Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- JAVA DEVELOPMENT COMPANY



  Why Objective-C is Hard

As an active member of "The Internet" and vocal Objective-C coder, I get a lot of questions surrounding the language. They're often framed around thinking about learning the language or trying to write an app, but they also usually involve a phrase like "Objective-C looks really hard" or "what are all those minus signs about?" Both of these are pretty good questions, and I'd like to address why someone might be more hesitant to jump into iOS or OS X development compared to, say, Ruby or J...

   Objective-C,difficult,hard,reason,analysis     2012-03-07 05:11:28

  Esmerelda's Imagination

An actress acquaintance of mine—let's call her Esmerelda—once said, "I can't imagine being anything except an actress." To which the retort was given, "You can't be much of an actress then, can you?"I was reminded of this exchange when someone said to me about Go, "I can't imagine programming in a language that doesn't have generics." My retort, unspoken this time, was, "You can't be much of a programmer, then, can you?"This is not an essay about generics (which are a fine...

   Programmer,Go,Immagination,Complaint     2011-12-31 23:38:13

  Esmerelda's Imagination

An actress acquaintance of mine—let's call her Esmerelda—once said, "I can't imagine being anything except an actress." To which the retort was given, "You can't be much of an actress then, can you?"I was reminded of this exchange when someone said to me about Go, "I can't imagine programming in a language that doesn't have generics." My retort, unspoken this time, was, "You can't be much of a programmer, then, can you?"This is not an essay about generics (which are a fine...

   Programmer,Imagination,Lack     2012-02-08 10:31:09

  Introduction to DTLS(Datagram Transport Layer Security)

Secure communication has become a vital requirement on the Internet. Lots of information transferred through the Internet are sensitive data such as financial transactions, medical information, media streaming etc. To ensure security of data transferred on the Internet, a few secure protocols have been designed including SSL/TLS and IPsec. Many large websites in the world have adopted TLS. Apart from SSL/TLS, there is some other protocol designed to be used in special cases. One of them is ...

   JAVA 9,DTLS,TLS,SECURITY     2016-04-02 05:55:36

  The big four in Taiwan can compete with Samsung

Taiwan's IT industry has a tense competition with South Korea, TSMC chairman Morris Chang said that although Samsung Electronics is a powerful opponent, ,there is only one Samsung in South Korean; in contrast, Taiwan has the TSMC, HTC, MediaTek and Hon Hai, they can challenge Samsung altogether.Morris Chang pointed out that Samsung Electronics is the  company with biggest market capitalization in South Korea, the market value is roughly $200 billion; but the second largest company in S...

   Taiwan,Samsung,IT     2013-06-12 06:46:16

  Windows 8 will support more development languages

Windows OS already supports many development languages, including C++, JavaScript/HTML5, iVisual Basic, Visual C# and XAML. However, Microsoft is trying to add more development language supports in the next-generation PC operating system Windows 8. Microsoft revealed that they would support more development languages for Windows 8 app development at the Lang.Next Conference this week.Microsoft development manager and chief executive Martyn Lovell, claimed that "I hope the developers can create a...

   Window 8,Development languages,Lang.Next     2012-04-05 06:03:23

  Why developers need a Mac

I am by no means an Apple fan. For one thing, I find Windows (and Linux) stable and fast, so you are not going to hear me argue that my computing life was transformed once I made that Switch (with a capital letter). Admittedly that is partly because I am familiar with how to fix and tune Windows and remove foistware, but it is not that hard. For another, I am not an admirer of Apple’s secretive approach, or the fact that most requests for comment from journalists are responded to wi...

   Apple,Mac,Development,iOS,Windows     2011-12-07 03:12:17

  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10

  Yes, Virginia, Scala is hard

Let me first say that I am a Scala lover and have been a Scala champion for almost 5 years.  I've written books and articles on Scala.  I've worked with dozens of companies that have launched Scala and Lift projects.  I've code reviewed many dozens of Scala projects.I used to think that Scala was easy.  It was, and continues to be, a cure for some of the numerous problems with Java.  From the "stuff that's hard or impossible in Java is simple in Scala," Scala is a very e...

   Scala,OOP,FP,function programming,hard,idiom     2011-11-08 08:47:43

  How Google Tests Software - Part Three

Lots of questions in the comments to the last two posts. I am not ignoring them. Hopefully many of them will be answered here and in following posts. I am just getting started on this topic.At Google, quality is not equal to test. Yes I am sure that is true elsewhere too. “Quality cannot be tested in” is so cliché it has to be true. From automobiles to software if it isn’t built right in the first place then it is never going to be right. Ask any car company that has ever h...

   Google,Software,Testing,Quality,Fidelity     2011-03-22 14:31:00