Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Form



  How multitasking really works on Android and iOS

As the horsepower packed into mobile devices gets ever greater, more full-featured forms of multitasking are possible. The market leaders have very different ways of going about things, and there are numerous misconceptions about what is going on behind the scenes. This isn’t all the fault of the user, though. In the interest of ease of use, sometimes the multitasking metaphor is overly simplified on both Android and iOS. iOS: It’s more complicated than it looksEver since iOS...

   Android,iOs,Multitasking,Task bar     2012-01-06 09:58:09

  Announcing the Windows 8 Editions

Today I would like to share information with you on the editions that will be available for "Windows 8" when it is released to market. We have talked about Windows 8 as Windows reimagined, from the chipset to the user experience. This also applies to the editions available – we have worked to make it easier for customers to know what edition will work best for them when they purchase a new Windows 8 PC or upgrade their existing PC. Windows 8 has the flexibility you need - whether...

   Windows 8,Windows RT,New version     2012-04-17 06:19:16

  String.length() vs String.getBytes().length in Java

In Java, String.length() is to return the number of characters in the string, while String.getBytes().length is to return the number of bytes to represent the string with the specified encoding. By default, the encoding will be the value of system property file.encoding, the encoding name can be set manually as well by calling System.setProperty("file.encoding", "XXX"). For example, UTF-8, Cp1252. In many cases, String.length() will return the same value as String.getBytes().length, but in some ...

   Java,UTF8,String,Encoding,Sample     2015-04-01 22:22:23

  Programming Languages for Machine Learning Implementations

Machine learning algorithms have a much better chance of being widely adopted if they are implemented in some easy-to-use code. There are several important concerns associated with machine learning which stress programming languages on the ease-of-use vs. speed frontier.Speed The rate at which data sources are growing seems to be outstripping the rate at which computational power is growing, so it is important that we be able to eak out every bit of computational power. Garbage collected la...

   Programming language,Machine learning,Development     2011-11-16 08:22:17

  Skills Needed to be a Web Developer in 2011

Many web developers think they already have all the knowledge they need to continue their careers. Check out this list of the ten skills all web developers must have to succeed in 2011 and beyond, and see how you measure up.1) Speak The Basic Languages of the WebBesides the content mark-up of HTML and the style rich sheets of CSS, how are you at your JavaScript and other advanced DHTML features? HTML 5, the latest upcoming W3C standard, includes audio and video embedding, database connectivity a...

   HTML5,Web skills,PHP,.NET,Java     2011-05-12 00:47:49

  Why I switched from Ruby back to C++

After two months of Sol Trader development in Ruby, I took a difficult decision last Wednesday morning: I’ve decided to rewrite the game code from scratch in C++. Let me explain my reasons. If you'd like to receive announcements about Sol Trader or be part of the beta program, sign up at soltrader.net. Why I did it Slow frames: When working with Ruby, I use the excellent Gosu library to do all my game specific coding. This initially worked great, but occasionally I’d just...

   C++,Ruby,Advantage,Feature     2012-01-09 08:56:21

  SQL Injection through HTTP Headers

During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to SQL injection flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever. What about other HTTP header parameters? Aren’t they potential input vectors for SQL injection attacks? How can one test all these HTTP parameters and whic...

   Code security,SQL injection,HTTP header     2012-04-05 11:42:04

  40+ Techniques to enhance your php code

1. Do not use relative paths , instead define a ROOT path Its quite common to see such lines : 1require_once('../../lib/some_class.php'); This approach has many drawbacks : It first searches for directories specified in the include paths of php , then looks from the current directory. So many directories are checked. When a script is included by another script in a different directory , its base directory changes to that of the including script. Another issue , is that when a script is being ru...

   PHP,Quirk,Trick,Efficiency,Techniques     2012-04-10 13:06:55

  A Clash of Titans Between Elon Musk and Larry Page over AGI's Future

Artificial General Intelligence(AGI) has long been a topic of fascination and concern for technology leaders, with some seeing it as humanity's ultimate tool, while others view it as an existential threat. This clash of perspectives was on full display during the acquisition of DeepMind by Google in 2014, as two tech titans, Elon Musk and Larry Page, found themselves on opposite sides of the debate. While Page saw AGI as a necessary and desirable step in humanity's evolution, Musk was more wary ...

   AI,LARRY PAGE,ELON MUSK,AGI     2023-04-30 11:13:53

  In praise of impractical programming

Although it’s become a cultural mainstay now, I still remember when I first saw that thick book — the one with the wizard on the cover — about a school for magic where wonders are easily conjured by those who know the proper spells. Of course, I’m talking about the Structure and Interpretation of Computer Programs. There was that other book with the spells, but the “Wizard Book” sincerely claimed to teach magic. For the past few years, I’ve been ...

   Impractical Programming,Structure,Scheme,Practical     2011-12-05 12:28:58