BOWER: A package manager for the web – yum/apt-get for the web – Bower is a package manager for the web. It offers a generic, unopinionated solution to the problem of front-end package management, while exposing the package dependency model via an API that can be consumed by a more opinionated build stack. There are no system wide dependencies, no dependencies are shared between different apps, and the dependency tree is flat.
15 hot programming trends — and 15 going cold – What follows is a list of what's hot — and what's not — among today's programmers. Not everyone will agree with what's A-listed, what's D-listed, and what's been left out. But that's what makes programming an endlessly fascinating profession: rapid change, passionate debate, sudden comebacks.
The Four Stages of Disruption – While I was speaking with some entrepreneurs recently on the topic, the question kept coming up: “If we’re so aware of disruption, then why do successful products (or companies) keep getting disrupted?”
The Science of Choosing EC2 Reserved Instances – In this talk, Cloudability VP of Product Development Toban Zolman walks you through the most common scenarios for RIs, shows you how to make the best possible decisions for RI purchases, and how to significantly reduce the time needed to make those decisio
7 Ways to be a Better Programmer in 2014 – Programming – Coders make resolutions, no? If your to-do-better list is still empty, consider these ideas from other programmers to put to use in the New Year. Even the smartest folks have room to grow. The following excerpts are contained in the book 97 Things Every Pro
How Netflix Reverse Engineered Hollywood – To understand how people look for movies, the video service created 76,897 micro-genres. We took the genre descriptions, broke them down to their key words, … and built our own new-genre generator.
Why I’m interested in Bitcoin – Chris Dixon – I believe the only way the technology industry can offer meaningfully improved financial services is by building new services that don’t depend on incumbent companies. Bitcoin is a serious proposal for dramatically improving the payments industry. There a
Jackson – Unmarshall to Collection/Array – Mapping json arrays to java collections is one of the more common tasks that Jackson is used for, and these solutions are vital to get to a correct, type-safe mapping.
The Decline of IE and Firefox – Windows and IE are dying under the assault of iPads and other tablets from the left, and Chromebooks from the right. This is not surprising, or even news to people who spend a lot of time in the tech world. What surprised me recently was how precipitous th
Ketosis – advantaged or misunderstood state? – In part I of this post I will see to it (assuming you read it) that you’ll know more about ketosis than just about anyone, including your doctor or the majority of “experts” out there writing about this topic.
I’ve Been Using Evernote All Wrong. Here’s Why It’s Actually Amazing – For years, I kept hearing how awesome Evernote was: how it could store everything you possibly needed, make it available everywhere, and how scores of people couldn't live without it. I tried it multiple times, and never saw the appeal until now. Here's what I was missing.
Eliminating my trivial inconveniences building Discourse – There is also a more insidious form of waiting. The zero value work you tend to do repetitively, also known as trivial inconveniences. These issues don’t stop you from working, they just make your job slightly more annoying.
Standard Java API for JSON – JSR-353, the Java API for JSON Processing (JSON-P), has reached final approval ballot this month. JSON-P (similar to JAXP) consists of a Streaming API (similar to StAX) and an Object Model API (similar to DOM).
Solarized – Precision colors for machines and people – Solarized is a sixteen color palette (eight monotones, eight accent colors) designed for use with terminal and gui applications. It has several unique properties. I designed this colorscheme with both precise CIELAB lightness relationships and a refined se
Novell offers mobile file sharing for the enterprise | PCWorld – In an effort to help enterprises get a handle on the Bring Your Own Device (BYOD) trend, Novell has released enterprise file sharing software that it claims is as easy to use as commercial cloud storage services such as Dropbox, Microsoft Skydrive, and Goo
Unraveling HTML5 vs. Native – When going for multiplatform solutions bear in mind that while the idea of a common codebase is desirable the “write-once-run-anywhere” paradigm is ultimately an illusion, as your app will still need platform-dependent tweaks, and a broad QA effort.
SV Angel Says Health Informatics Is One Of Its New “Megatrends” | TechCrunch – SV Angel, one of the Valley’s best-known early-stage firms has always had a list of six to eight "megatrends" that it invests prolifically in. Right now, those are big data, social commerce, online-to-offline commerce, education tech, the sharing economy and the "Internet of things." Now they’re adding "health informatics" to that list
A Scala Tutorial for Java Programmers – Scala Documentation – This document gives a quick introduction to the Scala language and compiler. It is intended for people who already have some programming experience and want an overview of what they can do with Scala. A basic knowledge of object-oriented programming, especially in Java, is assumed.
Non-blocking IO in Servlet 3.1 By Example | Java.net – Servlet 3.1 (JSR 340) is almost ready for the release. One of the new features is the support for non-blocking IO. ReadListener and WriteListener are introduced to allow non-blocking processing in Servlet.
Red Hat pushes open source cloud with OpenStack distro | ZDNet – Linux software giant Red Hat has launched a community-led distribution of the OpenStack open source cloud platform. RDO — announced at the OpenStack Summit in Portland, USA, on Monday — is a free community-supported distro of OpenStack that will run on Red Hat Enterprise Linux (RHEL), Fedora and their derivatives.
A Little Graph Theory for the Busy Developer – Jim Webber explores graph data analytic techniques using social graph properties inspired by anthropology and sociology, extracting online business intelligence from graph matching.
Why China Is Reading Your Email – WSJ.com – Beijing's cyber attacks are rooted in military strategy, says one of America's foremost experts. The best way to combat them is for the U.S. to go on the cyber offensive too.
Performance Testing Java Applications – This talk explores when to start performance testing, how to avoid the common pitfalls, how to profile when the results cause your team to pull a funny face, and what you can do about that funny face. Specific issues to Java and managed runtimes in general
Why Use Twitter Bootstrap? Because I Said So – For me Twitter Bootstrap is a wonderful design tool because as a designer I don't have to focus so much on the UI components and focus more on the overall design of the app and its users. For web based applications and large data driven and heavy interactive websites it's a fantastic design tool
America’s Real Criminal Element: Lead – Cleaning up the rest of the lead that remains in our environment could turn out to be the cheapest, most effective crime prevention tool we have. And we could start doing it tomorrow.
Seven Deadly Sins of Modern Objective-C – We're all guilty of some Objective-C sins, I'm sure, but the important thing is to improve. We're at the dawn of a new year. Why not take this opportunity to reflect on why you've been so sinful and find ways to code more virtuously in the new year?
Introducing Spring Scala – The goal of the Spring Scala project is simply to make it easier to use the Spring framework in Scala. We believe that there are many Spring users out there who want to try Scala out, but do not want to leave their experience with Spring behind. This project is meant for those people.
twig-persist – Object Datastore for Google App Engine – Twig is an object persistence interface built on Google App Engine's low-level datastore which overcomes many of JDO-GAEs limitations including improved support for inheritance, polymorphism and generic types. You can easily configure, modify or extend Twigs behaviour by implementing your own strategies or overriding extension points in pure Java code.
Java.next() -> Scala or Groovy? – Generally the understanding is that scala has the ability to disrupt the status quo rather than incrementally improving it like Groovy. Scala has done and doing good job of reducing the cost of abstraction transliterate Java into Scala and end up with bytecode that is almost exactly the same. Scala has some original good ideas and well thought out type system.
Antivirus Makers Work on Software to Catch Malware More Effectively – NYTimes.com – Consumers and businesses spend billions of dollars every year on antivirus software. But these programs rarely, if ever, block freshly minted computer viruses, experts say, because the virus creators move too quickly. That is prompting start-ups and other companies to get creative about new approaches to computer security.
HtmlUnit vs JSoup: html parsing in Java – In this blog I will compare JSoup with other similar framework, HtmlUnit. Apparently both of them are good Html parsing frameworks and both can be used for web application unit testing and web scraping. In this blog, I will explain how HtmlUnit is better suited for web application unit testing automation and JSoup is better suited for Web Scraping.
Progress of Happiness – The first is that sucking at something is the first step of getting better at it. And that trying really hard isn’t supposed to be easy. In fact, getting better at anything isn’t supposed to be easy. You are bound to get fail, get hurt, fail again before you succeed.
Safeguard Your Phone from Malware – WSJ.com – According to a report by research group Juniper Networks, JNPR -2.07% hackers are increasingly targeting smartphones and other mobile devices with malicious software (also known as malware) to gain access to personal information. The threat is still small in comparison to computers, but that doesn't mean you shouldn't take precautions to protect your smartphone.