|
Finding errors earlier and more easily is one of the advantages of TypeScript. You can use optionally static typed (optionally) variables, functions, objects to help detect possible mismatches in your code right in your editor. Simply add the appropriate type or define an interface for more complex and custom types, and you are off and running! Defining types is by far my favorite feature of TypeScript. Types are still optional, but this is a nice option if you're the typed type type.
|
|
|
|
|
When you make a game, you often have enemies for the player to combat. You want these enemies to seem intelligent and present a challenge to the player to keep the game fun and engaging.... Obviously I can’t cover everything in this introductory tutorial, but I can show you how to get started with a hands-on example of adding AI into a simple game! In the process of adding AI into this game, you’ll learn about two common AI techniques along the way: steering and finite state machines. Cake and grief counseling will be available at the conclusion of the newsletter.
|
|
|
|
|
While we have been developing a website that displayed user uploaded images in fixed size regions, we have encountered some interesting problems. Should we resize the image to fit the fixed size region? Should we crop the image? Maybe we should mix the two? The no-brainer solution is to crop the image by focusing on the center. This naîve solution gave amazingly acceptable results, but sometimes it fails badly if the interesting region lies outside the cropped zone. Our algorithm should be able to somehow locate automatically the interesting part of the image. Here's an algorithm for automatically estimating what's the most important part of an image.
|
|
|
|
|
I made the mistake of publicly commenting on someone's idea of a RESTful API. And already - I've probably lost you. I don't know any single term more explosive and zeal-inducing than REST and "what it means to be RESTful". It needs explaining. Because clearly you don't know REST.
|
|
|
|
|
The flurry of database action over the past year rendered the usual discussion around structured or unstructured, SQL, NoSQL, and NewSQL databases even more, um, nuanced than before. Matthew Aslett, research manager at 451 Research took the bull by the horns and updated his previous (one-month-old) database road map to include all sorts of new entries. And here (drumroll please) is the result. Continue past key-value and turn right at Big Table. If you run into sharding, you've gone a table too far.
|
|
|
|
|
The number of seconds since the very beginning of 1970, known as Unix time, is often maintained in a single variable in the computer’s operating system. When Unix was first designed, this number was stored in 32 bit variable. That means that the number could range from 0 to 232. Zero corresponds to the midnight January 1, 1970 (UTC). So what time does 232 correspond to? That will be 3:14:07 (UTC) on January 19, 2038. Bad things will happen then to computers that still are still using 32 bit integers to store Unix time. Two-step authentication, cryptography and a little introduction to Message Authentication Codes (MAC).
|
|
|
|
|
Merry Christmas, makers! We’re guessing a lot of you found Raspberry Pis under the tree this morning and are eager to start hacking around with it. We’ve compiled a list of a few of our favorite quick tips that may come in handy as you explore the platform. sudo make me a robot.
|
|
|
|
|
Microsoft’s recent move to disband the Expression Studio suite, and discontinue some of its component products, is the latest example of a retrenchment that is returning the Developer Division (DevDiv) to its roots. Understanding that history will help make sense of the last couple of years of DevDiv moves, whether you think they make sense or not. Apple blocked Adobe’s Flash, took Silverlight down with it... and put DevDiv back on track.
|
|
|
|
|
Russian firm ElcomSoft on Thursday announced the release of Elcomsoft Forensic Disk Decryptor (EFDD), a new forensic tool that can reportedly access information stored in disks and volumes encrypted with desktop and portable versions of BitLocker, PGP, and TrueCrypt. EFDD will still set you back a solid $299. EFDD offers access to encrypted information either by completely decrypting everything or by doing so for individual files in real time. You can choose to either decrypt all files and folders stored in the cryptographic container (full, unrestricted forensic access to all stored information) or mount the encrypted volume as new drive letter for instant access (information is decrypted on-the-fly). This $299 tool makes your disk encryption obsolete.
|
|
|
|
|
All is not doom and gloom - the program still has to acquire Encryption Keys, as they say on their website, by one of 3 methods....
By analyzing the hibernation file (if the PC being analyzed is turned off);
By analyzing a memory dump file
By performing a FireWire attack (PC being analyzed must be running with encrypted volumes mounted).
'g'
|
|
|
|
|
Garth J Lancaster wrote: By analyzing a memory dump file [edit: if the PC being analyzed is turned off :S https://en.wikipedia.org/wiki/Cold_boot_attack[^]]
I guess following the best practices on TrueCrypt website (disable hibernation & sleep), and disabling the firewire in BIOS, combined with a panic button to purge RAM should be sufficient
|
|
|
|
|
http://opensource.apple.com/[^]
All MacOSes, between 10.0.0 and newest 10.8.2, all iOSes since 1.0 through 6.0.1, XCode since 1.2 till newest 4.5, and more. Kernel, drivers, graphic routines, I/O, everything. And, a set of reference documentation (e.g. how to write kernel modules).
cheers,
Chris Maunder
The Code Project | Co-founder
Microsoft C++ MVP
|
|
|
|
|
This has been going on for several years now. I was in high school at the age of 16, and it was online then. So, ooooooolllllllllldddddddd news.
Bob Dole The internet is a great way to get on the net.
2.0.82.7292 SP6a
|
|
|
|
|
Sooo... a virus recipe book?
|
|
|
|
|
Could say the same for Linux. Neither Linux nor Macintosh seem to have many viruses.
=====
\ | /
\|/
|
|-----|
| |
|_ |
_) | /
_) __/_
_) ____
| /|
| / |
| |
|-----|
|
=====
===
=
|
|
|
|
|
Microsoft has announced that the Expression suite of design tools is no more. It has been removed from sale immediately and it has been placed on a maintenance only status until it reaches its end of life. However it's not all bad news...
|
|
|
|
|
|
Expression Blend will be integrated into Visual Studio.
"As beings of finite lifespan, our contributions to the sum of human knowledge is one of the greatest endeavors we can undertake and one of the defining characteristics of humanity itself"
|
|
|
|
|
...What was one of the most interesting things I learned during this project was using different algorithms and seeing how they affected performance. The biggest performance boost I got was from switching from Insertion Sort to Heap sort when sorting data points by date...
|
|
|
|
|
This one has been on my todo pile for a while, so as long as I am in ranting mode, I might as well get this off of my chest. It is a problem that is highly prevalent on many game developer forums, and especially so on one I often frequent, GameDev.net. Often, people will ask the question: "What should I do about college, is a game degree right for me?"
|
|
|
|
|
|
get both degrees..Will Not require much more effort.If you have spare cells then learn accounting also as only that will last much longer.
|
|
|
|
|
Definitely get a computer science degree (preferably from a reputable University). I think game development is becoming like becoming an actor in Hollywood. Lots of people go to Hollywood hoping to make it big, but only a few actually make it big. Computer science is a broad field, keep all your options open.
|
|
|
|
|
Work began on the Hurd, the true kernel of the GNU operating system, in May 1991, but it has yet to materialise as a production-ready kernel. Richard Hillesley tells the story…
|
|
|
|
|