Friday, July 29, 2005

YourKit Java Profiler 4.5-EAP14

YourKit Java Profiler is a CPU and memory profiler that makes it easy to solve wide range of CPU- and memory-related performance problems. It features automatic leak detection, powerful tools for the analysis of memory distribution, an object heap browser, comprehensive memory tests as part of your JUnit testing process, extremely low profiling overhead, transparent deobfuscation support, and integration with Eclipse, JBuilder, IntelliJ IDEA, NetBeans, and JDeveloper IDEs.

Release focus: Major feature enhancements "

Revenge of the Nerds -- Again

Google and Yahoo! are hiring away hundreds of top engineers from high tech's most prestigious firms

Dude, it's called Java Job Interview

For technical jobs especially Java-related ones, any type of on-the-spot exam barely proves anything. Whether it's online or written and be subjected to batteries of technical interviews if the candidates happen to pass their so-high-standard tests. I observed that these kind of tests are simply more of intimidation contests rather than getting the right person for the job


Jared Odulio

XML Enhancements for Java

What are XML Enhancements for JavaTM?
XML Enhancements for Java (XJ) are a set of extensions to Java 1.4 that integrate support for XML, XML Schema and XPath 1.0 into the language. The advantages of XJ over existing mechanisms for XML development are:
Familiarity (for the XML Programmer) : XML processing in XJ is consistent with open XML standards.
Robustness : XJ programs are strongly typed with respect to XML Schemas. The XJ compiler can detect errors in uses of XPath expressions and construction of XML data.
Easier Maintenance: Since XJ programs are written in terms of XML and not low-level APIs such as DOM or SAX, they are easier to maintain and modify if XML Schemas change.
Performance: Since the compiler is aware of the use of XML in a program, it can optimize the runtime representation, parsing, and XPath evaluation of XML

Thursday, July 28, 2005

iSeries shops with AIX partitions can rest easy about SCO lawsuit

iSeries users running AIX alongside i5/OS on their systems can breathe a little sigh of relief but just a little one. U.S. District Court Judge Dale Kimball earlier this month denied The SCO Group's request to include specific code in the AIX operating system for Power processors in its breach of copyright claims against IBM.
The judge also ordered IBM to produce Chairman and CEO Sam Palmisano for a deposition by SCO and set final deadlines for IBM to produce discovery material the code in question and for SCO to 'identify with specificity all allegedly misused material.'
Perhaps the biggest relief to iSeries users thus far is a judgment over a little squabble concerning IBM's AIX operating system. Kimball denied SCO's request to include specific code from the AIX operating system for POWER processors in its breach of copyright claims against IBM.
SCO wanted to amend its lawsuit against IBM for a third time, asserting that IBM breached additional copyright laws by using some Unix code from System V Release 4 in the AIX operating system for POWER processors. SCO's attorneys said that a joint development agreement let IBM use the Unix code only for Intel-based processors, and that an IBM counterclaim asserting that the AIX operating system does not infringe on SCO copyrights gave SCO the right to amend its claim and target specific AIX code

It's back!, Google Code Jam 2005

The Google Code Jam 2005 is now offering the best coders in the world a chance to compete for $155,000! Have you got what it takes? Can you take the pressure? Know how to solve problems? Know algorithms?

If you answered yes to one or more of the above, then the Google Code Jam 2005 is right up your alley. Join coders from around the world in this intense competition that requires all your mind has to offer.

Not only will you be in your glory of coding, but there are prizes for it too! It's more than just $155,000 but a chance to work for the hottest tech company, Google

Supercharging BeanShell with Ant

This article explains how to execute any Ant task from within a BeanShell script, bringing the rich and growing Ant task library to BeanShell programmers and, in the process, vastly increasing its potential for serious scripting. This kind of bridging is good for Ant as well, allowing Ant tasks to be used within familiar control and looping constructs

Why Yahoo! bought Pixoria

Loosely coupled

Acquiring Konfabulator lets Yahoo! feed live information directly to the desktop, bypassing the browser. A lot of people have been misled by Pixoria's use of the name 'widgets' for the tiny applets created and run using its Konfabulator tool (now in the wake of the acquisition to be renamed Yahoo! Widgets, which is sure to perpetuate the misconception). Just like the early days of JavaScript which Konfabulator uses most of the widgets available today are useless eye candy, offering functionality that appeals only to witless geeks. But put this technology together with people who understand the true power of client-side JavaScript the designers of OddPost, for example, which Yahoo! acquired last summer and you have the potential to create something of huge import.

Here are the ingredients that I believe give Yahoo! Widgets (formerly known as Konfabulator) such huge potential:

Wednesday, July 27, 2005

ACID is Good. Take it in Short Doses

If you develop challenging distributed enterprise applications and systems, short ACID transactions are your friends. The ACID properties of transactions enable you to write software without considering the complex environment in which the application runs. ACID transactions bring simple high-school programming to the complex real world. With ACID transactions you can concentrate on the application logic and not on failure detection, recovery and synchronizing access to shared data.
With ACID transactions, your software need not include logic to recover the state of the application should it fail. Instead you simply define transaction boundaries in your application and the system ensures atomicity the actions taken within the transaction will happen completely, or not at all. If the application fails midstream, the system will recover to the previous state, as if the transaction never took place. If you have ever written an application without transactions that attempted to detect failures and recover from them, you know that logic can get quite complex

How Do I Start a Radio Station?

Mark Lyon's GMail Loader (GML) - Import Your Mail into GMail

The application works by reading your existing mail files, and forwarding them to GMail. It does not delete the mail from your local computer. Email can be set to arrive at GMail in either your 'Inbox' or 'Sent Mail'

Russell Beattie Notebook - Thin is In

The bar for style and function has now shifted, all the same functionality and not just small, but thin. Not too long ago I was thinking of my new 6680 as a pretty decent sized phone compared to its predecesors, but compared to the RAZR, it's a brick

Russ

Setting up a JNDI context using Spring

Free Enterprise Profiler for J2EE

Raj Blogs: Common UNIX Commands

cd - Change Directory. (Just like in dos)
mkdir - Make Directory.
rmdir - Removes a Directory that is empty!
ls - List directory. (Like dir in Windows)
cat – Short for concatenate. It was used to concatenate two filestogether via cat file1 file2 >file3 Didn‘t know that did you. Theechoing out to standard out gave cat a whole new meaning to the users.
more - Just like less. It pages output to the screen.
mv - Move. For moving files and directories around
rm Remove a file. Also rm rf for removing a folder and it‘scontent.
grep - Used to search for text within a stream or files. (man regex)
vi – A text based editor. You‘ll find that it‘s really a symboliclink to vim now a days.
rlogin - Remote login. I hope your admins disabled this!
passwd - Used to change your password.
ps - Used to processes.
nice - Run a program with lower priority so you don't hog CPU.
kill – Terminates a program. You can select what signal you want tokill a program with also. -9
gzip - Compresses files.
gunzip - Uncompresses files.
tee – Pipe your output to standard out and to a file. Nice forwatching a process and logging.
sort - A sort program
sed – Stream Editor. Excellent program to modify files or streams!(man regex)
uniq - Unique program.
awk – An excellent program to parse up streams or files into tokens.It supports a hellva lot of cool things and you can complete writeprograms with it. (man nawk also)
chgrp - Change Group
chown - Change owner
pwd - Current working directory.
find – Used to find programs and you can also execute commands oneach match found.
wc - Word, line, letter count program. For you line counting whores.
which - Finds a location of a program that's in your path.
last - See who last logged in.
du - Disk usage.
df - Disk Free
top – Running processes with CPU and other information thatrefreshes.
watch – Repeats a command and updates the screen with only thechanges
login - Logging in
telnet - Connect to another machine
logout - Logging out
emacs - Using the emacs text editor
cp - Making a copy of a file
chmod - Controlling access to your files
cmp - Comparing two files
compress - Compress a file
pine Using Pine to send and receive email
mush - The mush electronic mail system
talk - Talk to another user
write - Write messages to another user
ftp - Transferring files with ftp
man - Manual pages
quota v Finding out your available disk space quota
ical - Using the Ical personal organizer
finger - Getting information about a user
who - Finding out who's logged on
lpr - Printing
lprm - Removing a print job
lpq - Checking the print queues
ps - Finding your processes
kill - Killing a process
nohup - Continuing a job after logout
nice - Changing the priority of a job
& - What is a background process?
Cntrl-z - Suspending a process
fg - Resuming a suspended process

Microsoft requires Windows piracy checks

Microsoft Corp. today is expected to go live with a program requiring customers to validate that they are running legitimate copies of the Windows operating system before they can use Microsoft�s download services. The Windows Genuine Advantage 1.0 program ensures that customers using Windows Update, Microsoft Update for Windows and the Microsoft Download Center run a program that checks that their Windows operating system is genuine before they can download updates or new content from those services, said David Lazar, director of Genuine Windows for Microsoft. Until today, the program has been voluntary

Opinion: Eclipse Fails to Meet the Enterprise Java Developer's Needs

When Eclipse was first introduced, it was lauded for introducing not just an IDE but also features that promoted good development practices. Key among these were on-the-fly compilation, a stricter compiler, and most importantly, refactoring. Since then, the Eclipse community has rested on its laurels and done nothing significant to improve the IDE. Eclipse has failed to see the architectural directions that Java application development has taken. In doing so, it has let down the many Java developers who use it

Yahoo!, here we come! Konfabulator is now free

Let's just get this out of the way... Konfabulator is now free. Yup. If you download version 2.1 you know what you'll never ever see? That's right a registration reminder. Fear not, there's nothing sneaky in there, no spyware, no ads, nothing that's keeping track of information and sending it to us... it's pure, uncut Konfabulator goodness

Egg-cellent use of Java ME technology.

The Benedict County Omelete Cookoff is about to start but there is just one
problem: the cooks have no eggs! Fortunately, the hens are in full production,
but you still need to navigate the eggs through obstacle-laden fields to the
waiting fry pans. Eggciting!

A free event profiler for Java

An event profiler lets you watch the event happening while you running your code and track how often and for how long they are executed.
This is useful to help you find bottlenecks in your code.
So how do you get a free event profiler?
You download JDeveloper!"

The Thinnest, Lightest, Coolest QWERTY on the Planet


The first no-compromises QWERTY is here: the new Q from Motorola. Smart, powerful, and devastatingly good-looking, the Moto Q is the ultimate power player. The worlds thinnest, lightest QWERTY phone is a seamless fusion of QWERTY and phone delivering a fully-loaded package of email, voice, and entertainment in one amazingly rich but thin device. Like its cousin the RAZR, the Qs superior voice quality makes it a stand out from the competition

Bastard Pals

Carey and I didn't invite very many people to our wedding reception and housewarming party. We wanted to keep things small - more an intimate gathering of close friends and family than an 'invite anyone you've ever met' kind of deal. We sent snail mail invitations a month or so before-hand, though friends and family knew the date long before that.
Carey and I didn't register anywhere because we don't need anything big. Just little things like spatulas and a lamp or two (that we'd want to pick out). Just about everyone gave us checks or gift cards to places like Lowe's - even folks like my old high school chemistry teacher and golf buddy, from whom I expected nothing.
Five of my pals, however, didn't bother to get us anything. Not even a card

NSLog()

UK Wi-Fi Freeloader Arrested, Charged - First case of its kind in the UK

Just weeks after a Tampa man was arrested for accessing an unsecured wireless hotspot from the street, a similar report emerges out of the UK. According to Silicon.com, UK police have arrested a Wi-Fi freeloader, fining him £500 and sentencing him to 12 months' conditional discharge (what us Yanks call probation). It's apparently the first such case in the UK. 'Police sources said Straszkiewicz was caught standing outside a building in a residential area holding a wireless-enabled laptop,' says the report

Apache Jakarta Tomcat v5.5.10-alpha Now Available

The Apache Jakarta Tomcat team is proud to announce the immediate availability of Tomcat 5.5.10-alpha. This build contains 110 improvements, including bug fixes, enhancements, and documentation updates. There are several interesting new features, such as Apache Portable Runtime (APR)-based HTTP/1.1 and AJP/1.3 protocol handlers with SSL support, an experimental NIO-Socket channel for the AJP/1.3 connector, improved support for Java 5 using the Eclipse 3.1 JDT, clustering support at the Engine and Host levels, and more

Yahoo! acquires Konfabulator

Yahoo! Inc. on Monday will announce the acquisition of Konfabulator, a Macintosh and Windows application that allows users to run mini files known as Widgets on their desktop -- the same model used by Apple for its Dashboard application. Yahoo! company executives said they would also be giving Konfabulator away for free, completely doing away with the US$19.95 currently charged for the product.
Yahoo! said the reason they purchased Konfabulator was that they wanted an easy way to open up its APIs to the developer community and allow them easy access to the information on the Yahoo! Web site. In doing this, Widgets could be built without having to scrape sites in order to get information

Java/Swing very slow on brand new Athlon64 system

Raj Blogs: What are the different type of JDBC drivers?

There are four types of JDBC database driver:

The JDBC/ODBC bridge driver A piece of native C-code that translates a JDBC call to an ODBC call. Use this driver for development, not for industrial-strength application environments. Note that you have to have an ODBC database driver manager + an ODBC database driver installed on the server in addition to the JDBC/ODBC bridge.

Native API partly java driver A piece of native C-code that translates a java JDBC call to a native database call level API. Use this driver for development and deployment. Due to its native code, this driver can only be used by Java Applications with full computer access (i.e. not Applets).

JDBC-Net pure Java driver A piece of pure java code that translates an incoming JDBC call to an outgoing database Net protocol call (such as SQL*Net). Use this driverfor development and deployment. Flexible and powerful, this driver can be used by any Java component and requires only connect access to work.

Native protocol pure Java driver A piece of pure java code that translates an incoming JDBC call to an outgoing database native protocol call (such as Oracle CLI). Use this driver for development and deployment. This driver type is the recommended one for server-side java development unless a type 2 driver has considerable performance advantages

Nufarm's recovery plan takes the heat

Nothing spoils a techie's after-work beer faster than a phone call to say his server room is on fire. Phil Jackson was having a quiet ale with his girlfriend on a Wednesday night in May when the call came through; the building housing the server room where he worked at Nufarm's Laverton headquarters in Melbourne's west was on fire

Tuesday, July 26, 2005

Google countersues Microsoft in battle over executive

Google fought back against Microsoft this week, filing a legal motion arguing that attempts by Microsoft to prevent Kai-Fu Lee from joining Google were illegal.

Google sought to nullify a non-compete agreement signed by Lee when he worked for Microsoft. Google filed a motion in California Superior Court in Santa Clara County, Reuters said.

Lee is slated to join Google to spearhead new research and development efforts in China. Until Monday, Lee was corporate vice president of Microsoft's Natural Interactive Services Division, IDG News Service reported.

HashMap.get() can cause an infinite loop!

Yes, it is true. HashMap.get() can cause an infinite loop. Everyone I've talked to didn't believe it either, but yet there it is -- right in front of my very eyes. Now, before anyone jumps up and shouts that HashMap isn't synchronized, I want to make it clear that I know that. In fact, here is the paragraph from the JavaDocs:
Note that this implementation is not synchronized. If multiple threads access this map concurrently, and at least one of the threads modifies the map structurally, it must be synchronized externally. (A structural modification is any operation that adds or deletes one or more mappings; merely changing the value associated with a key that an instance already contains is not a structural modification.) This is typically accomplished by synchronizing on some object that naturally encapsulates the map.
Now, I've always taken that standard warning in all the Collections classes as simply stating the obvious: these data structures are synchronized and if you aren't doing your own synchronization you'll get dirty/unreliable/unknown data and/or behavior.
But never in my wildest dreams would I have thought that without proper synchronization that an infinite loop could occur!

Blogbody

FTC cracks down on email smut barons

The US Federal Trade Commission last week launched a crack down on xxx-rated spam with legal action against seven firms that have allegedly flouted laws requiring warning labels on smutty emails. Four of the seven companies agreed to pay a total of $1.159m in penalties and to abide by federal rules requiring warning labels on emails with sexually-explicit content and the US federal CAN-SPAM Act

Monday, July 25, 2005

CGIDEV2. Will it disappear for ever?

IBM's CGIDEV2 is on an accelerated collision course with destiny, sparked by the June retirement of its biggest champion, former IBMer Giovanni Perotti.
Perotti, as you may or may not know, was steward of IBM's Easy400 Web site, which provides free downloads of tools for building Web applications on your AS/400. The core of the site is CGIDEV2. But let's take it back a step.
A guy named Mel Rothman developed CGIDEV back in 1996, then enhanced it in 1999 to CGIDEV2. Perotti created the IBM Easy400 mini Web site and convinced management at the IBM Rochester Custom Technology Center to let him distribute CGIDEV2 for free.
Thousands of AS/400 developers downloaded CGIDEV2 and began building Web applications on their AS/400s, often supporting one another via the Easy400Group on Yahoo! Groups. Perotti estimates there are 17,000 Easy400 subscribers around the world, coming from 126 countries. About 7,000 are from the United States and 4,000 from Italy. 'My educated estimate,' Perotti says, 'is that at least 3,000 of them have created Web sites on the AS/400 or iSeries using CGIDEV2

Saturday, July 23, 2005

DIY Brick Pizza Oven

Open source beer

The beer is based on classic ale brewing traditions but with added guarana for added energy-boost

USB Memory Drive Projects

The USB memory key appears well on its way to replacing the floppy drive completely; as flash memory prices have dropped, these devices have become cheap enough that anyone can afford them. This, coupled with the easy support of such drives in Windows XP, has made them an extremely attractive device for anyone that needs to move files from place to place. USB memory drives are not just geek toys anymore!
As you will see here though, there's a lot more you can do with your USB memory key than just transfer files. These flexible miniature storage devices can put a whole range of portable applications, and even operating systems in your pocket.
In this guide, PCstats will reveal eleven tips, tricks and projects for getting more out of your current USB memory drives than you may have known was possible

Lego Electronic Lab Kit Main

Using LEGO bricks, soldering nails, various electronic components to build an 'Lego Electronic Lab Kit'

A Low Cost Analog and Digital TV (DVB-T) Modulator

This is not a hoax ! With a PC running Linux and a recent VGA card, you can emit a real digital TV signal in the VHF band to your DVB-T set-top box.
DVB-T emitters are usually very expensive professional devices. Now with a standard PC you can broadcast real DVB-T channels !
Examples to transmit PAL or SECAM analog signals directly to your TV are also presented.

Car Cam Project

I was bored after my finals and decided to do something fun. I had a Logitech Quickcam Express webcam for 3 years which sucked all the time. It had a very poor video quality and didnt work well in my dimmed room. So I decided to mount it in front of my car.

erinch

2005 JavaOne conference - Technical Sessions

Presentations for the 2005 JavaOne conference technical sessions. Individual session downloads are forthcoming in the next two weeks. Please check back for updates.

Advanced How-Tos
These are technically detailed sessions for experienced Java technology developers that include code examples and/or demos. These talks take deep dives into the details and inner workings of a technology or implementation. They are light on theory but heavy on practical application.

Tutorials
These talks are for developers who may be familiar with Java programming but not necessarily with the topic. These talks are typically step-by-step training sessions that take the developer through the ropes of an API, a technical standard, or a programming practice.

News from the Leading Edge
These are detailed sessions on the latest developments in evolving Java technologies and JSRs and interesting innovations on the Java platform. These talks can be explanations of specifications, frameworks, standards, and emerging technologies that are apt to be of interest to the Java technology community.

Industry Panels
This type of session consists of a set of several experts who discuss leading technologies in a lively, free-flowing format, typically with a moderator. Each session may include up to five leading vendors in a technology or vertical marketplace with differing perspectives. Panelists are expected to discuss current issues and highly technical and provocative aspects of a topic. The moderator facilitates Q&A with the audience.

Technical Case Studies
A technical case study is typically presented by a developer or architect who describes a successful implementation of a Java technology-based solution. This kind of talk usually includes explanations of what the problems were in a particular scenario and how those problems were solved, so other developers may learn from the experience.

BOFS
Birds-of-a-Feather sessions (BOFs) are sessions based on the affinity of a group for a particular topic. Smaller and more informal than technical sessions, BOFs are popular because of their interactive and flexible format. BOFs vary in style: A BOF may consist of a short presentation by the leader, followed by a general question-and-answer section. Or a BOF might be designed as an open roundtable discussion focused on a particular topic.

Gates Worries About Decline in U.S. Computer Scientists

Microsoft Chair and Chief Software Architect Bill Gates said Monday that there is a shortage of qualified computer science engineers for hire in the United States, a problem that is reflective of the decline of interest in that course of study in this country

Locating Bottlenecks in Your Code with the Event Profiler

Oracle JDeveloper has three built-in profilers that can help you fine-tune your Java application. The profilers monitor Java programs as they run, and collect information about the events and memory consumption during the execution. Using the profilers you can find bottlenecks and memory leaks resulting in improved performance for your application. In this short how-to we focus on the event profiler. This profiler provides information about the events taking place in your application when it runs

loose wire: How Long Did The 'Biggest Data Theft In History' Go Unreported?

I continue to be intrigued, but somewhat perplexed, by the CardSystems security breach that happened nearly two months ago now. Who knew it first, and who told who, and when? And why did it take so long to tell the rest of us?

News Corp to buy MySpace.com owner for $580 million

News Corp. on Monday said it would buy Intermix Media Inc., owner of the popular MySpace.com social networking site, for $580 million in a move to expand the media conglomerate's Internet offerings

Nigeria Jails Woman in $242M E-mail Fraud Case

A Nigerian court has sentenced a woman to two and half years in jail after she pleaded guilty to fraud charges in the country's biggest e-mail scam case, the anti-fraud agency said on Saturday

How is Java World Going These Days - A Summary

Bye,bye OS/2

Apache Pluto 1.0.1-rc3 Now Available

Version 1.0.1-rc3 of Pluto is principally a bug fix release. In addition it does include several administrative enhancements, including administrative portlets for managing the deployment of compliant portlet applications

New Eclipse3.1 Tutorials

Famous Hacker Magazine Shuts Down

Apple Shares Surge After Record Quarter

Shares of Apple Computer Inc. surged Thursday after the company reported its best quarterly profit ever, with revenue up 75 percent as sales of its iPod music player continue to be brisk

IBM and Zend deliver PHP-based environment

IBM and Zend on Tuesday made good on their promise made this past February to jointly deliver Zend Core for IBM, an integrated solution to developers deploy data base applications and services using the Web-based PHP language.
In a related development the two companies also announced they are jointly working to enhance PHP by including better high-level database integration frameworks and enhanced PHP-based Web services standards. In a third announcement Zend separately announced its Zend Network, a service and support system that offers enterprise-class updates and support for PHP developers.
Zend Core for IBM weaves IBM's DB2 Universal Database and Cloudscape, which is based on the Apache Software Foundation's Derby project, with Zend's open source PHP environment. By combining the two officials from both companies believe they can offer an out-of-the-box PHP development environment that makes it easier to create exploitive applications.
Zend Core for IBM is built on PHP 5 technology and has native support for XML and Web services, which IBM and Zend both contend are becoming more mainstream as corporate users gravitate increasingly to Service Oriented Architectures.
IBM?s online resource for developers can be found at www.ibm.com/developerworks/opensource/top-projects/php.html

Eclipse is still my number one.

tux

Ive spent some time with different IDEs in recent days and while the two Eclipse alternatives I tried were really, really good, they lacked one feature which for me is a deal breaker (Ill get to that shortly). The two I tried were Netbeans and IntelliJ IDEA:"

Yahoo! Mail: Revenge of the Oddpost

Yahoo! grabbed the Oddpost guys, who built an insane JavaScript client library, which they used to build a web based email client that looks like Outlook. Everyone has been wondering when their influence will be seen on Yahoo! Mail itself. They have done a couple of things, such as auto-completion of addresses, but what about the big stuff!

Man charged with stealing Wi-Fi signal - Jul 7, 2005

Police say Smith admitted using the Wi-Fi signal from the home of Richard Dinon, who had noticed Smith sitting in an SUV outside Dinon's house using a laptop computer

How much code in the browser is too much?

With the ascent of AJAX, many people are writing or considering writing more code to run in browser than they had in years. JavaScript, once left for dead as being too incompatible and impossible to debug, is now being viewed as something usable

Is modern Java-development slower?

Is all this neat programming really necessary for inhouse development? Anyway, I'm wondering, if all this innovation is so good, then why does it take so long to actually get the first screen to function properly?

JSF... My post-JavaOne impressions.

Jason

I came out of the Smackdown with the opinion that there was definitely some good stuff out there in the Web App Framework department. Tapestry, which I have heard nothing but good things about, looks outstanding. Webwork and Wicket, aside from having the most entertaining presenters (along with HMLS of course), look like they are both worth learning more about. The thing I'm most excited about though is Shale. I predict that what we will be seeing quite a bit of in the near future are Shale-based web apps leveraging JSF for the UI with the whole thing sitting on top of Spring. Time will tell of course

as simple as possible, but no simpler: Drip: IE Leak Detector

Why I Hate C++

Dont use any "fancy" Java constructs, focus on making the darned thing do something

One thing I noticed myself doing differently during my initial bit of coding... not using any "fancy" Java constructs like interfaces, abstract classes, etc. I'm just focused on making the darned thing do something. I don't want to get caught up in trying to create an elegant design the first time and getting wrapped around the axle. Rather I want to code very quickly and refactor often as I discover the domain's abstractions.

Bill Higgins

The torch passed from MTV to AOLMusic

Andy Baio has a rundown of what's cool about My Web 2.0

Thursday, July 07, 2005

Restore a Lost Status Bar

This one has been bugging me for ages on my desktop, so im really glad I found it!

When you open Windows Explorer, the Status bar may be absent even if you previously checked View | Status Bar in the menu. To make Windows remember that setting, first close all Windows Explorer windows and launch just one. Size it the way you want and put a check next to Status Bar in the View menu. Now close the window by holding down the Shift key while clicking on the X icon at top right. This also works in Internet Explorer

http://www.pcmag.com/article2/0,1759,1566680,00.asp

Many commuters killed and injured in London explosions

Many people have been killed and injured after explosions on the Underground network and a double-decker bus in London.

Saturday, July 02, 2005

Ajax Mistakes

Ajax is also a dangerous technology for web developers, its power introduces a huge amount of UI problems as well as server side state problems and server load problems. Ive compiled a list of the many mistakes developers using Ajax often make

How to Build a Telescope

This site describes how to construct two telescopes. The first one is simpler to build, but is important for understanding the solutions adopted in the second one, which is perfected and optimized for astronomical observations.

DIY Router

One of the most used things in homes, business and small offices (other than the internet) is routers. Although routers are inexpensive, you can build and configure a router for free, if you have the necessary parts"

Friday, July 01, 2005

USB Memory Drive Projects

Encryption, Firefox browser, word processing, arcade games and yes even an operating system can be run off your USB hard drive... if you know how

50 Coolest Websites 2005 - TIME.com

A better way of entering dates

Bnoopy: It�s a great time to be an entrepreneur

Its a great time to be an entrepreneur

One Bag (all about packing, luggage, and travelling light)

There's no question: overpacking easily heads the list of biggest travel mistakes. Thus this Web site, offering exhaustive (some might say exhausting) detail on the art of travelling light, living for an indefinite period of time out of a single (carry-on-sized) bag