C# - Using Rijindael Algorithm & Recursion to Implement a File...
From CodeProject:Download source - 382.9 KB Download source - 814.3 KB. This article demonstrates the use of class to powerfully encrypt strings and files. It can be very useful also for understanding...
View ArticleMetaprogramming for the Masses
From InfoQ:Richard Carlsson introduces and demoes a library for using template strings with meta-variables. The library was used at Klarna to implement a DSL for business logic. By Richard...
View ArticleHow String equals Method Works
From Javalobby:The equals method is declared in Object class and hence is inherited by all classes in Java. The purpose of equals method is to provide logical equality. The default implementation of...
View ArticleJDK 8: State of the Collections
From Javalobby:I'm a Java and SQL enthusiast developer working for a leading company in the E-Banking field in Zurich, Switzerland. I'm the creator of JOOQ, a comprehensive SQL library for Java, and...
View ArticleAvoiding the Tar Pits of Localization with Jeff Casimir
From blog.localeapp.com:The tar pits of localizationWriting better codeFixing magic dataWhite labeling your app InternationalizationLocalizationLocale SelectionBonus: White labelingSummaryQ and Even if...
View ArticleA note about the performance of Printf and Format
From lexifi.com:The goal is to display the following to stdout: (0,0) (1,1) (2,2) ... (1000000,1000000) How would you implement that in OCaml? For such a simple task, we probably expect the program to...
View ArticleC# - Using Rijindael Algorithm and Recursion to Implement a File...
From CodeProject:This article demonstrates the use of the System.Security.Cryptography.Rijindael class to powerfully encrypt strings and files. It can be very useful for understanding some file...
View ArticlePython for the impatient
From abiens.snv.jussieu.fr:This is a very brief summary of the Python language for computing professionals and other folks who are happy learning a new language in ten minutes from a couple of pieces...
View ArticleSmart whitespace and the Ruby Slippers
From Perl.org Blogs:This is cross-posted from the new home of the Ocean of Awareness blog. I've been working on a "scannerless" Marpa interface.Click here to read moreTagged: #ruby #perl6 #parsing...
View ArticleStrings Obfuscation System
From CodeProject:Michael Haephrati, born in 1964, an entrepreneur, inventor and a musician. Haephrati worked on many ventures starting from HarmonySoft, designing Rashumon, the first Graphical...
View ArticlePy3k status update #8
From PyPy Blog:This is the eight status update about our work on the py3k branch, which we can work on thanks to all of the people who donated to the py3k proposal.Just a short update on November's...
View ArticleWriting Custom CellRenderer using the Declarative new GWT 2.5 UiRenderer
From Javalobby:Before GWT 2.writing a custom CellRenderer to present data in a certain manner was very complicated and very difficult to achieve. All the custom UI code had to be written inside a Java...
View ArticleAn intelligent 404 page
From CodeProject:Download source - 2.80 Kb Download demo app (WinForms) to test the algorithm - 7.04 Kb. Did you ever notice on big sites like www.microsoft.com, if you reach a page that doesn't exist,...
View ArticleWorking with legacy databases in NHibernate Part 2 - Fixed length strings and...
From CodeProject:Simple one this but it drove me crazy for a while. For some reason *cough* incompetence *cough* the technical manager at my previous company had a penchant for using fixed-length...
View ArticleC#: More On Array Variance
From CodeProject:In a previous post, I went through how arrays have a covariant in relation to the type of its elements, but not safely covariant. In the following example, the second assignment is...
View ArticleInternet Explorer 10 User Agent Strings On Windows 8 64bit
From CodeProject:Internet Explorer 10 is the web browser Microsoft is delivering with Windows. (Needs to be enabled for each security zone.Click here to read moreTagged: #64bit #browser #strings...
View ArticleMore magic - Lessons learned from NUL byte bugs
From sjamaan.ath.cx:Last time I explained how sloppy representations can cause various vulnerabilities. While doing some research for that post I stumbled across NUL byte injection bugs in two...
View ArticleJust Enough Ops of Devs
From DZone Architect Zone:A few weeks ago I was reading through the chef documentaion and I came across the page "Just Enough Ruby for Chef". This inspired me to put together a quick article, on how...
View Article