The developer world is divided into two camps. Language mavens wax rhapsodic about the power of higher-level programming — first-class functions, staged programming, AOP, MOPs, and reflection.
It’s here. It happened. Did you notice? I’m speaking, of course, of the world that Richard Stallman predicted in 1997. The one Cory Doctorow also warned us about.
My book, Evidence-based software engineering, is now available; the pdf can be downloaded here, here and here, plus all the code+data. Report any issues here. I’m investigating the possibility of a printed version. The original goals of the book, from 10-years ago, have been met, i.e.
Tenkte vi det ikke. Produktet du ser etter, er ikke lenger tilgjengelig på apple.com. Vi har imidlertid noen lignende produkter vi gjerne vil vise deg.
It might not be immediately obvious but my blog is a collection of static pages, generated by Hugo static site generator and updated automatically whenever I push to the GitHub repository. Back when I started using it, I had to decide on a search solution.
Recently, in one of the Facebook groups I belong to, someone asked a question about how to make WordPress more secure. Much as I love WordPress, I have to admit that for a risk adverse person it can be worrying to know that it is a target for hackers.
See exactly what the ping sweep is doing in real-time with an attractive matrix display. The vast majority of network scanning software packages require some type of credentialed access to remote devices to detect operating systems.
The LZMA SDK provides the documentation, samples, header files, libraries, and tools you need to develop applications that use LZMA compression. LZMA / LZMA2 are default and general compression methods of 7z format in the 7-Zip program.
7-Zip is open-source archive program with plug-in interface. New archive formats and/or archive codecs can be added by dlls. 7-Zip ships with several archive formats preinstalled: The project is written in C++ language.
SharpCompress is a compression library in pure C# for .NET 3.5, 4.5, .NET Standard 1.0, 1.3 that can unrar, un7zip, unzip, untar unbzip2 and ungzip with forward-only reading and file random access APIs. Write support for zip/tar/bzip2/gzip are implemented.
WordPress Plugins Exploited in Ongoing Attack, Researchers Warn
Researchers warn users of several plugins to update as vulnerabilities are being actively exploited to redirect website visitor traffic. Researchers are warning of an ongoing campaign exploiting vulnerabilities in a slew of WordPress plugins.
Read MoreSoftware sector braces for a split among leading companies
Gain a global perspective on the US and go beyond with curated news and analysis from 600 journalists in 50+ countries covering politics, business, innovation, trends and more.
Read MoreThe End of Agile
I knew the end of Agile was coming when we started using hockey sticks. Every morning, at precisely eight o’clock, the team of developers and architects would stand around a room paneled in white boards and would begin passing around a toy hockey stick.
Read MoreOSX-KVM/README.md at master · kholia/OSX-KVM · GitHub
Ubuntu 15.10 running on i5-6500 CPU. Fedora 24 running on i5-6500 + i7-6600U CPU.
Read MoreSoftware Architecture Guide
Enterprise Architecture groups often get separated from day to day development. This can lead to their knowledge of development work getting out of date and development teams not taking a broad company-wide perspective.
Read MoreFacebook’s Libra backers look to distance themselves from project
Gain a global perspective on the US and go beyond with curated news and analysis from 600 journalists in 50+ countries covering politics, business, innovation, trends and more.
Read MoreThe Browser Monopoly
There is really only one Big Tech monopoly that I actively worry about. It’s not Amazon, Facebook or Apple, though they are all extremely dominant in their respective fields and do act in anti-competitive ways that merit regulatory remedy.
Read MoreBitcoin’s race to outrun the quantum computer
Want to steal some Bitcoin? All you need to do is find your victim’s 16-character public key and calculate their private key by solving something called an “elliptic curve discrete logarithm problem.
Read MoreSoftware Vulnerabilities in the Boeing 787
At the Black Hat security conference today in Las Vegas, Santamarta, a researcher for security firm IOActive, plans to present his findings, including the details of multiple serious security flaws in the code for a component of the 787 known as a Crew Information Service/Maintenance System.
Read MoreWeWork isn’t a tech company; it’s a soap opera
On August 14th, The We Company (the company formerly known as WeWork) filed its mandatory S-1 paperwork to go public, and it’s worth reading in full. I mean, forget the serious stuff for a moment.
Read More