|
|
At BUILD in Redmond today, Microsoft announced its plans to improve C++ standards conformance in its Visual Studio development environment, and talked about ways in which C++ would become a better, regularly updated, modern programming language. Microsoft developer and C++ standard committee chair Herb Sutter introduced work being done by the C++ community to make the language better, and also discussed the work being done by Microsoft to make its own compiler better. The Standard C++ Foundation will promote and advocate the usage and development of modern C++.
|
|
|
|
|
CTP here[^]
(Compiler only, IDE doesn't yet "understand" the new syntax, and standard library doesn't make use of the new features yet)
|
|
|
|
|
peterchen wrote: ORDER BY what user wants
DESC? Or ASC?
dev
|
|
|
|
|
|
So it turns out C is a functional language too! On the way to Strange Loop this year, John Van Enk and I were trying to find a way to write some C code that avoided dynamic (malloc) allocation. We discovered a technique that allows you to forgo the use of malloc in many common cases. It also enables very pure functional C code. You doubt? I shall demonstrate! This style actually has a special name: Continuation Passing Style.
|
|
|
|
|
When I first started writing concurrent software, C++ had no support for synchronization. Windows itself had only a handful of synchronization primitives, all of which were implemented in the kernel. I tended to use a critical section unless I needed to synchronize across processes, in which case I used a mutex.... Today the synchronization landscape has changed dramatically. There are a plethora of choices for the C++ programmer. Exploring the state of synchronization in Windows and C++.
|
|
|
|
|
If you have worked with AJAX or node.js or any other callback heavy framework, you have probably been to Callback Hell. Your whole application ends up being passed around as callbacks, making the code extremely difficult to read and maintain. The resulting tangled mess of code is often pejoritively called spaghetti code, a term borrowed from the days of goto. Callbacks are the modern GOTO.
|
|
|
|
|
Suppose you’re learning Python, you should try to build a copy of the cat program with it or try to implement tree, for example. Unix programs are often small and focused on doing something unique and doing it very well (read more about the concept), which is also ideal for learning to program. Just pick up a single problem and solve it in the best way possible. No other technique is more efficient for those trying to learn a new programming language than actually writing code.
|
|
|
|
|
Carlos started his investigations into the properties of prime numbers by drawing a series of circles on a number line in AutoCAD. These circles were of diameters of all the integers, and going down the number line, these circles started to have an interesting, chaotic pattern (see above picture). Carlos found that whenever two circles intersected, that position was a prime number. It’s really nothing more than a Sieve of Eratosthenes, but it’s a very cool-looking visualization nonetheless. Here are some links and videos explaining how he created these great prime visualizations.
|
|
|
|
|
|
I know I'm late to this, but I just have to put this here... I developed my graphic sieve back in 2009, Jason Davies developed his own in 2012, so I was over 2 years ahead of him. I would be extremely surprised if he hadn't seen my website when researching primes. If you go to my Youtube channel (carluchoparis), you will see my oldest prime number sieve videos date back to December of 2009... My work was absolutely and completely independent, whereas Jason credits Omar E. Pol's methods in his work... I even contacted Omar in 2010, when I found his site, and told him about my own site... I have not been contacted by Jason, but I doubt he is oblivious of my work.
|
|
|
|
|
Where's your site?
I have a similar story. I developed my proof of the Extended Midy's Theorem back in 2004. When I first did a search for anything similar, in 2003, I didn't find anything. By the time I completed it (2004), I had some open questions at the end that I couldn't resolve, I searched the web again and came across Brian Ginsberg's name in one of the MAA magazines. I bought that magazine to see if he'd beaten me to it, but he had only proven it for three equal parts. I submitted mine to the MAA, but it was rejected for not being an article. Someone here at CP must have seen it on my website and added it to Wikipedia soon after (I've always had a PDF and LaTex copy on my website). A month later, a few different, but mathematically identical, proofs came up for generalizing the original theorem like I did. Last year, my name and PDF link were removed from Wikipedia for not being a published work (I'm still in the history pages) and references to other people's works appeared instead. I tried posting it to arXiv, but you need references for that site. It sucks seeing other people's names in lights when you know you came first.
modified 4-Jan-13 19:47pm.
|
|
|
|
|
I found your YouTube site. I've seen it before and linked to it in my math blog. Good stuff!
|
|
|
|
|
Thank you!
My website is www.sievesofchaos.com
I named it sievesofchaos because I was baffled that factors presented such a "random/chaotic" pattern in the graphic sieve...
It's too bad about your proof... Sometimes history isn't too fair to great achievements, but I always keep Carl Sagan's quote in the back of my head
"When you make the finding yourself, even if you're the last person on earth to see the light, you will always remember it..."
Cheers
Carlos
|
|
|
|
|
Microsoft's security team is killing it: Not one product on Kaspersky's top 10 vulnerabilities list
Security firm Kaspersky has released its latest IT Threat Evolution report. There were some interesting findings in the report, as always, but the most interesting thing that stuck out was all the way at the bottom: Microsoft products no longer feature among the Top 10 products with vulnerabilities. This is because the automatic updates mechanism has now been well developed in recent versions of Windows OS. Here are the top 10 vulnerabilities for the third quarter, according to Kaspersky.
|
|
|
|
|
A few interesting observations from that list:
Quote:
8 Winamp AVI / IT File Processing Vulnerabilities: Gain access to a system and execute arbitrary code with local user privileges. Highly Critical.
9 Adobe Shockwave Player Multiple Vulnerabilities: Gain access to a system and execute arbitrary code with local user privileges. Highly Critical.
People still use winamp?!?!?!
Unlike Java (once, sometime in the last year) I can't remember the last time I encountered a Shockwave website. I know what I'm uninstalling tonight.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
At Build, we'll dive deep to cover all the areas you care about. How to design and build beautiful Windows 8 apps. How to sell your apps in the Windows 8 Store and make money. And much more. Join us on the Microsoft Campus for 4 days of extraordinary presentations delivered by the engineers behind the products and services to get you up to speed. Grab some popcorn and catch up on all the sessions you missed at Build 2012.
|
|
|
|
|
This is a sentiment you often hear from people: casual users only need «entry-level» performance. Even casual users themselves perpetuate it: «Oh, I’m not doing much on my computer, so I always just go with the cheapest option.» And then they buy a horrid, underpowered netbook, find out that it has a tiny screen, is incredibly slow, the keyboard sucks, and they either never actually use it, or eventually come to the conclusion that they just hate computers. In reality, it’s exactly backwards: proficient users can deal with a crappy computer, but casual users need as good a computer as possible. Too much is never enough.
|
|
|
|
|
I like his theory.
|
|
|
|
|
I'm a gamer.
In my world good hardware is life or death.
No reason for bad hardware.
Get the good stuff.
|
|
|
|
|
I've just read some predictions for the future of the PC, written in 1993, by Nathan P. Myhrvold, the former Chief Technology Officer at Microsoft. His memo is amazingly accurate. Note that his term "IHC" (Information Highway Computer) could be roughly equated with today's smartphone or tablet device, connecting to the Internet via WiFi or a cellular network. In his second last paragraph, Myhrvold predicts the winners will be those who "own the software standards on IHCs" which could be roughly equated with today's app stores, such as those on iOS (Apple), Android (Google, Amazon) and Windows 8 (Microsoft). The only thing you could say he possibly didn't foresee would be the importance of hardware design in the new smartphone and tablet industry. Notes from "Road Kill on the Information Highway"
|
|
|
|
|
French security company Vupen is selling a vulnerability in Microsoft's latest operation system and browser [ITworld]
|
|
|
|
|
I don't yet understand how hackers can live with themselves.
|
|
|
|
|
Why not? What's to understand?
No, seriously - if this response has the appearance of someone that is trolling, I apologise for my inability to better choose my words.
Microsoft, Adobe [insert Corp name here] releases a product with proveable, re-producable errors in it. These flaws, and the understanding of how to exploit/avoid them are precious commodities - both for black-hat and white-hat types.
In computing, as in entertainment - it is the size of the market that dictates something/someone's monetary value. That's why national sports-stars and performing music artists can command so much money for a single performance, that's why the value of such an exploit is so high - the affected market is _huge_
If MS aren't prepared to throw a couple of drops in the ocean (that is the cost of development) to protect it, why not sell it to somebody that does value it?
You do realize I hope, that both the Stuxnet and the Flame virii made use of unpublished exploits. Exploits that then helped to offer access to the nuclear-enrichment control systems that Iran runs.
Do you wonder how the writers of these virii, or the finders of the exploits that facilitated their activities live with themselves?
I really am very curious as to just where you're coming from.
Make it work. Then do it better - Andrei Straut
|
|
|
|