SCRIPTING & PROGRAMMING
HTML5: Introduction to Service Worker. A service worker is a script that is run by your browser in the background, separate from a web page, opening the door to features which don’t need a web page or user interaction. Read more
PHP: The venerable server-side scripting language is famous for its use in Web development. First released in 1995 by Rasmus Lerdorf, it has been leveraged by the likes of WordPress and Facebook and reportedly is used in 82 percent of websites whose server-side programming language is known, according to W3Techs. The language is slightly behind Java in the PyPL Popularity of Programming Language index, and it ranks sixth in the rival Tiobe index. A high-performing upgrade, PHP 7, is due in 2015. Like any technology, however, it has its devotees and bashers. Here’s why advocates swear by PHP and why some dissenters might swear at it. Read more
CISOs: Chief information security officers hard to find — and harder to keep. The position at a large company that protects against IT security breaches is known as a chief information security officer. Experts say these jobs are becoming increasingly difficult to fill. Little-known just a decade ago, CISOs today are worth their weight in gold now and hard to keep. Perhaps more surprising, the position is still not universal at large corporations, but it should be. Find out more
ANDROID: Cheap Android tablets have cut-rate security. When it comes to Android tablets, you get what you pay for — even during holiday sales. Android tablets costing substantially less than $100 are far more likely than more expensive models to have gaping security holes and other serious flaws, according to researchers from San Francisco-based mobile-security company Bluebox Labs. Find out more
SLIDESHOW: Top cybersecurity predictions of 2015. What cybersecurity trends can we expect to see in the coming year? Read more
GAO: Making the business case for cybersecurity. Cybersecurity has been one of the fastest growing sectors in the federal government over recent years. It’s a 24/7/365 job as threats are constant in an online world. In fact, the Government Accountability Office reported in June that “the number of cyber incidents reported by federal agencies increased in fiscal year 2013 significantly over the prior three years.” One of the best ways to justify cybersecurity investment is to develop a business case through the Capital Planning and Investment Control (CPIC) process. And the best time to finesse business cases through CPIC is right now. Read more
APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.