Skip to main content

Home/ Coders/ Group items matching "component" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Joel Bennett

ColorCode - Syntax Highlighting/Colorization for .NET - Release: ColorCode 1.0 - 0 views

  •  
    ColorCode is the syntax highlighting code which supports CodePlex
  •  
    ColorCode is the syntax highlighting code which supports CodePlex -- will someone PLEASE write a PowerShell language for it and donate it to them?
Matteo Spreafico

Joe Duffy's Weblog - OnBeingStateful - 0 views

  • The biggest question left unanswered in my mind is the role state will play in software of the future.
  • The biggest question left unanswered in my mind is the role state will play in software of the future. That seems like an absurd statement, or a naïve one at the very least.  State is everywhere: The values held in memory. Data locally on disk. Data in-flight that is being sent over a network. Data stored in the cloud, including on a database, remote filesystem, etc. Certainly all of these kinds of state will continue to exist far into the future.  Data is king, and is one major factor that will drive the shift to parallel computing.  The question then is how will concurrent programs interact with this state, read and mutate it, and what isolation and synchronization mechanisms are necessary to do so?
  • Many programs have ample gratuitous dependencies, simply because of the habits we’ve grown accustomed to over 30 odd years of imperative programming.  Our education, mental models, books, best-of-breed algorithms, libraries, and languages all push us in this direction.  We like to scribble intermediary state into shared variables because it’s simple to do so and because it maps to our von Neumann model of how the computer works.
  • ...3 more annotations...
  • We need to get rid of these gratuitous dependencies.  Merely papering over them with a transaction—making them “safe”—doesn’t do anything to improve the natural parallelism that a program contains.  It just ensures it doesn’t crash.  Sure, that’s plenty important, but providing programming models and patterns to eliminate the gratuitous dependencies also achieves the goal of not crashing but with the added benefit of actually improving scalability too.  Transactions have worked so well in enabling automatic parallelism in databases because the basic model itself (without transactions) already implies natural isolation among queries.  Transactions break down and scalability suffers for programs that aren’t architected in this way.  We should learn from the experience of the database community in this regard
  • There will always be hidden mutation of shared state inside lower level system components.  These are often called “benevolent side-effects,” thanks to Hoare, and apply to things like lazy initialization and memorization caches.  These will be done by concurrency ninjas who understand locks.  And their effects will be isolated by convention.
  • Even with all of this support, we’d be left with an ecosystem of libraries like the .NET Framework itself which have been built atop a fundamentally mutable and imperative system.  The path forward here is less clear to me, although having the ability to retain a mutable model within pockets of guaranteed isolation certainly makes me think the libraries are salvageable.  Thankfully, the shift will likely be very gradual, and the pieces that pose substantial problems can be rewritten in place incrementally over time.  But we need the fundamental language and type system support first.
Joel Bennett

tweetsharp - Google Code - 0 views

  •  
    A feature-complete fluent .net library for the Twitter API. A simple, discoverable, fluent interface for building Twitter queries, as well as additional features like asynchronous processing, server-side caching, url shortening, and rate throttling. Now go, create.
David Corking

Dr. Dobb's | Smartphone Operating Systems: A Developer's Perspective | March 30, 2009 - 0 views

  • The industry stewards have countered Apple's move with their own application stores, so there's a huge opportunity to write the "killer app" for one of several smartphone platforms.
  • 40 MB to less than 4 MB of free RAM
  • one-app-at-a-time requirement complicates any implementation of a copy-and-paste mechanism.
  • ...45 more annotations...
  • As a security sandbox, the iPhone OS permits only one third-party application to run at a time, and not in the background.
  • adding some useful Bluetooth profiles that supported stereo headsets, data synchronization, or the ability to implement multiplayer games would be usefu
  • iPhone OS 3, that provides some of the missing features mentioned here, such as the A2DP profile for Bluetooth, voice recording, and copy-and-paste.
  • Have to learn Objective-C; is only smartphone platform that uses it.
  • Competitors will soon catch up on the UI.
  • embed navigation and GPS plotting into applications.
  • provide their own map content
  • The OS now supports the use of accessories connected to the iPhone either through its 30-pin docking connector or wirelessly via Bluetooth. Now that the device has been "opened", you can expect an entire ecosystem to build up around the device, much like the iPod has.
  • peer-to-peer connectivity using Bonjour
  • developers can now allow users, from within the application, to purchase and obtain new content
  • No voice dial.
  • A client-server mechanism provides access to low-level system resources, and in fact the kernel itself is a server that parcels out resources to those applications that need them. This transaction scheme allows applications to exchange data without requiring direct access to the OS space.
  • C/C++ for porting existing UNIX applications, and Java to port Java ME MIDlets. As mentioned previously, the software stack offers several run-times that offer application development using WRT widgets, Flash, and Python. The primary programming language for the platform is Symbian C++,
  • Handango has managed the wide-scale distribution of Nokia applications. In February, Nokia announced plans to launch its Ovi Store, which sells applications, videos, games, pod-casts and other content, similar to Apple's App Store. The store will be accessible by Nokia S60 smartphones in May.
  • Non-standard Symbian C++ has steep learning curve, with special idioms to master. Large number of Symbian APIs to learn, since it contains hundreds of classes and thousands of member functions.
  • BlackBerry Device Software executes multiple applications simultaneously
  • Manages multiple e-mail Exchange e-mail accounts, along with support for POP3 and SMTP, and e-mails can have file attachments
  • FIPS 140-2 compliant, and supports AES or Triple DES encryption sessions via BlackBerry Enterprise Servers
  • BlackBerry Device Software has enhanced the capabilities of the platform with its own Java virtual machine (JVM), along with new Java classes that offer multitasking capabilities and UI enhancements to go beyond the capabilities of Java ME.
  • You can also take existing Java ME code and add specific BlackBerry classes to make a hybrid Java ME application
  • don't intermix MIDP 2.0 and BlackBerry API calls that perform either screen drawing or application management.
  • The catch to writing an application that uses BlackBerry API extensions is that it ties the application this smartphone. However, this is no worse than using the unique Java classes found in Google's Android.
  • Apple promotes the design goal that applications should accomplish one purpose.
  • no Flash support, and you can't download files.
  • For non-Exchange users, Apple's MobileMe online service, after some fits and starts in 2008, now supports the push of e-mails and changes to the calendar and contacts.
  • The iPhone 3G can work in tandem with Microsoft Exhange Server 2003 and 2007 to support enterprise operations.
  • Cocoa Touch is a subset of Apple's Cocoa,
  • Cocoa Touch components manage most of the writing to the screen and playing media, yet there are APIs exposed that let you access the accelerometer and camera.
  • Quartz engine is identical to the one found in Mac OS X
  • Only a select few higher-level frameworks have access to the kernel and drivers. If necessary, an application can indirectly access some of these services through C-based interfaces provided in a LibSystem library.
  • the SDK provides Dashcode, which is a framework based on a Web page composed of HTML and Javascript. You can use DashCode's simulator to write and test your web application. You can also use several other third-party frameworks to write web applications, and debug these with Aptanna Studio's tools.
  • Made by HTC, the G1 is the first smartphone using the Android platform.
  • e-mail program (which makes use of Google's Gmail), a mapping program (using the company's Google Maps), and a browser that uses WebKit, not Google's Chrome web browser
  • Android is not Java ME, nor does it support such applications
  • ability to both browse and manage multiple IM conversations. On the other hand, such heavy use of the smartphone's CPU shortens battery life significantly. Maybe Apple is on to something in limiting the number of applications that the platform can run.
  • On the positive side, the Android APIs support a touch interface (and the G1 has a capacitive touch screen), but not any multi-touch gestures.
  • copying text from the web pages is the browser isn't allowed
  • The advantage to Android's use of a different bytecode interpreter is that the DVM was designed so that multiple instances of it can run, each in their own protected memory space, and each executing an application. While this approach offers stability and a robust environment for running multiple applications, it does so at the expense of compatibility with Java ME applications.
  • Seasoned Java programmers will find the Android SDK an amalgam of Java SE and Java ME methods and classes, along with unique new ones
  • compile the Java code to generate Dalvik bytecode files, with an extension of .dex. These files, along with the manifest, graphics files, and XML files, are packaged into an .apk file that is similar to a Java JAR file.
  • The certificate that you use to generate the private key does not require a signing authority, and you can use self-signed certificates for this purpose.
  • The Developer Phone provides access to a shipping Android device without the cash outlay or contract contortions required when developing for the other platforms.
  • in February the site began supporting priced applications. Google allows developers to take seventy percent of the proceeds.
  • it's possible that you might pick up a malicious application before it is detected by the user community.
  • Open source, open platform: if you hate the mail program, some third-party is writing a better one.
  •  
    Lengthy developer's overview of Symbian, Mac OS X iPhone, Blackberry, Android. This talks about the leading app platforms except Java ME and Windows Mobile, though it does explain how Blackberry and Symbian support Java ME.
Joel Bennett

iTextSharp - SourceForge.net - 0 views

  •  
    iText# (iTextSharp) is a port of the iText open source java library to C# for the .NET platform. iText# allows you to generate PDF files on the fly...
Joel Bennett

Taco Bell Programming - 6 views

  • Taco Bell Programming is about developers knowing enough about Ops (and Unix in general) so that they don't overthink things, and arrive at simple, scalable solutions.
    • Joel Bennett
       
      There's something to be said for reusing the great (functional) tools and components that are already in your tool set. Simple and functional is a great combination, and the less code *you* have to write (for a given solution) the less code you'll have to maintain.
iupdateyou123

How to buy cheap domain | I Update You - 0 views

  •  
    A domain signifies your identity or address on the internet. A domain is a phrase including several components separated by dot. Each domain name includes a top level domain such as .NET, .COM or .ORG. Domain names ending in .COM were supposed for commercial, for profit organizations while names ending in .NET were for network infrastructure machines and those ending in .ORG were used for various usually non-profit organizations. It is easy to get a cheap domain that is equally reliable. You can choose for the cheapest domain registration if all your preferred names are available.
bosenbio

gellan gum for sale - 0 views

  •  
    Gellan gum is also known as Kaike gum and Jielan gum. The main components are glucose, glucuronic acid and rhamnose in a ratio of 2:1:1, and four monosaccharides are linear polysaccharides composed of repeating structural units. There are acetyl and glyceric acid groups in the natural high acetyl structure, they are all located on the same glucose group, and on average, each repeating structure has a glyceric acid group, and every two repeating structures has an acetyl group. After being saponified with KOH, it is transformed into low acetyl gellan gum. The glucuronic acid group can be neutralized by potassium, sodium, calcium and magnesium salts. It also contains a small amount of nitrogen produced during fermentation production.
zytrailerparts

complete trailer axle kits - 3 views

  •  
    Zhengyang supplies high quality disk brake trailer axle with competitive pricing. Our axles are built with higher quality components and are designed to exceed the highest OEM performance standards. This enables it to carry the weight of the vehicle and to provide extra strength for heavy loads. Contact for a quotation now!
batif1991

Why to use AWS control tower and how it can help your organization to handle multiple AWS account. - 1 views

  •  
    AWS Control Tower: AWS Control Tower is a service that enables you to enforce and manage governance rules for security, operations, and compliance at scale across all your organisations and accounts in the AWS Cloud. How it works: Setup: Setup the automated AWS control tower to monitor and governance rules of cloud premises. Apply guardrails: The second step is to apply the security promises to your cloud account. Like single-sign in and many more through IAM policies. Get Visibility: Monitor compliances and resources, have a look in every movement of resources and compliances. Why should we use Control tower? Setup basic practices of AWS environments in a few clicks. Standardise account provisions. Centralised policy management. Enforce governance and compliance proactively. Enable end user self services. Get continuous visibility of your AWS environment. Setup an AWS landing zone: Landing zone: a pre-configured, secure, scalable, multi-account AWS environment based on the best practice blue-prints. Multi-account management using AWS organisation. Identity and federated access management using AWS SSO. Centralised log archive using AWS cloudtrail and AWS config. Cross account audit using AWS IAM and AWS SSO. End user account provision using service catalog. Centralised monitoring and notifications using AWS cloudwatch and AWS SNS. Steps Involved: 1. Centralised identity and access: AWS SSO provides a default directory for identity. AWS SSO enables federated access management across all accounts in your organisation. Preconfigured groups (eg. AWS control tower administrator. Auditors. AWS service catalog end users). Preconfigured permission sets (e.g admin, read-only, write). Option to integrate with your managed or on-premises Active directory (AD). 2. Establish guardrails Guardrails are preconfigured governance rules for security, compliance and operations. Expressed in simple english to provide abstraction over granular AWS policies.
« First ‹ Previous 61 - 74 of 74
Showing 20 items per page