TRENDS: Programming Trends To Look For This Year. There has never been a more exciting time for technologists and developers worldwide. The number of active development languages and frameworks, as well as development tools and learning avenues, continues to soar. Despite all these resources at our fingertips (or perhaps because of this abundance), it may not be obvious where industry trends are leading us. Here is what to look out for in programming trends over the next year. Read more

PROGRAMMING FONT: ‘Operator’ Font Designed To Make Coding Easier. The idea is to put an emphasis on how certain characters appear in a programming environment. While many of us bristle at the sight of Comic Sans, coders have an altogether different view of typefaces and how they’re presented. Thus, Operator Mono, the new font from one of the highest-regarded typeface-creators that was forged to make life easier for the folks who build the websites you visit. “In developing Operator, we found ourselves talking about Javascript and CSS,” founder Jonathan Hoefler writes. While the blog post about typography and font faces can come off as a bit pretentious, it’s clear that the team paid attention to how the likes of brackets, commas and semicolons are spaced and how they appear in back-end coding environments. Read more

FISH: A Better Alternative to Bash in Linux? Bash is a fantastic tool in Linux, but there’s room for improvement in everything. Fish is an alternative shell for Linux that some might consider to be a significant upgrade to what Bash has to offer. Read more

JAVA: Reactive Programming by Example: Hands-On with RxJava and Reactor. Here’s a one-stop-shop introduction to the world of reactive programming. What “reactive” means and why it matters. Learn about Reactive Streams and Reactive Extensions and the emerging ecosystem around them. Get a sense for what going reactive means for the programming model. See lots of hands-on demos introducing the basic concepts in composition libraries using RxJava and Reactor. Read more


CYBERSECURITY: U.S. Cyber Effort Targets Open Source Software. A growing list of cyber attacks targeting U.S. government employees has prompted the Obama administration to launch a high-profile cyber security effort that among others things will target Internet “utilities” such as open source software. Read the rest

SAN FRANCISCO: Prepares to Open Source Its Voting System Software. Will it be the first in the nation to do so in 2019? The proposal to adopt a solution in time for the end of the current contract on January 1, 2017 reappeared at the Board of Supervisors on Tuesday when Supervisor Scott Wiener called for a hearing on how the city is progressing with the plan to use standard hardware and open-source software to carry out future balloting. Read more

SECURITY: New Bill Aims to Stop State-Level Decryption Before It Starts. Over the last several months, local legislators have embarked on a curious quest to ban encryption at a state level. For a litany of reasons, this makes no sense. And now, a new bill in Congress will attempt to stop the inanity before it becomes a trend. Read more

VERIFIED GOVT SOCIAL MEDIA: Feds Launch Social Media Verification Registry. Called the U.S. Digital Registry, the effort aims to provide much-needed verification not only for agencies’ social media accounts, but also for their third-party sites and apps. Read more


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems January 2016

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – February 11, 2016

Leave a Reply