|
From my own experiences from the past few months I'd recommend http://www.sfml-dev.org/[^]
It runs Windows, Linux, Mac.
It's a great little library that is written in C++, but fully supports C, C++, D, Java, Python, Ruby, and .NET. It has support for OpenGL shaders too.
I've heard from the author that the OpenGL type that is on Raspberry Pi might be supported one day too.
.-.
|o,o|
,| _\=/_ .-""-.
||/_/_\_\ /[] _ _\
|_/|(_)|\\ _|_o_LII|_
\._. |\_/|"` |_| ==== |_|
|_|_| ||" || ||
|-|-| ||LI o ||
|_|_| ||'----'||
/_/ \_\ /__| |__\
modified 23-Jun-13 22:24pm.
|
|
|
|
|
What is the best way to learn JavaScript? If you haven’t programmed before, you first have learn what programming is. If you are a programmer, though, you can take a shortcut: You already know many programming language constructs and just need to learn how they are expressed in JavaScript. Assuming that you are a programmer, the goal of this blog post is to get you started with JavaScript as quickly as possible. It describes the smallest subset of the language that allows you to be productive. An optimal subset of JavaScript that allows one to be productive.
|
|
|
|
|
Just skimmed it a bit, but came across this really interesting feature of JavaScript I hadn't known about until now:
"use strict";
Seems to be like VB.NET's Option Strict in that it prevents unnecessary cruft. More info here. Gonna try that out for the next major JavaScript project I work on.
|
|
|
|
|
The Facade pattern is a common software design pattern used to create a simple unified interface for a set of interfaces in a system. The Facade interface is a higher-level interface that allows easier control of a set of subsystem interfaces without affecting the subsystem interfaces. Today I'll demonstrate how to implement the Facade pattern in the .NET Framework. Eric Vogel takes you behind the scenes to see how the Facade is constructed.
|
|
|
|
|
If you work with C#, you have already mixed object-oriented code with some aspects of functional programming. Why not master Scala? Scala usage in enterprise applications is growing faster than the number of available developers, so there is an increasing demand for .NET developers to learn Scala — using existing C#, VB.NET, LINQ, and F# knowledge as a foundation. In this first article in a series dedicated to Scala for C# developers, I provide an introduction to Scala and its most popular IDE. It is aimed at those who spend their days with Visual Studio, but are interested in learning the increasingly popular JVM language. Scale your skills with Scala.
|
|
|
|
|
Elixir is a functional programming language that runs on the Erlang virtual machine. It has a Ruby-like syntax, and features protocols (for extending modules without changing their source), macros, and very good metaprogramming support. It has the benefit of learning from other languages’ experiences, too, so it has many modern features. For example, protocols and macros are lexically scoped, so metaprogramming no longer risks messing up the global execution environment. It's fully compatible with existing Erlang code. So you've got that going for you, which is nice.
|
|
|
|
|
The other day I wrote about some principles that programming in Clojure makes very clear. Those principles could be applied just as well in Java, and often are. However, there are some things that make Clojure distinct. Three of those distinctions are the way it deals with state change (using an STM), the Persistent Data Structures, and the literal syntax for data with a reader (now called edn). Diving into the source code for Clojure, I realized that these three bits were written in Java. And that means that they can be used from Java. It's not really stealing if they're already Java, right?
|
|
|
|
|
If I could be remembered for just one thing, I’d want it to be this, because this is what designers and companies need to know and understand about the nature of user experience as a profession, a goal, an idea. And it’s taken me 13 years to be able to say it in exactly this way. Following is my list of 13 beliefs on the value of user experience strategy, design, and designers, one for every year I’d been in the web industry at the time I wrote it. Make it work obviously and all the time. That's a good experience.
|
|
|
|
|
Back when I used to post on newsgroups I would frequently be in the middle of a debate of the details of some behaviour or terminology, when one poster would say: “You’re just quibbling over semantics” as if this excused any and all previous inaccuracies. I would usually agree – I was indeed quibbling about semantics, but there’s no “just” about it. Semantics is meaning, and that’s at the heart of communication – so for example, a debate over whether it’s correct to say that Java uses pass- by-reference1 is all about semantics. Without semantics, there’s nothing to talk about. I do not think it means what you think it means: pedantic talk about code and data.
|
|
|
|
|
With Apple’s licensing of Microsoft’s exFAT file system, it seemed like the main problem with FAT32—the 4GB file size limit—was put to rest, and many people are probably now using it to swap video libraries between their MacBooks and HTPCs or share downloads between OS X and Boot Camped Windows. But exFAT has its own issues and limitations that few people are probably aware of—and considering how few people even know about exFAT, we thought this was a good opportunity to cover it, along with the various alternatives. Drag, drop, wait, transfer... doing the file-sharing Samba.
|
|
|
|
|
Nowadays I boot into my Windows 7, check my mail and browse some web; then I click on VirtualBox and start Lubuntu to code web application (Python, Flask, Brunch, etc.), where I spent most of the time on. It's funny I spend most of my time in a VM. Working in VMs on Windows because it's competent, or just comfortable?
|
|
|
|
|
Comparison of Ways to Check Preconditions in Java[^]
Quote: The use of preconditions, postconditions and invariants is extremely helpful to develop maintainable code. Unfortunately, we find preconditions quite seldom in real world applications. [...] Guava Preconditions and Apache Commons Validate class are the best choice and have almost the same functionality (just take what is more convenient in your technology stack) Use Preconditions in your code - this is most of the time better than a lot of comments. but don't use asserts as preconditions
modified 21-Jun-13 8:37am.
|
|
|
|
|
My name is Maureen McElaney and I live in Burlington, VT. I work as a Digital Advisor at Dealer.com, a digital marketing and software development firm serving the automotive industry. I am also the leader of the Burlington chapter of Girl Develop It. Maureen is just getting started as a dev, but already contributing to the community.
|
|
|
|
|
Why is this important? For starters, do you really like strangers peeping into your windows (no pun intended), prying in and seeing every move you make? In regards to applications, whenever you make your application available to users, you are giving them every opportunity to pry on everything you do. Your intellectual property, trade secrets, source code is readily available to them. For instance, I did a very light search on Bing for my app’s xap (GoGetter) availability on the internet. I found a few sources where you could, if you wanted to, download my app’s xap among other developer’s xap of their applications. No beuno. Guard well this treasure, oh Hassan, or the jackals shall grow fat on thy carcass!
|
|
|
|
|
As I believe , we can't do any obfuscation for Windows Store Apps developed using Win JS. Wonder why MS did not consider doing so ?
Does anyone has an answer for it?
Ranjan.D
|
|
|
|
|
Security through obscurity. Obfuscation won't do anything but slow down an attacker, and stop those with only a passing interest in your code. Once someone has your assemblies, and a sufficient amount of will power, its game over.
Be The Noise
|
|
|
|
|
at the same time; working with obfuscated code is the same as working with the horrible legacy codethuluelephant you can't convince your boss to let you scrap and rewrite. You won't be able to stop the idiot who just changes your name to his; but the pain factor will discourage people from stealing your app to use as the basis of their own.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Seriously? "Obfuscation protects your trade secrets"?
I guess he never reverse-engineered an obfuscated program.
Yes it's annoying .. and perfectly doable.
|
|
|
|
|
Emil Eifrem @emileifrem is the Founder of Neo4j and CEO of Neo Technology. He is also one of the authors of Graph Databases. Recently, I had the opportunity to sit down with Emil and we talked about the current and future opportunities for graph databases. Graph databases are not just for social search. Just ask your social graph.
|
|
|
|
|
Terrence Dorsey wrote: Graph databases are not just for social search. Just ask your social graph.
Sounds like he's talking about what I wrote about a couple years ago in my Relationship Oriented Programming[^] article.
Too bad I didn't come up with a sexy name like "Graph Database", hahaha. Nodes, relationships, and key-value pairs. That's exactly what ROP is.
Marc
|
|
|
|
|
FunScript is a lightweight F# library that lets you rapidly develop single-page applications. You can connect to external data sources and call REST APIs with intellisense, produce dashboards using JavaScript visualization libraries and write asynchronous computations easily without explicit callbacks. Functional programming and JavaScript - that's two, two, TWO programming trends in one!
|
|
|
|
|
Put down the iPhone for a second, and consider what computing was about when it wasn’t all linked up like it is today. When machines needed to do stuff all by themselves, with no supplemental resources available to them. When local storage was all there was to be had. That is the context of the early machines: computers that blazed a path (which I think was not clear at the time even to their creators) for how people could use small machines, which we ever-so-preciously called microcomputers (compared to minicomputers such as the DEC VAX, which were all the rage in geek circles). These were the experiments that lead to the mainstream forms of personal computing that followed. A look back at programming the Altair 8080 and IMSAI 8080.
|
|
|
|
|
We live in a world where digital information is exploding. Some 90% of the world’s data was generated in the past two years. The obvious question is: how can we store it all? In Nature Communications today, we, along with Richard Evans from CSIRO, show how we developed a new technique to enable the data capacity of a single DVD to increase from 4.7 gigabytes up to one petabyte (1,000 terabytes). This is equivalent of 10.6 years of compressed high-definition video or 50,000 full high-definition movies. Removing cat photos and animated GIFs reduces the problem significantly.
|
|
|
|
|
As a strong rule of thumb – show love to the audio folk of the venue you speak at. They know their stuff and it is up to them for you to be audible by the audience. Follow their advice and make their life easier and you’ll give a great talk. Christian Heilmann shares some great tips on successful conference speaking.
|
|
|
|
|
More than passively eavesdropping, we're penetrating and damaging foreign networks for both espionage and to ready them for attack. We're creating custom-designed Internet weapons, pre-targeted and ready to be "fired" against some piece of another country's electronic infrastructure on a moment's notice.... We're pursuing policies that are both expensive and destabilizing and aren't making the Internet any safer. We're reacting from fear, and causing other countries to counter-react from fear. We're ignoring resilience in favor of offense. Welcome to the cyberwar arms race, an arms race that will define the Internet in the 21st century. Bruce Schneier: It's time to stop the madness.
|
|
|
|