Programming

Learn Gate-Array Programming In Python and Software-Defined Radio 51

Bruce Perens writes Chris Testa KB2BMH taught a class on gate-array programming the SmartFusion chip, a Linux system and programmable gate-array on a single chip, using MyHDL, the Python Hardware Design Language to implement a software-defined radio transceiver. Watch all 4 sessions: 1, 2, 3, 4. And get the slides and code. Chris's Whitebox hardware design implementing an FCC-legal 50-1000 MHz software-defined transceiver in Open Hardware and Open Source, will be available in a few months. Here's an Overview of Whitebox and HT of the Future. Slashdot readers funded this video and videos of the entire TAPR conference. Thanks!"
Programming

Little-Known Programming Languages That Actually Pay 242

Nerval's Lobster writes There is no shortage of programming languages, from the well-known ones (Java and C++) to the outright esoteric (intended just for research or even humor). While the vast majority of people learn to program the most-popular ones, the lesser-known programming languages can also secure you a good gig in a specific industry. Which languages? Client-server programming with Opa, Salesforce's APEX language, Mathematica and MATLAB, ASN.1, and even MIT's App Inventor 2 all belong on that list, according to developer Jeff Cogswell. On the other hand, none of these languages really have broad adoption; ASN.1 and SMI, for example, are primarily used in telecommunications and network management. So is it really worth taking the time to learn a new, little-used language for anything other than the thrills?
Programming

Interviews: Ask Alexander Stepanov and Daniel E. Rose a Question 80

An anonymous reader writes "Alexander Stepanov studied mathematics at Moscow State University and has been programming since 1972. His work on foundations of programming has been supported by GE, Brooklyn Polytechnic, AT&T, HP, SGI, and, since 2002, Adobe. In 1995 he received the Dr. Dobb's Journal Excellence in Programming Award for the design of the C++ Standard Template Library. Currently, he is the Senior Principal Engineer at A9.com. Daniel E. Rose is a programmer and research scientist who has held management positions at Apple, AltaVista, Xigo, Yahoo, and is the Chief Scientist for Search at A9.com. His research focuses on all aspects of search technology, ranging from low-level algorithms for index compression to human-computer interaction issues in web search. Rose led the team at Apple that created desktop search for the Macintosh. In addition to working together, the pair have recently written a book, From Mathematics to Generic Programming. Alexander and Daniel have agreed to answer any questions you may have about their book, their work, or programming in general. As usual, ask as many as you'd like, but please, one per post."
Programming

Tumblr Co-Founder: Apple's Software Is In a Nosedive 598

mrspoonsi writes Respected developer Marco Arment is worried about Apple's future. In a blog post, he writes, "Apple's hardware today is amazing — it has never been better. But the software quality has taken such a nosedive in the last few years that I'm deeply concerned for its future." Arment was CTO at Tumblr, before he left to start Instapaper. "Apple has completely lost the functional high ground," says Arment. "'It just works' was never completely true, but I don't think the list of qualifiers and asterisks has ever been longer." He blames Apple prioritizing marketing for the problems with Apple's software. Apple wants to have new software releases each year as a marketing hook, but the annual cycles of updating Apple's software are leading to too many bugs and problems, he says: I suspect the rapid decline of Apple's software is a sign that marketing has a bit too much power at Apple today: the marketing priority of having major new releases every year is clearly impossible for the engineering teams to keep up with while maintaining quality. Maybe it's an engineering problem, but I suspect not — I doubt that any cohesive engineering team could keep up with these demands and maintain significantly higher quality."
Education

Better Learning Through Expensive Software? One Principal Thinks Not 169

theodp writes "Instead of improving the instructional practices of teachers," laments Chicago public school Principal Michael Beyer, "we are throwing vast sums of money and time at software and digital solutions that are largely untested, unproven and highly questionable." Ed-Tech vendors' so-called "weapons of mass instruction," argues Beyer, may show "gains" on the high-stakes tests because they mimic the targeted test format, but the learning gains don't necessarily transfer to the real world, or last much longer than the end of the school year. But technology in the classroom is not going away, as one commenter notes. So, what to do? Well, since U.S. CTO Megan Smith is looking for bigger technological fish to fry than weaning the White House off floppy disks, why not give her a crack at Ed-Tech, including a healthy budget and some Lab Schools where she could have educators and technologists brainstorm-and-prototype to separate the Ed-Tech wheat from the chaff without undue vendor influence and short-term test score pressure?
Programming

Anthropomorphism and Object Oriented Programming 303

An anonymous reader writes: We've all been warned about how anthropomorphizing animals and machines can lead us astray. But Edsger Dijkstra once cautioned (PDF) developers against thinking of their programs that way as well. "I think anthropomorphism is worst of all. I have now seen programs 'trying to do things,' 'wanting to do things,' 'believing things to be true,' 'knowing things' etc. Don't be so naive as to believe that this use of language is harmless. It invites the programmer to identify himself with the execution of the program and almost forces upon him the use of operational semantics." A new article fleshes out Dijkstra's statement, providing a good example of where an anthropomorphized analogy for Object Oriented Programming breaks down when you push it too far.
Businesses

If the Programmer Won't Go To Silicon Valley, Should SV Go To the Programmer? 294

theodp writes: "If 95% of great programmers aren't in the U.S.," Matt Mullenweg advises in How Paul Graham Is Wrong (a rejoinder to Graham's Let the Other 95% of Great Programmers In), "and an even higher percentage not in the Bay Area, set up your company to take advantage of that fact as a strength, not a weakness. Use WordPress and P2, use Slack, use G+ Hangouts, use Skype, use any of the amazing technology that allows us to collaborate as effectively online as previous generations of company did offline. Let people live someplace remarkable instead of paying $2,800 a month for a mediocre one bedroom rental in San Francisco. Or don't, and let companies like Automattic and Github hire the best and brightest and let them live and work wherever they like." Microsoft and Google — which hawk the very tools to facilitate remote work that Mullenweg cites — have shuttered remote offices filled with top talent even as they cry the talent sky is falling. So, is "being stubborn on keeping a company culture that requires people to be physically co-located," as Mullenweg puts it, a big part of tech's 'talent shortage' problem?" Chris Pepper also recently posted another reasoned rebuttal to Graham's post.
Programming

Red Hat Engineer Improves Math Performance of Glibc 226

jones_supa writes: Siddhesh Poyarekar from Red Hat has taken a professional look into mathematical functions found in Glibc (the GNU C library). He has been able to provide an 8-times performance improvement to slowest path of pow() function. Other transcendentals got similar improvements since the fixes were mostly in the generic multiple precision code. These improvements already went into glibc-2.18 upstream. Siddhesh believes that a lot of the low hanging fruit has now been picked, but that this is definitely not the end of the road for improvements in the multiple precision performance. There are other more complicated improvements, like the limitation of worst case precision for exp() and log() functions, based on the results of the paper Worst Cases for Correct Rounding of the Elementary Functions in Double Precision (PDF). One needs to prove that those results apply to the Glibc multiple precision bits.
Programming

Ask Slashdot: Are Progressive Glasses a Mistake For Computer Users? 464

An anonymous reader writes I'm a daily, all-day computer user and use two 19-inch monitors for my work. I'm at the age now where I need reading glasses, and my optometrist steered me to progressive lenses. I don't need any correction for distance, only reading. I'm trying very hard to get used to them, but I hate them. The focal point seems to be about 1 inch big, with everything around that blurry. Reading books on my iPad is a struggle; I have to turn my head side to side simply to keep the line of text in focus, and when I do that, the page warps and flow in a dizzying manner. I don't think reading should be like watching a tennis match. And using my two monitors at work? Hopeless and frustrating! Has anybody here who uses either very large or multiple computer monitors figured out how to comfortably use progressive glasses? Or are they simply inappropriate for this kind of use?
Encryption

Unofficial WhatsApp Library Gets End To End Encryption Before Official Clients 29

An anonymous reader writes Earlier last year WhatsApp announced partnership with Open WhisperSystems to integrate the ratcheting forward secrecy protocol found in their app called TextSecure, into WhatsApp. The protocol is supposed to provide end-to-end encryption between WhatsApp clients. So far it has been implemented only in WhatsApp on Android, with the rest of platforms yet to come. The implementation however has already made it into unofficial WhatsApp libraries which allow developers to use WhatsApp service in their applications, starting with a python-library called yowsup, and the rest will follow. It's worth mentioning that none of those libraries are supported nor approved by WhatsApp, so one has to wonder if WhatsApp is going to take some legal action (again) against them.
Bug

2014: The Year We Learned How Vulnerable Third-Party Code Libraries Are 255

jfruh writes Heartbleed, Shellshock, Poodle — all high-profile vulnerabilities in widely used libraries that rocked the software industry in 2014. Sadly, experts are now beginning to believe that these aren't the only bugs lurking out there in widely used open source code, just the ones that grabbed the most attention. It's beginning to look like one of the foundation concepts of open source — that with enough eyes, all bugs are shallow — is a myth. Of course, probably no one believes that all bugs are instantly shallow, no matter how open is the source, or that open source software is immune from bugs -- particularly ESR, coiner of the phrase.
Programming

How We'll Program 1000 Cores - and Get Linus Ranting, Again 449

vikingpower writes For developers, 2015 got kick-started mentally by a Linus Torvald rant about parallel computing being a bunch of crock. Although Linus' rants are deservedly famous for the political incorrectness and (often) for their insight, it may be that Linus has overlooked Gustafson's Law. Back in 2012, the High Scalability blog already ran a post pointing towards new ways to think about parallel computing, especially the ideas of David Ungar, who thinks in the direction of lock-less computing of intermediary, possibly faulty results that are updated often. At the end of this year, we may be thinking differently about parallel server-side computing than we do today.
Programming

Ringing In 2015 With 40 Linux-Friendly Hacker SBCs 81

DeviceGuru writes As seen in this year-end summary of 40 hacker-friendly SBCs, 2014 brought us plenty of new Linux and Android friendly single-board computers to tinker with — ranging from $35 bargains, to octa-core powerhouses. Many of the new arrivals feature 1-2GHz multicore SoCs, 1-2GB RAM, generous built-in flash, gigabit Ethernet, WiFi, on-board FPGAs, and other extras. However, most of the growth has been in the sub-$50 segment, where the Raspberry Pi and BeagleBone reign supreme, but are now being challenged by a growing number of feature-enhanced clones, such as the Banana Pi and Orange Pi. Best of all, there's every reason to expect 2015 to accelerate these trends.
Programming

India Blocks Code Sharing Websites On Anti-Terror Advisory 78

darkstar019 writes The Indian government has banned websites under the pretext that ISIS is using them for anti-Indian purposes. The list includes code sharing websites like Pastebin, Github and Sourceforge. As of now, these websites are still up. From the article: "Officials from the department of Information Technology and the department of telecom were not available for comment. 'These are all providing very dangerous kind of cut and paste services..You can take code, cut it, paste it, remove it, delete it,' said one government official who requested anonymity."
PHP

Over 78% of All PHP Installs Are Insecure 112

An anonymous reader writes: Anthony Ferrara, a developer advocate at Google, has published a blog post with some statistics showing the sorry state of affairs for website security involving PHP. After defining a list of secure and supported versions of PHP, he used data from W3Techs to find a rough comparison between the number of secure installs and the number of insecure or outdated installs. After doing some analysis, Ferrara sets the upper bound on secure installs at 21.71%. He adds, "These numbers are optimistic. That's because we're counting all version numbers that are maintained by a distribution as secure, even though not all installs of that version number are going to be from a distribution. Just because 5.3.3 is maintained by CentOS and Debian doesn't mean that every install of 5.3.3 is maintained. There will be a small percentage of installs that are from-source. Therefore, the real 'secure' number is going to be less than quoted." Ferrara was inspired to dig into the real world stats after another recent discussion of responsible developer practices.
Christmas Cheer

School Defied Google and US Government, Let Boys Program White House Xmas Trees 355

theodp writes This holiday season, Google and the National Parks partnered to let girls program the White House Christmas tree lights. While the initiative earned kudos in Fast Company's 9 Giant Leaps For Women In Science and Technology In 2014, it also prompted an act of civil disobedience of sorts from St. Augustine of Canterbury School, which decided Google and the U.S. government wouldn't determine which of their kids would be allowed to participate in the coding event. "We decided to open it up to all our students, both boys and girls so that they could be a part of such an historic event, and have it be the kickoff to our Hour of Code week," explained Debra Knox, a technology teacher at St. Augustine.
Education

White House Touts Obama's 1-Liner as 2014 Tech Highlight 65

theodp (442580) writes That President Obama became the first President to write a line of code (as a top Microsoft lobbyist looked on) is #1 on the White House's Top 9 science and technology highlights from 2014. To kick off this year's Hour of Code, the President 'learned to code' by moving a Disney Princess Elsa character 100 pixels on a screen, first by dragging-and-dropping Blockly puzzle pieces and then by coding 1 line of JavaScript. Interestingly, Bill Clinton might have been The First President To Write Code had Microsoft seen fit to use its patented, circa-1995 Graphical Programming System and Method for Enabling a Person to Learn Text-Based Programming — which describes how kids as young as 8-12 years of age can be taught to program by progressing from creating a program using graphical objects to doing so using text-based programming — to teach President Clinton to code some 20 years ago!
Programming

Paul Graham: Let the Other 95% of Great Programmers In 552

An anonymous reader writes: Y Combinator's Paul Graham has posted an essay arguing in favor of relaxed immigration rules. His argument is straight-forward: with only 5% of the world's population, the U.S. can only expect about 5% of great programmers to be born here. He says, "What the anti-immigration people don't understand is that there is a huge variation in ability between competent programmers and exceptional ones, and while you can train people to be competent, you can't train them to be exceptional. Exceptional programmers have an aptitude for and interest in programming that is not merely the product of training."

Graham says even a dramatic boost to the training of programmers within the U.S. can't hope to match the resources available elsewhere. "We have the potential to ensure that the U.S. remains a technology superpower just by letting in a few thousand great programmers a year. What a colossal mistake it would be to let that opportunity slip. It could easily be the defining mistake this generation of American politicians later become famous for."
Databases

Net Neutrality Comments Overtaxed FCC's System 32

Presto Vivace writes with news that the FCC has had trouble dealing with the sheer volume of comments submitted about net neutrality. There were millions of them, and they caused problems with the agency's 18-year-old Electronic Comment Filing System (ECFS). When the FCC attempted to dump the comments into XML format to make download and analysis easier, problems with Apache Solr meant roughly 680,000 didn't make the transfer. The agency promised to release a new set of fixed XML files in January that include all of the dropped comments. Despite many reports that the comments were "lost," they're all available using the ECFS.
Programming

Donald Knuth Worried About the "Dumbing Down" of Computer Science History 149

An anonymous reader writes: Thomas Haigh, writing for Communications of the ACM, has an in-depth column about Donald Knuth and the history of computer science. It's centered on a video of Knuth giving a lecture at Stanford earlier this year, in which he sadly recounts how we're doing a poor job of capturing the development of computer science, which obscures vital experience in discovering new concepts and overcoming new obstacles. Haigh disagrees with Knuth, and explains why: "Distinguished computer scientists are prone to blur their own discipline, and in particular few dozen elite programs, with the much broader field of computing. The tools and ideas produced by computer scientists underpin all areas of IT and make possible the work carried out by network technicians, business analysts, help desk workers, and Excel programmers. That does not make those workers computer scientists. ... Computing is much bigger than computer science, and so the history of computing is much bigger than the history of computer science. Yet Knuth treated Campbell-Kelly's book on the business history of the software industry (accurately subtitled 'a history of the software industry') and all the rest of the history of computing as part of 'the history of computer science.'"

Slashdot Top Deals