|
What hardware are you targeting?
|
|
|
|
|
I know that Douglas Crockford and many others will disagree with this, but from my point of view, there are only three “bad” parts to javascript. Once a developer understands these three things in Javascript, they’re solidly on their way to rolling their eyes when they’re asked if they are a ninja at cocktail parties. They're listed here, along with links to articles that explain how they work.
|
|
|
|
|
No, there are more than three bad parts, I will add that since it is used pretty much predominately with HTML, it would play well in the sandbox, and it does not. I think it should be possible to cut and paste the HTML script language into an HTML tag without having to modify it.
|
|
|
|
|
Twice in the last two weeks I’ve had the unpleasant experience of reporting bugs, only to be told that it was my fault for triggering the broken behavior. A bug with a workaround is still a bug.
|
|
|
|
|
Scheme doesn't have Haskell's vast standard library or an efficient compiler, but it does have Haskell's terseness, and more importantly it makes coding a joy. As elegant and appealing as Haskell's purely functional foundation is, it prohibits simple, but crucial, impure tasks such as writing to files and communicating over networks. I'm not saying Scheme is better than Haskell. But it is.
|
|
|
|
|
On a family trip to the Computer Museum in Boston I convinced my parents to buy me a copy of Write Your Own Adventure Programs for Your Microcomputer, since I was an Infocom junkie and had been writing my own "adventure programs" for some time already. I think this was my first technical book, and it was the first technical book that I met with disappointment. The printed books become stale too quickly, and the digital ones aren't much better.
|
|
|
|
|
Right now is a great time to be a developer. Good people with good skills are seriously in demand by tech companies large and small. Of course, the best employers can still afford to be pretty choosy. I have been through many technical interviews on both sides of the desk, so I thought I’d share my tips on the process. So how do you ensure that when your chance comes, you nail the technical interview first time? Be interesting (but not odd) and don’t bring a pet.
|
|
|
|
|
A: I'd swap names with another mountain.
|
|
|
|
|
This post looks at the new Netduino GO and briefly compares it to the .NET Gadgeteer (Cerebus and others). I also build a couple simple example applications using the Netduino GO kit. Which one is right for you? Read on to find out. Microcontrollers 'R Us.
|
|
|
|
|
|
Over 11 years after it was created the Agile Manifesto's values and principles still apply. In some situations they are less important than in 2001, but in many more situations very little has changed since then. We're still dealing with the very problems that the Agile Manifesto set out to solve in 2001.
|
|
|
|
|
I'm not a physics guy. I love me a good physics engine, but I will likely never build one because that's just not where my expertise lies. However, I do know a thing or two about writing fast Javascript code, which is something that will become fairly important to the new breed of browser-oriented physics engines. Here are some problems that could limit their effectiveness in real-world use. What's our Vector(), Victor?
|
|
|
|
|
A buzz is building in the open source development community about a relatively new tool designed to make Git a lot simpler to learn and adopt. [ITworld]
|
|
|
|
|
Security researchers from antivirus vendor ESET have come across new Web-based malware attacks that try to evade URL security scanners by checking for the presence of mouse cursor movement. [ITworld]
|
|
|
|
|
Graeme Blake discovered the Internet sucked up almost a third of his free time. So the cord was cut on his home Internet connection, and he never looked back. Well, except to write about it.
With the irony about writing a blog post about not using the Internet duly noted, consider what you could do with all that extra time.
|
|
|
|
|
Facebook Inc. said it is acquiring the popular photo-sharing app maker Instagram for $1 billion in cash and stock in what is the social network's biggest acquisition to date...
...On March 11, Instagram founder and CEO Kevin Systrom gave a keynote talk at the South by Southwest conference in Austin, where he announced that the company's iPhone app had nearly doubled its number of registered users since December, going from 15 million users to 27 million users.
Be The Noise
For amazing custom software solutions, look no further than Logtek USA
|
|
|
|
|
How many special shell $ arguments do you use in your daily work? There may be a lot more of them than you think. Let's look over a bunch of them and examine how they can streamline your scripts. (ITworld)
|
|
|
|
|
Not sure why someone univoted this, I found it quite useful!
Attempting to load signature...
A NullSignatureException was unhandled.
Message: "No signature exists"
|
|
|
|
|
Metro is not Windows. Or Windows Phone. It is not Live Tiles, black backgrounds, Segoe UI or boxes with straight corners. It’s not HTML5, CSS or JavaScript. Metro is not even Microsoft. It can live in the browser or in the desktop. It can even live on an iPad, because it was never really about the platform, at all. Metro: creating experiences that anchor us to reality, even in the face of the unfamiliar.
|
|
|
|
|
You check into your hotel room, open your laptop and start browsing the web... only to discover JavaScript injecting ads into every page you load. Hackers next door? A virus on your machine? Nope. It's your hotel's fancy new Revenue eXtraction Gateway. Here's how it works. We also offer complimentary Continental breakfast and HTML payload rewriting.
|
|
|
|
|
A properly designed hash function changes its output radically with tiny single bit changes to the input data, even if those changes are malicious and intended to cheat the hash. Unfortunately, not all hashes were designed properly. Here's what that means for passwords and security. Hashes are a bit like fingerprints for data.
|
|
|
|
|
This essay is yet another attempt to reconcile the power of the Lisp programming language with the inability of the Lisp community to reproduce their pre-AI Winter achievements. Without doubt, Lisp has been an influential source of ideas even during its time of retreat. Lisp's expressive power is actually a cause of its lack of momentum.
|
|
|
|
|
Exploit-exercises.com provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, and reverse engineering. Hacker 101.
|
|
|
|
|
AI is an intellectually challenging field where the problems are difficult, and therefore can be solved only by highly intelligent people working on obscure mathematics and algorithms. The future, he argued, will look much like the past: a series of incremental, hard-won improvements in very narrow fields. I disagree. Open platforms are disruptive and enable newcomers to innovate at a higher scale.
|
|
|
|
|
Microsoft wishes it could counter the absolute numbers of Android and iOS apps by having the right apps, but it doesn’t, and that is the company's real marketing problem. But amazingly, the critical missing Windows Phone apps are from the very organizations that Microsoft has the most financial leverage with. Not having apps from name-brand enterprise partners is a problem Microsoft should be able to solve.
|
|
|
|