|
Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network.... The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China. Well, that's one way to get past the paywall.
|
|
|
|
|
For me personally, the term "TFS" has historically meant "big scary corporate centralized source control" while Git has meant "small scrappy lightweight distributed source control." TFS meant connected (ZOMG, I can't code on a plane!) and Git meant occasionally connected (ZOMG, I don't know what rebase means!). However, I learned that Team Foundation Server (TFS) isn't just source control, it's a whole bug tracking, change management, application lifecycle management (ALM) suite. Source control is one pluggable piece. On the other hand, Git isn't just source control either. Git has become effectively FTP for code. ALL YOUR REBASE ARE BELONG TO US!
|
|
|
|
|
If you’re curious, the actual information content of this post will be as follows: C string handling functions kinda suck. So does C++’s std::string. Dealing with wide character strings using only standard C/C++ functionality is absolutely horrible. And VC++’s implementation of said functionality is a damn minefield. That’s it. You will not actually learn anything more from reading this post. Continue at your own risk. How not to remove whitespace.
|
|
|
|
|
|
_beauw_ wrote: Does he believe in Santa Claus as well?
Add the Tooth Faerie, and Easter Bunny too
"I've seen more information on a frickin' sticky note!" - Dave Kreskowiak
|
|
|
|
|
One of the largest battles in EVE Online history took place due to an accidental click, according to reports. The full details of why and how so many ships ended up battling each other is a fascinating read, but my question is what happens to the servers when something this crazy happens in the game. CCP, the creator of EVE Online, has detailed plans in place specifically for this sort of event. This is my server. There are many like it, but this one is mine...
|
|
|
|
|
As sure as night turns into day, sooner or later your PC will descend into an unrecoverable abyss where it no longer boots, stays booted or can’t even get booted to begin with.... Particularly for folks like me involved in building software, getting from zero to where you were when everything went wrong is a very high friction exercise. I reckon it’s the better part of a day’s effort to reinstall, reconfigure and restore files and you’ll still be finding missing things a month later. From zero to compiling, a dev's guide to repaving a Windows development box.
|
|
|
|
|
Both client and server are standard implementations of Git. Our client will work with pretty much any Git repository – local, enterprise, Codeplex, GitHub, BitBucket, …. And TFS will work with pretty much any Git client – existing Git command lines, XCode, Eclipse’s Git support, …. This was a core principle from day 1. This is not about lock in – it’s about providing a good and interoperable Git capability. They pulled the best solution on the net and merged it into VS.
|
|
|
|
|
Git Support Added to Visual Studio and TFS[^]
tfs clone git
The choices for Visual Studio continue to spread. Maybe they'll add support for SourceSafe for those who don't like to save their code.
--------------
TTFN - Kent
|
|
|
|
|
What's so great about JavaScript Promises?[^]
if(you.transferItem(me, ITEMS.hamburger, Date.now())).then(
function() {
me.transferItem(you, ITEMS.cash, new Date.nextTuesday());
}
);
Writing async code isn't pleasant, can promises make them easier?
--------------
TTFN - Kent
|
|
|
|
|
In the construction industry, a “firewall” is a specially-built wall designed to stop a fire from spreading between sections of a building... and in the late 1980s it made its way into computing. On one side of the wall is the seething electronic chaos of the Internet. On the other side is your powerful but vulnerable Web server. These computer firewalls are actually more like fire doors because they have to let some stuff through. They monitor all the electronic traffic coming in and out of a network. They follow a strict set of rules to determine what is allowed and what is blocked. This article explains in more detail how they work, the different types of firewalls available, what they are good at and not so good at, and how to configure them to protect a typical Web server. Remember what we learned from Aliens: if they can't come through, they'll go around. Check the air vents.
|
|
|
|
|
Luckily, the state of Internet security has... gotten better—in this article, the first in a five-part series covering online security, we're going to talk a bit about keeping yourself (and your business) safe on the Web. Even if you know what lurks in the dark corners of the Internet, chances are you someone you know doesn't. So consider this guide and its follow-ups as a handy crash course for those unschooled in the nuances of online security. Security aficionados should check out later entries in the series for more advanced information. Keep calm and browse on.
|
|
|
|
|
Is using compression bad on an SSD? I don’t think so, but I haven’t really studied the issue. Michael Fortin wrote a blog post back when Windows 7 came out talking about SSD support in which he recommended use of compression for “infrequently modified directories and files” and against using it for actively written files. Tom’s Hardware did an extensive review on the topic a little over a year ago and also recommended use of compression on an SSD. The real question around using NTFS compression on an SSD isn’t is it good or bad, but rather what directories would it be good for and which would it be a bad idea for. When you expect laptop performance out of a tablet device, something's gotta give.
|
|
|
|
|
RIM’s make-or-break operating system, BlackBerry 10, looks spectacular and the Z10 smartphone looks like the company’s first handset that people will actually want to buy. But none of this will mean a thing without awesome apps to run on it.... Early indications are promising. RIM will have 70,000 apps available at launch — far more than the 2,000 that Microsoft Windows Phone launched with in November 2010. Now that it's here (and looks good), are you interested in developing apps for BB10?
|
|
|
|
|
There is a new smartphone coming to market, running on a new operating system. It’s an all-touch device — with no physical navigation controls and no physical keyboard — and serves as a platform for third-party apps. It’s meant to compete in a world defined by Apple’s iPhone and Google’s Android phones. It’s a BlackBerry, reinvented from the ground up. Walt Mossberg plays with the BlackBerry Z10. Here's what he thinks...
|
|
|
|
|
|
Having up to date and relevant documentation is a challenge for any software maintenance team. The key to success is to write a minimum of documentation, but make sure that it is relevant. The details can always be sorted out from the code. The external documentation (that is not in the code) should focus on being a good introduction by giving an overview. Documentation is part of the software development job. Coding is a passion.
|
|
|
|
|
Have you ever had this situation before? You have a problem to solve and no idea how to solve it. You want to sit down and do it “the right way”, but “the right way” involves writing tests, designing objects and generally working out something that’s far more complex than you need to get a working prototype. And so nothing gets done. Developers are paid to solve problems not to write code; our code is our expression of a solution.
|
|
|
|
|
Terrence Dorsey wrote: Developers are paid to solve problems not to write code; our code is our
expression of a solution.
Some developers are paid to solve problems, other are paid to write code.
FTFY.
"If you think it's expensive to hire a professional to do the job, wait until you hire an amateur." Red Adair.
nils illegitimus carborundum
me, me, me
|
|
|
|
|
I never write tests; does that mean I only write bad code? Ummm... don't answer that.
|
|
|
|
|
It depends. Your code is obviously not buzzword compliant. Is that a problem?
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Not a problem with me. Nor with my employer.
Buzzwords are a code smell.
|
|
|
|
|
When you need to solve too many problems too fast and write too many lines of code to go with it. However who decides what is a bad code? A style that suits a particular developer may not be pleasant to others. Every programmer will do some polishing along the way of solving a problem. You can not just dump thousands of lines of codes of different functionality in a button click event. If someone does it than, that is not at all a code.
But I feel different individual will always have different perspective!
|
|
|
|
|
Grasshopper.iics wrote: A style that suits a particular developer may not be pleasant to others.
It's True. However if you plan to please most of the developers, you will be on the same page.
Wonde Tadesse
|
|
|
|
|
Some of the very best algorithms of the computer age are highlighted in the January/February 2000 issue of Computing in Science & Engineering, a joint publication of the American Institute of Physics and the IEEE Computer Society. Guest editors Jack Don-garra of the University of Tennessee and Oak Ridge National Laboratory and Fran-cis Sullivan of the Center for Comput-ing Sciences at the Institute for Defense Analyses put togeth-er a list they call the “Top Ten Algorithms of the Century.” “We tried to assemble the 10 al-gorithms with the greatest influence on the development and practice of science and engineering in the 20th century,” Dongarra and Sullivan write. As with any top-10 list, their selections—and non-selections—are bound to be controversial... Which algorithms do you nomiate for the top 10?
|
|
|
|