Programming News and Views
Send your programming press releases, news items or comments to: NewsDesk@i-programmer.info
Microsoft Open Sources WCF
May 22 | Mike James
A new version of WCF that targets .NET Core has been donated to the family of .NET Foundation open source projects.
Powerful New Features For Edison
May 21 | Harry Fairhead
Intel has updated the firmware and software for its Edison IoT device. The new features open up the potential for what you can do with this embedded microcontroller.
Software Gives Centimeter Positioning With Phone GPS
May 21 | Mike James
It is a little known fact that GPS can provide much more accurate positioning, although only if you provide a big enough antenna. This isn't a reasonable proposition for most applications, but now we have an algorithm that can extract the extra accuracy using nothing but a standard mobile phone aerial.
Web Design Course From Code School
May 21 | Sue Gee
Code School has added a course on website design to its growing list of "learning by doing courses". It also has a time-limited offer for those who want to try the wider range of courses from its parent company, Pluralsight.
Microsoft Tears Node.js From V8
May 20 | Mike James
Computer Visionary Alan Kay Turns 75
May 20 | Historian
Alan Kay, the computer visionary whose Dynabook concept was a futuristic idea in the 1970s of the sorts of devices we now use, celebrates his 75th birthday this week.
Time-Lapse Videos From Internet Photos
May 19 | David Conrad
Computational photography is approaching the status of magic. Imagine amassing photos from all round the world taken by different people at different times and putting them together to make time-lapse videos of popular locations. You don't have to imagine because Google together with the University of Washington has done it.
Software Quality Blamed For Airbus Crash
May 19 | Alex Armstrong
After a fatal crash of an A400M troop and cargo transport plane last week, Airbus has asked its military customers to conduct checks of the software in the electronic control unit (ECU) of the engines.
NAG Library Extended
May 19 | Alex Armstrong
The Numerical Algorithms Group (NAG) has released an updated version of its library of mathematical and statistical routines. Mark 25 adds more than 80 additional routines, bringing the total to over 1800.
May 18 | Alex Armstrong
Python 3 For Science - A Survey
May 18 | Janet Swift
Python is a popular language for science - but the scientific community seems to be happy with Python 2 and reluctant to progress to Python 3 as revealed by a new survey.
Rust Hits Stable 1.0 - So What?
May 18 | Mike James
Rust is Mozilla's attempt at creating a system programming language to replace C and C++. It has now reached a stable version 1 and it is time to ask if there is any reason to take notice.
Earn United Airlines Award Miles For Finding Bugs
May 17 | Sue Gee
A new Bug Bounty program has been launched. Instead of cash United Airlines is offering Award miles in return for finding vulnerabilities. But looking for ones in on-board systems or avionics is strictly off limits.
Microsoft Hyperlapse Ready For Use
May 16 | David Conrad
Have you ever wished you could take the bumps, shakes and the boring bits out of your videos? Now you can with Hyperlapse, a technology developed by Microsoft Research's Computational Photography Group.
May Week 2
May 16 | Editor
If you want to get up to speed on stuff that affects you as a developer, I Programmer Weekly is a digest of book reviews, articles and news written by programmers, for programmers.
May 15 | Ian Elliot
|More Recent News||
Book Review Of The Day
D3.js in Action
Wednesday 20 May
Author: Elijah Meeks
Reviewer: Ian Elliot
Alan Kay is perhaps the best known computing visionary - but what was his vision of?
The Greeks, George Boole and Prolog
Alex Armstrong & Mike James
Logic isn't the most exciting of subjects and you might think that it had its day with the Greeks, but you would be wrong. Logic isn't just part of programming, it can be all of it!
The Trick Of The Mind - Programming & Algorithmic Thought
This introductory chapter of our new ebook on the nature of programming is aimed at programmers and non-programmers alike. If you can't program then find out why you should learn. If you can program then find out why what you do is special and how it is a generally applicable thinking style.
Exploits of a Mom
Click to view bigger version
This is a classic xkcd and it is featured here just to make sure you know it. And have we learned to sanitize our database inputs?
More cartoon fun at xkcd a webcomic of romance,sarcasm, math, and language
Follow Book Watch on Twitter
Learning AngularJS (O'Reilly)
Friday 22 May
The Gourmet iOS Developer's Cookbook (Addison Wesley)
Thursday 21 May
Offers a fresh banquet of delicious cutting-edge iOS programming recipes for projects both big and small. Renowned iOS programming expert Erica Sadun presents innovative ways to make the most of AVFoundation, Text Kit, animation, adaptive interface programming, with code for creating rich, robust. apps. As with her other iOS titles, this pragmatic guide translates modern best practices into working code, distilling key concepts into recipes you can understand and build on.
Designing for Performance (O'Reilly)
Wednesday 20 May
As a web designer, you encounter tough choices when it comes to weighing aesthetics and performance. Good content, layout, images, and interactivity are essential for engaging your audience, and each of these elements have an enormous impact on page load time and the end-user experience. In this practical book, Lara Hogan helps you approach projects with page speed in mind, showing you how to test and benchmark which design choices are most critical.
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails (Wiley)
Tuesday 19 May
Christopher Hadnagy and Michele Fincher address the growing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision–making and the impact of deliberate influence and manipulation on the recipient. Usinf detailed examples provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e–mail or cloned website.
Automate the Boring Stuff with Python (No Starch Press)
Monday 18 May
Described in its subtitle as "Practical Programming for Total Beginners" this is a book for non-programmers. In it Al Sweigart shows how to perform tasks that take hours to do by hand, such as renaming files or updating spreadsheet cells, with Python programs. Step-by-step instructions walk you through each program, and practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks. As the blurb puts it, don't spend your time doing work a well-trained monkey could do. Even if you've never written a line of code, you can make your computer do the grunt work.
In Search of Certainty: The Science of Our Information Infrastructure 2nd Ed (O'Reilly)
Friday 15 May
Quite soon, the world’s information infrastructure is going to reach a level of scale and complexity that will force us to approach it in an entirely new way. The familiar notions of command and control are being thwarted by realities of a faster, denser world of communication where choice, variety, and indeterminism rule. The myth of the machine that does exactly what we tell it has come to an end. Mark Burgess focuses on the impact of computers and information on our modern infrastructure going from the roots of science to the principles behind system operation and design. To shape the future of technology, we need to understand how it works—or else what we don’t understand will end up shaping us.
Fast Data Processing with Spark 2nd Ed (Packt)
Thursday 14 May
This step-by-step tutorial from Krishna Sankar and Holden Karau is for software developers who want to learn how to write distributed programs with Spark. In it you will develop a machine learning system with Spark's MLlib and scalable algorithms and deploy Spark jobs to various clusters such as Mesos, EC2, Chef, YARN, EMR, and so on. No previous experience with distributed programming is necessary. However it assumes knowledge of either Java, Scala, or Python.
The Mobile Application Hacker's Handbook (Wiley)
Wednesday 13 May
A practical guide to securing all mobile applications by approaching the issue from a hacker′s point of view. Dominic Chell, Tyrone Erasmus, Shaun Colley and Ollie Whitehouse provide expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross–platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.
Previous Book Watch.
Follow Book Watch on Twitter.
Publishers send your book news to: