MOBILE APPLICATIONS
MOBILE: How to Block the Ultrasonic Signals You Didn’t Know Were Tracking You. Dystopian corporate surveillance threats today come at us from all directions. Companies offer “always-on” devices that listen for our voice commands, and marketers follow us around the web to create personalized user profiles so they can (maybe) show us ads we’ll actually click. Now marketers have been experimenting with combining those web-based and audio approaches to track consumers in another disturbingly science fictional way: with audio signals your phone can hear, but you can’t. And though you probably have no idea that dog whistle marketing is going on, researchers are already offering ways to protect yourself. Find out more
[WIRED.COM]
FEDERAL GOVERNMENT: White House Launches Mobile App for Reginfo.gov. The Obama administration has introduced a new way to access information on the federal regulatory system with the recent launch of RegInfo Mobile. The application, available for both iOS and Android devices, promotes the transparency of federal regulations and information collection requests by providing a convenient mobile interface for Reginfo.gov. Find out more
[FEDERALTIMES.COM]
TRENDS: 10 Trends Shaping Mobile Development in 2017. The mobile app development landscape in 2017 promises to see the continuing emergence of new, cutting-edge techniques and tools, along with growth in traditional technologies and approaches. New developments will take shape in both the “mobile first” enterprise space and the consumer arena, with the continuing hype around enterprise mobility and increasingly cumbersome app stores promising significant changes. Here’s a look at 10 trends that will affect mobile app developers in the coming year. Find out more
[ADTMAG.COM]
POLITICAL MOBILE: An App That Makes It Easy to Pester Your Congress Member. Joe Trippi pioneered the use of social media as a fundraising tool. As campaign manager for Democratic presidential candidate Howard Dean in 2004, he started a trend that has reinvented that way politicians run for office. But he believes that many politicians are still missing out on the power of the internet once they’re elected. Trippi is now working with an internet startup called Countable, which seeks to give citizens a greater voice in national politics. The company’s online service gives you a simple and concise overview of the bills your national representatives are debating, and it lets you instantly send emails to these representatives, telling them how you would like them to vote. Find out more
[WIRED.COM]
==========
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems December 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-december-2016.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.
==========