|
"I think I'll stop here." This is how, on 23rd of June 1993, Andrew Wiles ended his series of lectures at the Isaac Newton Institute in Cambridge. The applause, so witnesses report, was thunderous: Wiles had just delivered a proof of a result that had haunted mathematicians for over 350 years: Fermat's last theorem. Wiles’ announcement now celebrates its twentieth birthday, but the result itself is linked to maths that is over 2000 years old. Celebrating Andrew Wiles' solution to Fermat's last theorem.
|
|
|
|
|
Terrence Dorsey wrote: I think I'll stop here.
Forrest Gump style!
|
|
|
|
|
Microsoft has added a new security option for those using its Windows Azure cloud service. Administrators can block unauthorized users from accessing virtual machines, Microsoft quietly announced at its TechEd conference in New Orleans earlier this month. The new option lets administrators put Access Control Lists (ACLs) on individual endpoints. By putting the ACLs on endpoints or subnets, administrators can control unauthorized access to virtual machines that are protected behind a firewall but are accessible in the public cloud. Don't leave your ports hanging out in public.
|
|
|
|
|
The product grabbing the headlines is the new Nytro WarpDrive BFH8-3200, a product that for once lives up to the hype in it’s name. This is a full height PCIe3 8x flash storage card that has 3.2TB of usable space, 4.0TB of actual flash for those who want the numbers under the hood. LSI claims a 4.0GBps, not Gbps mind you, sustained throughput for performance, a fairly staggering amount. I recently joked about RAM-as-storage. Well, jokes on me: here it is...
|
|
|
|
|
At a cost of more than all the computers I've bought in my life combined, I think I'll just dream and wait for it to drop price 99% before I invest in one.
|
|
|
|
|
Pretty sure my very first 20MB hard drive cost half again as much as the Mac Plus it upgraded, but yeah, this is another league entirely.
Director of Content Development, The Code Project
|
|
|
|
|
Friday Facebook announced the fix of a bug it said inadvertently exposed the private information of over six million users when Facebook's previously unknown shadow profiles accidentally merged with user accounts in data history record requests. According to Reuters, the data leak spanned a year beginning in 2012. Only the Shadow knows... oh, and everyone else on Facebook.
|
|
|
|
|
Now there's actual large infrastructure to support developers who want to create and publish their Linux games without having to deal with the usual lack of central standard authority themselves. Considering the direction Windows is going, this whole Linux game development thing doesn't seem so pointless after all. Having a multi-platform engine also has the advantage of being able to run games on special and portable devices that have become popular. You can easily adapt your engine to fit more devices when you use libraries that already have multiple versions (like SDL, OpenGL, etc.). It becomes easy to target even niche devices like the Raspberry Pi. Don't like where PC and Xbox gaming are headed? Take a look at Linux.
|
|
|
|
|
From my own experiences from the past few months I'd recommend http://www.sfml-dev.org/[^]
It runs Windows, Linux, Mac.
It's a great little library that is written in C++, but fully supports C, C++, D, Java, Python, Ruby, and .NET. It has support for OpenGL shaders too.
I've heard from the author that the OpenGL type that is on Raspberry Pi might be supported one day too.
.-.
|o,o|
,| _\=/_ .-""-.
||/_/_\_\ /[] _ _\
|_/|(_)|\\ _|_o_LII|_
\._. |\_/|"` |_| ==== |_|
|_|_| ||" || ||
|-|-| ||LI o ||
|_|_| ||'----'||
/_/ \_\ /__| |__\
modified 23-Jun-13 22:24pm.
|
|
|
|
|
What is the best way to learn JavaScript? If you haven’t programmed before, you first have learn what programming is. If you are a programmer, though, you can take a shortcut: You already know many programming language constructs and just need to learn how they are expressed in JavaScript. Assuming that you are a programmer, the goal of this blog post is to get you started with JavaScript as quickly as possible. It describes the smallest subset of the language that allows you to be productive. An optimal subset of JavaScript that allows one to be productive.
|
|
|
|
|
Just skimmed it a bit, but came across this really interesting feature of JavaScript I hadn't known about until now:
"use strict";
Seems to be like VB.NET's Option Strict in that it prevents unnecessary cruft. More info here. Gonna try that out for the next major JavaScript project I work on.
|
|
|
|
|
The Facade pattern is a common software design pattern used to create a simple unified interface for a set of interfaces in a system. The Facade interface is a higher-level interface that allows easier control of a set of subsystem interfaces without affecting the subsystem interfaces. Today I'll demonstrate how to implement the Facade pattern in the .NET Framework. Eric Vogel takes you behind the scenes to see how the Facade is constructed.
|
|
|
|
|
If you work with C#, you have already mixed object-oriented code with some aspects of functional programming. Why not master Scala? Scala usage in enterprise applications is growing faster than the number of available developers, so there is an increasing demand for .NET developers to learn Scala — using existing C#, VB.NET, LINQ, and F# knowledge as a foundation. In this first article in a series dedicated to Scala for C# developers, I provide an introduction to Scala and its most popular IDE. It is aimed at those who spend their days with Visual Studio, but are interested in learning the increasingly popular JVM language. Scale your skills with Scala.
|
|
|
|
|
Elixir is a functional programming language that runs on the Erlang virtual machine. It has a Ruby-like syntax, and features protocols (for extending modules without changing their source), macros, and very good metaprogramming support. It has the benefit of learning from other languages’ experiences, too, so it has many modern features. For example, protocols and macros are lexically scoped, so metaprogramming no longer risks messing up the global execution environment. It's fully compatible with existing Erlang code. So you've got that going for you, which is nice.
|
|
|
|
|
The other day I wrote about some principles that programming in Clojure makes very clear. Those principles could be applied just as well in Java, and often are. However, there are some things that make Clojure distinct. Three of those distinctions are the way it deals with state change (using an STM), the Persistent Data Structures, and the literal syntax for data with a reader (now called edn). Diving into the source code for Clojure, I realized that these three bits were written in Java. And that means that they can be used from Java. It's not really stealing if they're already Java, right?
|
|
|
|
|
If I could be remembered for just one thing, I’d want it to be this, because this is what designers and companies need to know and understand about the nature of user experience as a profession, a goal, an idea. And it’s taken me 13 years to be able to say it in exactly this way. Following is my list of 13 beliefs on the value of user experience strategy, design, and designers, one for every year I’d been in the web industry at the time I wrote it. Make it work obviously and all the time. That's a good experience.
|
|
|
|
|
Back when I used to post on newsgroups I would frequently be in the middle of a debate of the details of some behaviour or terminology, when one poster would say: “You’re just quibbling over semantics” as if this excused any and all previous inaccuracies. I would usually agree – I was indeed quibbling about semantics, but there’s no “just” about it. Semantics is meaning, and that’s at the heart of communication – so for example, a debate over whether it’s correct to say that Java uses pass- by-reference1 is all about semantics. Without semantics, there’s nothing to talk about. I do not think it means what you think it means: pedantic talk about code and data.
|
|
|
|
|
With Apple’s licensing of Microsoft’s exFAT file system, it seemed like the main problem with FAT32—the 4GB file size limit—was put to rest, and many people are probably now using it to swap video libraries between their MacBooks and HTPCs or share downloads between OS X and Boot Camped Windows. But exFAT has its own issues and limitations that few people are probably aware of—and considering how few people even know about exFAT, we thought this was a good opportunity to cover it, along with the various alternatives. Drag, drop, wait, transfer... doing the file-sharing Samba.
|
|
|
|
|
Nowadays I boot into my Windows 7, check my mail and browse some web; then I click on VirtualBox and start Lubuntu to code web application (Python, Flask, Brunch, etc.), where I spent most of the time on. It's funny I spend most of my time in a VM. Working in VMs on Windows because it's competent, or just comfortable?
|
|
|
|
|
Comparison of Ways to Check Preconditions in Java[^]
Quote: The use of preconditions, postconditions and invariants is extremely helpful to develop maintainable code. Unfortunately, we find preconditions quite seldom in real world applications. [...] Guava Preconditions and Apache Commons Validate class are the best choice and have almost the same functionality (just take what is more convenient in your technology stack) Use Preconditions in your code - this is most of the time better than a lot of comments. but don't use asserts as preconditions
modified 21-Jun-13 8:37am.
|
|
|
|
|
My name is Maureen McElaney and I live in Burlington, VT. I work as a Digital Advisor at Dealer.com, a digital marketing and software development firm serving the automotive industry. I am also the leader of the Burlington chapter of Girl Develop It. Maureen is just getting started as a dev, but already contributing to the community.
|
|
|
|
|
Why is this important? For starters, do you really like strangers peeping into your windows (no pun intended), prying in and seeing every move you make? In regards to applications, whenever you make your application available to users, you are giving them every opportunity to pry on everything you do. Your intellectual property, trade secrets, source code is readily available to them. For instance, I did a very light search on Bing for my app’s xap (GoGetter) availability on the internet. I found a few sources where you could, if you wanted to, download my app’s xap among other developer’s xap of their applications. No beuno. Guard well this treasure, oh Hassan, or the jackals shall grow fat on thy carcass!
|
|
|
|
|
As I believe , we can't do any obfuscation for Windows Store Apps developed using Win JS. Wonder why MS did not consider doing so ?
Does anyone has an answer for it?
Ranjan.D
|
|
|
|
|
Security through obscurity. Obfuscation won't do anything but slow down an attacker, and stop those with only a passing interest in your code. Once someone has your assemblies, and a sufficient amount of will power, its game over.
Be The Noise
|
|
|
|
|
at the same time; working with obfuscated code is the same as working with the horrible legacy codethuluelephant you can't convince your boss to let you scrap and rewrite. You won't be able to stop the idiot who just changes your name to his; but the pain factor will discourage people from stealing your app to use as the basis of their own.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|