|
When I first started digging into the bowels of the Internet, I was fascinated by how many of its protocols—like HTTP and SMTP, for example—were entirely text based. At first, this struck me as a very odd thing; text is inefficient, and machines, not humans, are meant to interpret protocols. A binary setup would save bytes — bytes! — and be all-around more manageable by software. It wasn’t long, however, before I realized the true genius behind this decision. Obscurity and obsessive abstraction are two of the worst problems that affect software development.
|
|
|
|
|
Terrence Dorsey wrote: Obscurity and obsessive abstraction are two of the worst problems that affect
software development.
Too true. http://xkcd.com/974/[^]
10 PRINT "Software is hard. - D. Knuth"
20 GOTO 10
|
|
|
|
|
Effective immediately, developers must fix vulnerabilities in their apps rated "critical" or "important" -- the top two rankings in Microsoft's four-step threat-scoring system -- within 180 days of being notified by the MSRC. The penalty for failure: Microsoft will remove the vulnerable app from the pertinent app store.... Microsoft's own Windows, Office or Azure apps are also covered by the new policy. Not surprisingly, caveats apply. See also: Windows XP.
|
|
|
|
|
Microsoft Chief Operating Officer Kevin Turner shared some new hints about what's coming during what he called Microsoft's "biggest innovation year ever" during Day 3 of Microsoft's Worldwide Partner Conference... We already knew Microsoft had committed to launching Windows 8.1, Windows Server 2012 R2, Visual Studio 2013, SQL Server 2014, System Center 2012 R2 and a host of other "Blue" wave of products during this coming fiscal year... here are a few things I thought worth calling out... Office Windows Store apps? Interesting.
|
|
|
|
|
How Bitcoins are actually created is all too often overlooked. The currency isn’t minted at will in a factory setting. Bitcoins don’t just magically appear out of thin air. Instead, they’re the products of complex software algorithms that run day and night on incredibly powerful computers. So who, exactly, has the pioneering spirit to “mine” the virtual currency, converting CPU and GPU cycles into something of real-world value? It takes time, dedication, and an extraordinary amount of water-cooled PC hardware. Here's what it takes to mine $191,900 worth of Bitcoin. Your old PCs probably won't cut it.
|
|
|
|
|
Bug bounty programs can be as much as 100 times more cost-effective for finding security vulnerabilities than hiring full-time security researchers to do the same thing. New research from the University of California at Berkeley, which focused on bug bounty programs run by Google and Mozilla, found that each of these programs has cost the vendor about $400,000 over the course of three years, far less than it would’ve cost to hire employees to find the same number of vulnerabilities. Next up: work bounties.
|
|
|
|
|
It’s about time, right‽ In fact, it has been 3 and a half years since I first declared that getting RIA Services open-sourced was my stretch goal. Since then, I’ve seen dozens of forum posts, hundreds of tweets, and over 13,000 page-views for my original declaration. There was even a time during a LIDNUG call when Scott Guthrie was directly asked what it was going to take to get RIA Services open-sourced. This has been an important topic to a lot of people for a long time, and I am finally happy to announce it’s happening! Congratulations! And now it's your turn to contribute to RIA Services. Good luck!
|
|
|
|
|
I drew a parallel between the Apple Newton’s sophisticated, complicated hand-writing recognition and the Palm Pilot’s approach of getting humans to learn a new way to write, i.e. Graffiti. The connection I was trying to make was that there is a deliberate design approach that makes use of the plasticity and adaptability of humans to meet computers (more than) half way. Connecting this to computer vision and robotics I said something like: "What if, instead of designing computers and robots that relate to what we can see, we meet them half-way – covering our environment with markers, codes and RFIDs, making a robot-readable world". I have to believe this is a subtle ruse by SkyNet to help move things along.
|
|
|
|
|
Today, at Dropbox’s first-ever developers conference, the company is officially launching a new set of coding tools designed to push Dropbox into every corner of your digital life. Not content to stay sequestered inside the box, the company’s co-founders are unveiling ways for developers to meld their service with every app on every device you own. The new Datastores API - the Next Big Thing, or just another cloud service?
|
|
|
|
|
Targeting multiple operating systems has been an industry goal or non-goal depending on your perspective since some of the earliest days of computing. For both app developers and platform builders, the evolution of their work follow typical patterns—patterns where their goals might be aligned or manageable in the short term but become increasingly divergent over time. While history does not always repeat itself, the ingredients for a repeat of cross-platform woes currently exist in the domain of mobile apps. Steven Sinofsky's fairly epic "Rise and Fall of Cross-platform Development."
|
|
|
|
|
An interesting if long ramble through the cross platform swamp. He's obviously and unsurprisingly not noticed that I'm about to move in, drain the swamp and park my little brightly coloured tank sprites all over it with the QOR. I'm sure Steven will be interested when it happens.
"The secret of happiness is freedom, and the secret of freedom, courage."
Thucydides (B.C. 460-400)
|
|
|
|
|
Two years ago, I was working in a project where our goal was to write a web excel-like application to calculate products/services prices... This project became so big and we didn’t use any types of automated tests (our QA team was doing manual tests) that the project spent more time being tested than being developed. Each little change, the project spent hours, hours and hours with the QA team. One day I went to a developer meeting and talked about my problem with others programmers. They suggested to me learn about unit tests, acceptance tests and TDD. As with most things: start slowly, master small projects before big projects, and keep learning.
|
|
|
|
|
ASCII is the American Standard Code for Information Interchange. It uses 7-bit numbers to represent the letters, numerals and common punctuation used in American English. The fact that ASCII uses 7-bit numbers means there are 2-to-the-power-7 or 128 possible values it can represent, from 0 to 127 inclusive. Each of those 128 values is assigned to a character.... ASCII really should have been named ASCIIWOA: the American Standard Code for Information Exchange With Other Americans. The history of character encoding in a U+006E U+0075 U+0074 U+0073 U+0068 U+0065 U+006C U+006C.
|
|
|
|
|
Quote: In the beginning there was ASCIIEBCDIC
FTFY.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
|
S/360 launched with EBCDIC because by the time ascii was finalized it was too late to rewrite the system. Paper launches don't count.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Software programming? Yeah it’s an okay way to make a living. But the real money is in teaching. Or at least that’s the recent experience of Scott Allen, a programmer and teacher the tech-y online education platform Pluralsight.com. Allen has earned more than $1.8 million through fees and royalties from Pluralsight over the last five years.... Both higher education and journalism have recently had their economic foundations rocked. The purists in both industries are wary of the democratizing potential of the Internet to replace august institutions of old. Meanwhile, others hope the Web may be an answer for solving some of the innate problems. You can learn to teach, too, by sharing your expertise on CodeProject and CodeProject.tv.
|
|
|
|
|
Back when I was a student, the way you talked to other people on the internet was via Usenet. The language we used, while still called “English”, was slightly different from the language we use today. One small example of this difference is that there was still an outside chance that the word “hacker” could be a badge of honour, an indication of one who wanted to understand the principles of a system and how they could manipulate it. It's not a job, it's an advent.... Actually, it is a job.
|
|
|
|
|
In December 2011, the Department of Homeland Security notified both the EDA and the National Oceanic and Atmospheric Administration (NOAA) that there was a potential malware infection within the two agencies' systems. The NOAA isolated and cleaned up the problem within a few weeks.... EDA's CIO, fearing that the agency was under attack from a nation-state, insisted instead on a policy of physical destruction. The EDA destroyed not only (uninfected) desktop computers but also printers, cameras, keyboards, and even mice. Would you believe Stuxnet in the laser printer? How about malware in a popup window?
|
|
|
|
|
dafuq?
Gryphons Are Awesome! Gryphons Are Awesome!
|
|
|
|
|
Take Google's bizarre practice of publicly killing products. To most companies, killing a product is a shameful thing. It disappoints customers, and it hurts your own ego because it's an admission that you failed. Most companies hide their product cancellations... Google does the exact opposite – a couple of times a year it trumpets to the world that it's terminating products and services that millions of people love and rely on. Google isn't merely up front about these cancellations; it's downright cheerful... If you look at the world through the eyes of the scientific method, every Google project is an experiment, and experiments must be periodically reviewed. When an experiment is completed, you either choose to follow up on it, or you terminate it and move on to something else. From closing Reader to buying Motorola, an insider explains the hidden meaning.
|
|
|
|
|
|
I wonder if it has women's rights listed
|
|
|
|
|
a) Is it a new engine, if it uses the Google and Bing search engine?
b) The name smells awful lot of trademark infringement.
c) A Internet without porn is like a Christmas without presents.
|
|
|
|
|
I would suggest you to research yourself
Like, check the meaning of Halal.
And please dont compare Porn internet with Christmas presents
Previous -> Read "CLR via C#" by Jeffrey Ritcher.
Current -> Exploring WCF thru Apress' "Pro WCF" by Chris Peiris and Dennis Mulder.
Next -> Need to read "The Art of Computer Programming" by Donald E. Knuth.
|
|
|
|