|
At the age of 13 I wrote ~500 lines of Sinclair BASIC over 5 to 6 hours one Saturday without running it to check it. When I did run it there were 2 syntax errors, just typos which I fixed then and there.
The code then ran without error and did exactly what I expected.
I knew that was a very special day and nothing like that would probably ever happen again.
It was 20 years before with the help of an IDE I could hope to write 500 lines of boilerplate C++ in a day with as few mistakes. I'm not sure if I've ever done it but I've probably got close on a few occasions.
"The secret of happiness is freedom, and the secret of freedom, courage."
Thucydides (B.C. 460-400)
|
|
|
|
|
Ever wondered how the pro’s physically manage to make a module? Well ok, you can get a fancy pick and place machine or send off for someone to assemble your module, but you can do it by hand. It is not as hard as expected. As part of a .NET Gadgeteer hands on event at the Modern Jago in Shoreditch we were delighted to have Justin Wilson from Ingenuity Micro attend and show us how things are done (www.ingenuitymicro.com). He has designed and built an nice collection of .NET Gadgeteer modules and mainboards and expects to have them available shortly. Old-school .NET hacking... with solder.
|
|
|
|
|
Code review is a tricky business. Code is full of hidden mines that lay dormant while you test just to explode in a debris of stack trace at the most inopportune time – when its in the hands of your users. The many times I’ve run into such mines just reinforce how important it is to write code that is intention revealing and to make sure assumptions are documented via asserts. Such devious code is often the most innocuous looking code. We are miners, code bug miners. To the code base we must go...
|
|
|
|
|
When I use the term “enterprise” to describe software, I typically mean “software that helps people get work done more efficiently.” In this sense, Angry Birds and your favorite Twitter client are not enterprise applications. A Twitter client that has additional features to facilitate and track a company’s social engagement, on the other hand, might fall into the enterprise category. An application that is used in a call center to track incoming support requests is definitely “enterprise”. A system that connects several “legacy” systems and presents employees with a unified interface and saves 1000s of man-years every month of application context switching? Enterprise. Do you write "enterprise JavaScript"? Tell us about it.
|
|
|
|
|
I remember how in University my photography class and I struggled to grasp exposure and how it worked. We had exercises where for hours on end we were asked to "play" with the settings and get a feel for what they do. I don't like getting a "feel" for something. I like knowing how it works.... The trick was learning what each of the vertices afforded and cost you. That was the key to our DSLR simulator. Smile for the Canvas.
|
|
|
|
|
Haswell is Intel’s new family of processors targeted at the PC and server market. With Haswell Intel has designed a processor suited to new PC form factors – laptops no thicker than 25mm, PC/tablet hybrids, pure tablets and all-in-one PCs. In particular Intel has targeted the fourth generation chip at serving what it calls the ‘ultrabook’ market. Intel defines ultrabooks as mobile computers thinner than 25mm, with touchscreen and voice control as standard and possibly convertible into either a tablet or laptop. Everything you need to know about the fourth generation of PC processors from Intel.
|
|
|
|
|
Microsoft researchers say they have come up with a novel approach to boost the accuracy of speech recognition and rev up the speed in which it's rendered by creating a computation model that mimics the way the brain works. By applying so-called deep neural networks to speech recognition, Microsoft researchers claim that users in the United States, composing a text message or searching via Bing with their voices, will see results twice as fast as they did with Microsoft's previous technology. And the researchers say accuracy has improved by 15 percent. Earn more sessions by sleeving.
|
|
|
|
|
Much of what I’ve heard when I hear about UX is: How do we arrange everything on the screen so that a user can figure it out and quickly accomplish their goals? How do we make use of graphic design, layout, text, interactivity, affordances, animation and so on to make things easier for the user? Lately I’ve start learning to build electronics with Arduino and it’s made me much more sympathetic to the designers of simple hardware. How much can you convey with a single button and lights?
|
|
|
|
|
Terrence Dorsey wrote: How much can you convey with a single button and lights?
Depends on how many lights... I have ... let me see ... 1296000 available here to use in the UI. Seems to work ok for me.
|
|
|
|
|
Microsoft is reaching out to two main audiences this year at Build, said Steve Guggenheimer, Corporate Vice President of Microsoft's Developer and Platform Evangelism Group: The existing Win32, line-of-business/commercial developer community and the startup community. "We need a good conversation with that community," said Guggenheimer about the existing .Net developer base, many of whom have felt disenfranchised by Microsoft's recent developer push toward HTML/JavaScript. Going to Build? What do you hope to see?
|
|
|
|
|
Some days... some days it's frustrating to be on the web. We're compiling C++ into JavaScript and running Unreal in the browser but at the same time, here in 2013, we're still making the same mistakes. And by we, I mean, the set of web developers who aren't us, right Dear Reader? Because surely you're not doing any of these things. All of these are solvable problems. They aren't technically hard, or even technically interesting. 9 lazy problems often found in web apps.
|
|
|
|
|
Yes! Though (in reference to 404 redirects), I will say that the redirect file we have at my company is already several thousand lines long. Can't wait until we move to MVC (supposing we do) and I can create a vanity URL component (based on MVC routing) that can use a database lookup to see destinations for vanity URL's. Then I can just build a simple user control into the CMS so anybody who wants to make a vanity URL can, without any developer intervention.
I can dream, can't I?
|
|
|
|
|
You're such a silly little Dreamer![^]
If your actions inspire others to dream more, learn more, do more and become more, you are a leader.-John Q. Adams You must accept one of two basic premises: Either we are alone in the universe, or we are not alone in the universe. And either way, the implications are staggering.-Wernher von Braun Only two things are infinite, the universe and human stupidity, and I'm not sure about the former.-Albert Einstein
|
|
|
|
|
On Apr 17, 2012 Jordan Mechner released the source code of Prince of Persia. Even though it is the Apple II version written in 6502 assembly language, it was a pleasant experience to dive in the code of that mythical game: As usual there were many fascinating sofware wizardries to discover. The Apple II apparent poor environment for game programming was actually ground to unmatched innovation and creativity : From self-modifying code, in-house bootloader, clever floppy disc format to skewing lookup tables: Prince Of Persia features engineering treasures in every modules. You - and this code - are the only obstacle between Jaffar and the throne.
|
|
|
|
|
I see three main reasons why people might not be thinking about — or even doing! — backups as much any more: Time Machine, cloud services, and new bogeymen.... Needless to say, not paying attention to backups is a dangerous trend — despite Apple’s excellent work with automatic iOS backups to iCloud and Google’s cloud-focused Chrome OS, we’re still years from a mainstream computer operating system that will automatically and reliably back up all local data. (Of course, if the NSA is keeping copies of all our files, perhaps they could let us restore too!) Once in a while, You got to burn down your house, keep your dreaming alive.
|
|
|
|
|
I have very little need to back up. All I back up anyway is all my install files, which are readily available. All my work, code, docs etc. are backed up on bitbucket. And for a bonus, administered and versioned.
The only think I need back up is my media collection, but I've heard or watched them all before, and they're also available everywhere.
|
|
|
|
|
Terrence Dorsey wrote: NSA is keeping copies of all our files, perhaps they could let us restore too!
They have to take care of privacy. Which means that your data are protected from you accessing them!
|
|
|
|
|
Feel like someone is snooping on you? Browse anonymously anywhere you go with the Onion Pi Tor proxy. This is fun weekend project that uses a Raspberry Pi, a USB WiFi adapter and Ethernet cable to create a small, low-power and portable privacy Pi. Be smart and paranoid about your TOR usage.
|
|
|
|
|
In the Linux and Unix operating systems, everything is treated as a file. Whenever possible, those files are stored as human- and machine-readable text files. As a result, Linux contains a large number of tools that are specialized for working with texts. Here we will use a few of these tools to explore a textual source. DIY cyberintelligence.
|
|
|
|
|
A month or two ago, I made a conscious decision that I would return to using as much Free Software as possible. The PRISM debacle of the last week confirmed my fears and reasoning, and so I made the decision to accelerate the schedule. Here’s what I did, and how you can, too. Free software developed by volunteers all over the world. What could possibly go wrong?
|
|
|
|
|
Bloomberg came out with quite a bombshell last night, discussing how lots of tech companies apparently work with the NSA and other government agencies, not to pass data on users over to the government, but to share exploit information, sometimes before it's public or patched -- in some cases so it can be useful for the US government to use proactively. Last month, we had written about how the feds were certainly collecting hacks and vulnerabilities for offensive purposes, but it wasn't clear at the time that some of these exploits were coming directly from the companies themselves. With friends like this, who needs hackers?
|
|
|
|
|
The Hon. David Nuffer has ruled on the SCO v. IBM motions, granting SCO's motion for reconsideration and reopening the case, which IBM did not object to.... The thing that makes predictions a bit murky is that there are some other motions, aside from the summary judgment motions, that were also not officially decided before SCO filed for bankruptcy that could, in SCO's perfect world, reopen certain matters. I believe they would have been denied, if the prior judge had had time to rule on them. Now? I don't know. It will be the year of the Unix desktop before this case finally gets resolved.
|
|
|
|
|
Linux already runs on ARM and while Microsoft continue to play it cagey on their thoughts about ARM binaries for Windows Server, owning a Microsoft Surface I can tell you that Windows does run on ARM today even if there are still massive performance optimisations being pushed out on a regular basis.... While Windows RT is Windows 8 on ARM in 32 Bit Mode it proves ARM like PowerPC or DEC ALPHA in the Windows NT 4 days, is a viable target platform technically. Even if the business case for Windows Server just isn’t there yet. It's only a matter of time (and cheap chips) before Windows Server runs on ARM.
|
|
|
|
|
Citadel was the seventh Microsoft-led operation against botnets. While some researchers commend the company for causing financial pain to cybercriminals, other researchers see the operations as public relations stunts that run roughshod over their work to battle botnets. A Swiss researcher in the nonprofit organization abuse.ch said in a recent blog post that roughly a quarter of the 4000 domain names seized by Microsoft and redirected to its server were actually pointed to the systems of researchers gathering information on Citadel. Watching the watchers watching watchers of watchers.
|
|
|
|
|
Quote: Software Engineering Candies[^]
This article describes how to write unmaintainable code and have an excellent paid job for the rest of your life. The key skill to unmaintainable code is the obfuscation of the code - besides poor design, no test cases and overly complex algorithms. [...] If you really like to write well maintainable code, feel use this as input for things you shouldn't do in your next project.
This may sound as a pure joke, but it should help to write better code.
|
|
|
|