|
Collin Jasnoch wrote: Assuming the stores problem is the lack of solid apps I am failing to see the logic here. I doubt $100 is really going to entice a software firm to make a stellar product. In fact, the $100 is likely to entice numerous fluff apps that degrade further the average usefulness of applications with in the store.
99% of what's in Google and Apple's stores is crap; number of useless apps is a marketing game all of them play. If this nets an extra 10k apps it'll be a better return than $1m spent on their normal marketing would have been.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
I'm off to write a version of tic-tac-toe for win phone right now!
|
|
|
|
|
Why not write an app that reverses a given string or sums up to integers?
Seriously though, those are apps that actually exist for WP7...
|
|
|
|
|
With the increased prominence of Data Scientists, should there be a code of conduct? Michael Walker from Rose Business Technologies has proposed Data Science Code of Professional Conduct.... Typically, the codes of conduct are long and bureaucratic, but perhaps one can formulate a short "Golden Rule of Data Science" which would encapsulate the essence of ethical data science. If so, here is my nomination... If you're going to call them scientists, then shouldn't the rules of science prevail?
|
|
|
|
|
Over the weekend, I was thinking about the wonderful psexec capabilities of tools like Metasploit, the Nmap Scripting engine smb-psexec script, and the psexec tool itself from Microsoft Sysinternals. It's my go-to exploit on Windows targets, once I have gained SMB access and admin credentials (username and password, or username and hash for pass-the-hash attacks). It works on a fully patched Windows environment, giving you code execution with local system privileges of a program or Metasploit payload of your choice. That's especially helpful in a penetration test once you gain access to an internal network that is relatively well patched. An ethical hacker doesn't crash the system? I hope the ethics go a little farther than that.
|
|
|
|
|
Samsung’s disclosure comes after people familiar with Apple’s plans said last month the U.S. company has about 100 product designers working on a wristwatch-like device that may perform similar functions to the iPhone and iPad. The global watch industry will generate more than $60 billion in sales this year, and the first companies to sell devices that multitask could lock customers into their platform, boosting sales of phones, tablets and TVs. I'm going to assume this is an elaborate troll... even if the watches turn out to be real.
|
|
|
|
|
While playing around with the Nmap Scripting Engine (NSE) we discovered an amazing number of open embedded devices on the Internet. Many of them are based on Linux and allow login to standard BusyBox with empty or default credentials. We used these devices to build a distributed port scanner to scan all IPv4 addresses. These scans include service probes for the most common ports, ICMP ping, reverse DNS and SYN scans. We analyzed some of the data to get an estimation of the IP address usage. All data gathered during our research is released into the public domain for further study. Mapping the internet with a botnet using unsecured devices on the internet.
|
|
|
|
|
"A direct result of the whole race-to-the-bottom in prices is the prevalence of free-to-play on iOS - it seems to be a safer bet. But since its almost impossible to do free-to-play in a non-evil way and without sacrificing the elegance of your game design, we'll prefer to charge $3".... The comments have been seized upon as part of a wider debate on free-to-play (F2P for short) that's currently raging within the games industry. It's a debate where many participants seem to have picked a side and drawn up battle-lines. A debate where F2P is "evil", or where F2P doubters are dinosaurs. Freemium isn't evil. Making money isn't evil, either.
|
|
|
|
|
The Guardian completely missed the point. The issue isn't Freemium or not, but Pay-To-Win or not and P2W is inherently evil.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Now you can get Microsoft to do your homework!
Request free code samples from Microsoft and the community[^]
Quote: You can submit code sample requests dealing with any Microsoft development technology and any programming language to the MSDN Sample Request Forum. You can also vote for existing requests. Microsoft engineers, MVPs, and other community members will provide the code samples, based on interest, free of charge.
--------------
TTFN - Kent
|
|
|
|
|
I'd like a get rich quick spambot/beggarbot, oh! and a rootkit. Cheers!
"It's true that hard work never killed anyone. But I figure, why take the chance." - Ronald Reagan
That's what machines are for.
Got a problem?
Sleep on it.
|
|
|
|
|
Many of you have probably done this before: you want to recognize a specific key that has been pressed when a user is entering something into a TextBox. Maybe you want to take action when they press the Enter key, for example. This is generally simple enough, you just set up a KeyDown (or KeyUp, depending on your needs) event on the TextBox in question, and then just check every time the event fires until you find the key you’re looking for. That’s not what I wanted to do. Gestures are great. Until they're not.
|
|
|
|
|
In C, the scope and lifetime of a variable or function within a program is determined by its storage class. Each variable has a lifetime, or the context in which they store their value. Functions, along with variables, also exist within a particular scope, or visibility, which dictates which parts of a program know about and can access them. Auto, register, static, extern - they can be friends... or enemies.
|
|
|
|
|
A perceptron is code that models the behavior of a single biological neuron. Perceptrons are the predecessors of neural networks. A neural network can be thought of as a collection of connected perceptrons. James McCaffrey presents one of the basic building blocks of a neural network.
|
|
|
|
|
I have been reviewing the comments and feedback questions sent after the AJAX webinar, and a question that has come up several times is, “What is that thing that you have in Visual Studio?” I know I have a number of unique add-ins and tools in Visual Studio, and I wanted to describe the tools that I have installed for those that may want to use them as well. What nifty VS extensions are you using?
|
|
|
|
|
Best VS extension I've found is Visual AssistX from Whole Tomato! Great tool!
|
|
|
|
|
In VS 2010...
NuGet
Productivity Power Tools
JScript Editor Extensions
Javascript Parser
Code Rush with plugins BlockPainterPlus and CR_Documentor
.NET Demon
Match Options Command
Hide Main Menu
Default Browser Switcher
Kevin
|
|
|
|
|
The first part of this week revolved around finalising the core saving and loading of photographs. As I revealed last week, the filters aren't applied directly to the image; rather, they are associated with the image in a separate file. The code I showed last week demonstrated that each filter would be responsible for serialising itself, so the actual serialisation graph code should be relatively trivial. Our own Pete O'Hanlon provides some updates on his Ultimate Coder competition entry.
|
|
|
|
|
from Netscape's Three Rules[^]. I really want the first one tattooed on a number of heads, so that everyone can read it all the time.
Quote: "The first rule is if you see a snake, don't call committees, don't call your buddies, don't form a team, don't get a meeting together, just kill the snake.
The second rule is don't go back and play with dead snakes. Too many people waste too much time on decisions that have already been made.
And the third rule of snakes is: all opportunities start out looking like snakes."
--------------
TTFN - Kent
|
|
|
|
|
We’ve all got an idea about what Computer Science is, whether you went to school for it or not. When some people hear the words “Computer Science”, they instantly think about programming applications. Others think about Discrete Mathematics, Boolean Algebra, and Graph Theory. While the later can be pasted together into a pretty loose definition about what the reality of Computer Science is – and the former completely dismissed as false – a more appropriate definition can be established. “The analysis of algorithms and processes”. Computer Science is not about programming applications.
|
|
|
|
|
To provide further emphasis, let me repeat, Computer Science has nothing to do with Computers. The name should be a bit of a giveaway. The writer is confused with "Information Sciences".
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Well it technically does, but only in a mathematical sense (i.e. computers like Turing Machines, instead of computers like PCs). When's the last time you heard someone refer to themselves as a "computer scientist" outside of academia?
|
|
|
|
|
Sir Tim Berners-Lee, Robert Kahn, Vinton Cerf, Louis Pouzin and Marc Andreessen will share the £1m award. The citation panel said the five men had all contributed to the revolution in communications that has taken place in recent decades. The UK government initiated the QE Prize as a companion to the Nobels to raise the profile of engineering. And now you're reading about it using the technologies they pioneered. How meta.
|
|
|
|
|
If I told you that a company is shipping a product to hundreds of millions of users right now, and included in the product are several prominent buttons that will break the product completely if you click them, and possibly lock you out from the Internet — can you guess which product it is? Whatever you do, never press... no, not that one!
|
|
|
|
|
Before I start I want to say up front, yes I worked at Yammer which was acquired by Microsoft. However, I was considering a WP7 long before then. I've been an iOS user for a long time. I'd say for about five years. I have always been open to other mobile OSs but for one reason or another none have really appealed to me. That is, until WP7. I never made the switch though because I was worried it was buggy or I'd hate the lack of apps. The good, the bad... and IE10.
|
|
|
|