Constraint Logic Programming, PureScript, Python, Django, Flask, Kivy, Pandas, Pyramid, QML, R, Racket, Raspberry Pi, REBOL, Ruby, RSpec, Sinatra, Ruby on Rails, Rust, Sage, Scala, Lift, Play Scala, Scheme, Scilab, Scratch, Sed, Silverlight, Smalltalk, SQL (implementation agnostic), SQL Server, Swift, Standard ML, Subversion, Tcl, Teradata, TeX, Tizen, TLA, TypeScript, Unix, Verilog, VHDL, Vim, Visual Basic, Visual Prolog, Web Services, Windows 8, Windows Phone, Workflow, xBase (dBase / Clipper / Harbour). Read more
[GITHUB.COM]
==========
IT SECURITY SUPPORT: Call Blue Mountain Data Systems for Security and Vulnerability Management and Compliance: 703-502-3416.
==========