|
Every program needs memory. Unfortunately, memory is finite. Software must cope with memory usage, and there are two ways to manage it: manually and automatically. Manual memory management is prone to errors, especially with exceptions and asynchronous code. This is why modern managed environments (.NET, Erlang, and many more) implement automatic memory management with garbage collection. Bring out your dead (memory allocations).
|
|
|
|
|
By 2005, years of solid chip design and technological execution had the company walking with a swagger, as seen in marketing stunts which challenged Intel's then-current server processors to a "dual-core duel.” Nowhere was this attitude more apparent than AMD's 2005 lawsuit against Intel for anti-competitive business practices. Doubters didn't think the good times could last.... The perennial fighter kocked out by a 'second-best' mentality.
|
|
|
|
|
This is a short video about Erlang, the functional programming language. Have you got anything without Erlang?
|
|
|
|
|
One of Microsoft's goals with Windows 8, sources have said all along, was to try to convince the developer community that it is/was still worth writing "killer apps" for Windows. But if Blue, a k a Windows 8.1, allows users to opt to boot straight to the Desktop and avoid the Metro Start Screen as much as possible, doesn't this undermine the message that Metro is the future? What's the reason Windows devs should bother putting their eggs in the Windows 8/WinRT -- rather than the tried-and-true Win32 basket? Rumors of "Visual Studio Blue" say it could reveal much about the future of Windows.
|
|
|
|
|
Genes contain information that defines the way our cells function, and some parts of the genome express themselves in much the same way across different types of cells and organisms. This would allow Endy and his team to build a language scientists could use to carefully engineer gene expression – what they call “the layer between the genome and all the dynamic processes of life.” Evolution 2.0.
|
|
|
|
|
It looks like one day I'll get my wish.
A dark blue headstone
UNHANDLED EXCEPTION
Division by zero at <date>
"It's true that hard work never killed anyone. But I figure, why take the chance." - Ronald Reagan
That's what machines are for.
Got a problem?
Sleep on it.
|
|
|
|
|
Gryphons Are Awesome! Gryphons Are Awesome!
|
|
|
|
|
You know how security people get all uppity about SSL this and SSL that? Stuff like posting creds over HTTPS isn’t enough, you have to load login forms over HTTPS as well and then you can’t send auth cookies over HTTP because they’ll get sniffed and sessions hijacked and so on and so forth. This is all pretty much security people rhetoric designed to instil fear but without a whole lot of practical basis, right? That’s an easy assumption to make because it’s hard to observe the risk of insufficient transport layer protection being exploited, at least compared to something like XSS or SQL injection. But it turns out that exploiting unprotected network traffic can actually be extremely simple, you just need to have the right gear. An in-depth guide to packet sniffing with the WiFi Pineapple.
|
|
|
|
|
I want one of those, even if it is just to learn with! That is a cool little device!
Gryphons Are Awesome! Gryphons Are Awesome!
|
|
|
|
|
That just bumped my paranoia level up a couple of notches. I was already more or less aware of the basic risks and weaknesses with the access points, but the scariest thing is how devices like this are becoming easier and cheaper to acquire.
The geeky Linux setup will eventually be replaced by a simpler interface, opening the door for a class of less tech savvy, amateur hackers.
Soren Madsen
"When you don't know what you're doing it's best to do it quickly" - Jase #DuckDynasty
|
|
|
|
|
I can see a few other uses for it, such as in an academic setting (e.g. A Network Infrastructure class), or for creating an ad-hoc wifi network at a convention or something like that.
There are hundreds of uses for things like this, not all of them are malicious.
Gryphons Are Awesome! Gryphons Are Awesome!
|
|
|
|
|
I offer these but you may wish to add your own pieces of really bad advice... Honourable Mention: "Leave the back-up until tomorrow."
|
|
|
|
|
Now, how about 10 pieces of great advice?
cheers,
Chris Maunder
The Code Project | Co-founder
Microsoft C++ MVP
|
|
|
|
|
new definition of Maunder Minimum = the minimum amount of rewrites it takes Chris to get something working
Bryce *chortle*
|
|
|
|
|
Now if you'd had you're wits about you, or Mick was around to give you some actual creativity, you would have said "the minimum amount of pints before he's fully lubricated"
cheers,
Chris Maunder
The Code Project | Co-founder
Microsoft C++ MVP
|
|
|
|
|
dude that'd have been pointless - we all know that the Maunder Maximum is 1
Universal constant that.
bryce
|
|
|
|
|
|
Did you noticed an interesting thing, The link you posted is in Page No#: 33813 , If you click on Page number showing 33812 , It will not take to 33812 instead it will go to Maunder Minimum 1
Thanks,
Ranjan.D
|
|
|
|
|
Fight for Pareto's law, look for the 20% of effort that will give you the 80% of results.... 10 commandments for keeping software simple and getting it shipped.
|
|
|
|
|
Ok... that's lean...
(yes|no|maybe)*
|
|
|
|
|
The first rule of building on top of another company’s platform: Make sure you play by the rules.
The latest case in point: Ribbon, a Twitter-based payments startup, launched a new product on Wednesday morning, and it looked pretty cool. The main draw was the ability to buy stuff from inside a tweet, simply by clicking on a button and entering your credit card info and shipping deets... long story short, Twitter shut off support to Ribbon’s new feature within a few hours after launch. It takes a certain kind of blind optimism to develop against Twitter's APIs these days.
|
|
|
|
|
Duane Campbell is retiring from Microsoft today, after 28 years as a software developer with the company. Chances are you’ve never heard of him, even if you follow the company closely, and that’s one of the best parts of his story. Rather than following the traditional management and executive path that put some of his former peers into the spotlight, Campbell understood what he loved to do, and he had the courage to stick with it. He loves to code — and he does it extremely well. 7 career tips from one of the most respected developers at Microsoft.
|
|
|
|
|
My intuition and experience is that long test names are good and short function names are good, all else being equal. But why? ... One constraint common to test naming and function naming is that the names should be chosen to optimize readability and comprehension. Your team will invest far more reading names than writing them. This doesn't mean that long names are necessarily good, but that the focus should be on the reader's experience, not the writer's. Optimize for the coder trying to figure out what you meant. That might be you.
|
|
|
|
|
Yesterday Microsoft reported flat Windows revenue from the year before, despite an unprecedented drop in PC sales.... There are several factors that made this possible. As investor relations chief Chris Suh put it on the earnings call, "Non-OEM revenue grew 40% this quarter, driven by sales of Surface and continued double digit growth in volume licensing." So how much did Surface help Microsoft's Windows revenue this quarter? Let's do a rough back-of-the-envelope estimate. But if Windows unit sales don't pick up again, the future looks increasingly bleak.
|
|
|
|
|
Lookout has discovered BadNews, a new malware family, in 32 apps across four different developer accounts in Google Play. According to Google Play statistics, the combined affected applications have been downloaded between 2,000,000 – 9,000,000 times. We notified Google and they promptly removed all apps and suspended the associated developer accounts pending further investigation. All Lookout users are protected against this threat. BadNews masquerades as an innocent, if somewhat aggressive advertising network. This is one of the first times that we’ve seen a malicious distribution network clearly posing as an ad network. What it is, how it works and how you can stay safe.
|
|
|
|