|
The news isn’t shocking. In fact, it’s sort of a shock it didn’t happen several years ago. After slightly more than thirty years in print, PCWorld magazine is ceasing publication, effective with the current issue, to focus on its website and digital editions. If I have to explain why, you haven’t been paying attention to the media business for the past decade or so. The web has been awfully hard on magazines, and no category has suffered more than computer publications. I still miss Omni. What was your favorite print tech magazine?
|
|
|
|
|
I still remember the glorious anarchic mashup that was Your Spectrum, a monthly wail of tech induced joy from the heart of Soho. Then Phil South went and got a real job, the console kiddies took over and nothing was quite the same anymore. Games started to cost more than the cover price of a magazine and PCWorld wasn't half an inch thick anymore. I would miss the eighties. I really would if I could
"The secret of happiness is freedom, and the secret of freedom, courage."
Thucydides (B.C. 460-400)
|
|
|
|
|
For me, BYTE was the first really good magazine I had the pleasure of reading. I remember reading about Smalltalk (the famous balloon cover - Byte Smalltalk Issue[^]), Linn's Rekursiv (Rekursiv[^]), BeOS, TAOS (TAOS[^]), Transputers (Transputer[^]) and many other products that have evaporated over the years.
Of course they did have regular articles on abominations such as 4GLs too, which are probably better forgotten.
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
PC Magazine in the 90s. In the pre-The Register era Dvorak's column was the only readily available source for the rumors and nasty gossip that weren't considered fit for normal articles.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption, according to top-secret documents obtained by the Guardian.... The documents show that: Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal... Pre-encryption access to email on Outlook.com, including Hotmail? Just the tip of the PRISM.
|
|
|
|
|
Skype is finished.
And to think - I bet the biggest user base for Skype is teenage girls ... and you have these "watchers" spying on our daughters realtime.
Nothing short of sickening.
|
|
|
|
|
If smartphones can have app stores, why not cars? That's the thinking of at least some of the big automakers as they work to build the foundation for curated selections of car-centric apps that can be purchased directly from the vehicle's in-dash monitor.... The industry, which is used to multiyear development cycles on each car model and a consistent annual shipment schedule, is attempting to work with a mobile device sector more accustomed to a phone or tablet launch every other month, and where the pace of innovation has been relentless. An in-app purchase is required to complete this trip...
|
|
|
|
|
Hewlett-Packard has agreed that there is an undocumented administrative account in its StoreVirtual products, and is promising a patch by 17 July. The issue, which seems to have existed since 2009, was brought to the attention of The Register by Technion, the blogger who earlier published an undocumented backdoor in the company's StoreOnce products.... Although data isn't accessible via the backdoor, one user with around 50 TB of StoreVirtual capacity said the account gave sufficient access to reboot nodes in a cluster, “and so cripple the cluster”. Keep a knockin' but you can't... oh, you came right in....
|
|
|
|
|
Today, we are announcing a far-reaching realignment of the company that will enable us to innovate with greater speed, efficiency and capability in a fast changing world. Today’s announcement will enable us to execute even better on our strategy to deliver a family of devices and services that best empower people for the activities they value most and the enterprise extensions and services that are most valuable to business. The big, rumored Microsoft re-org is here. How will it affect the products?
|
|
|
|
|
http://techcrunch.com/2013/07/10/pantheon-multidev/[^]
Previous -> Read "CLR via C#" by Jeffrey Ritcher.
Current -> Exploring WCF thru Apress' "Pro WCF" by Chris Peiris and Dennis Mulder.
Next -> Need to read "The Art of Computer Programming" by Donald E. Knuth.
|
|
|
|
|
|
Portable Class Libraries are the Happy Little Feature that Could. They've been chugging along, doing their thing, and it's getting to the point where they are going to pop. That's pop in a good way. If you're not writing .NET apps for more than one target, then you likely haven't bumped into them. However for those people who are writing .NET and want it to run on everything from Watches to Phones to Tablets to Xboxen to Desktops to the Cloud, they are enjoying what PCLs can offer. The Windows platform limitations seems mostly legal, not technical at this point.
|
|
|
|
|
Git receives a lot of positive press. There are countless websites, articles, and blog posts dedicated to the adulation of Git. It’s plenty easy to find a list of reasons to use Git. It’s much harder to find a list of substantial reasons not to use Git.... Unable to find a complete list of Git’s weaknesses, I have attempted to compile a list myself. This new learning amazes me, Sir Bedevere.
|
|
|
|
|
The real elephant in the room here is that in all these articles on this subject, rarely does anyone actually quantify how slow JS is or provide any sort of actually useful standard of comparison. (You know… slow relative to what?) To correct this, I will develop, in this article, not just one useful equivalency for JavaScript performance–but three of them.... I’m going to quantify exactly how slow it is, and compare it to a wide variety of things in your real-life programming experience so that, when you are faced with your own platform decision, you can do your own back-of-the-napkin math on whether or not JavaScript is feasible for solving your own particular problem. In benchmarks unlikely to surprise anyone, slow browsers on slow CPUs run slowly.
|
|
|
|
|
Brilliant article, especially the stuff about garbage collection.
|
|
|
|
|
At TechEd, in early June, I announced our agreement to acquire InRelease – a release management product built specifically for Team Foundation Server by InCycle Software.... I’m happy to say that about a week ago we closed the acquisition and InRelease is now a part of Microsoft.... We are providing a preview of our future Release Management product today. It’s basically the existing InRelease product with some minimal changes to meet some of our compliance requirements. Press release for InRelease preview release released.
|
|
|
|
|
Back in 2008, MySQL was rapidly growing in popularity when Sun Microsystems bought MySQL AB for approximately a billion bucks. The following year, Oracle scooped up Sun, and MySQL was part of the deal... Flash forward to 2013: Oracle didn’t kill off its former competitor, and MySQL remains the most popular open source database. Still, MySQL’s popularity is on the decline; as it loses its luster, viable database alternatives have started to shine. What's your first choice for a database today?
|
|
|
|
|
PostgreSQL for an open source database for pet projects. MSSQL for anything work related.
|
|
|
|
|
When I first started digging into the bowels of the Internet, I was fascinated by how many of its protocols—like HTTP and SMTP, for example—were entirely text based. At first, this struck me as a very odd thing; text is inefficient, and machines, not humans, are meant to interpret protocols. A binary setup would save bytes — bytes! — and be all-around more manageable by software. It wasn’t long, however, before I realized the true genius behind this decision. Obscurity and obsessive abstraction are two of the worst problems that affect software development.
|
|
|
|
|
Terrence Dorsey wrote: Obscurity and obsessive abstraction are two of the worst problems that affect
software development.
Too true. http://xkcd.com/974/[^]
10 PRINT "Software is hard. - D. Knuth"
20 GOTO 10
|
|
|
|
|
Effective immediately, developers must fix vulnerabilities in their apps rated "critical" or "important" -- the top two rankings in Microsoft's four-step threat-scoring system -- within 180 days of being notified by the MSRC. The penalty for failure: Microsoft will remove the vulnerable app from the pertinent app store.... Microsoft's own Windows, Office or Azure apps are also covered by the new policy. Not surprisingly, caveats apply. See also: Windows XP.
|
|
|
|
|
Microsoft Chief Operating Officer Kevin Turner shared some new hints about what's coming during what he called Microsoft's "biggest innovation year ever" during Day 3 of Microsoft's Worldwide Partner Conference... We already knew Microsoft had committed to launching Windows 8.1, Windows Server 2012 R2, Visual Studio 2013, SQL Server 2014, System Center 2012 R2 and a host of other "Blue" wave of products during this coming fiscal year... here are a few things I thought worth calling out... Office Windows Store apps? Interesting.
|
|
|
|
|
How Bitcoins are actually created is all too often overlooked. The currency isn’t minted at will in a factory setting. Bitcoins don’t just magically appear out of thin air. Instead, they’re the products of complex software algorithms that run day and night on incredibly powerful computers. So who, exactly, has the pioneering spirit to “mine” the virtual currency, converting CPU and GPU cycles into something of real-world value? It takes time, dedication, and an extraordinary amount of water-cooled PC hardware. Here's what it takes to mine $191,900 worth of Bitcoin. Your old PCs probably won't cut it.
|
|
|
|
|
Bug bounty programs can be as much as 100 times more cost-effective for finding security vulnerabilities than hiring full-time security researchers to do the same thing. New research from the University of California at Berkeley, which focused on bug bounty programs run by Google and Mozilla, found that each of these programs has cost the vendor about $400,000 over the course of three years, far less than it would’ve cost to hire employees to find the same number of vulnerabilities. Next up: work bounties.
|
|
|
|
|
It’s about time, right‽ In fact, it has been 3 and a half years since I first declared that getting RIA Services open-sourced was my stretch goal. Since then, I’ve seen dozens of forum posts, hundreds of tweets, and over 13,000 page-views for my original declaration. There was even a time during a LIDNUG call when Scott Guthrie was directly asked what it was going to take to get RIA Services open-sourced. This has been an important topic to a lot of people for a long time, and I am finally happy to announce it’s happening! Congratulations! And now it's your turn to contribute to RIA Services. Good luck!
|
|
|
|