March 12, 2015

Telerik Targets Cross-Platform Mobile with New NativeScript Project
Product manager Valio Stoychev said his favorite part of the NativeScript project was the library support, a feature also highly touted by coders taking part in the NativeScript Insiders beta experience. "We provide you with support for third-party native libraries out of the box," Stoychev said. "This is a huge thing. You'll be able to use any native Java or Objective-C library in your NativeScript project." While NativeScript aims to provide full code reuse for most situations, Telerik acknowledges some projects might require writing native code. "The answer to how NativeScript invokes native code again lies in the JavaScript VM APIs," said developer evangelist TJ Van Toll in a February blog post explaining How NativeScript Works.


IoT Adds New Wrinkle To MDM, BYOD
Every year, CIOs and IT managers are confronted with an ever increasing number of mobile devices used by their workers within their enterprises. In addition, these employee-owned devices are used to access, store, and work with corporate data, creating a huge potential for cybertheft. Now, however, it's not just smartphones. Executives and employees have access to a wide array of tablets, laptops, smartwatches, and Android Wear gadgets, as well as a growing number of devices that can be categorized as the Internet of Things. Mobile Device Management (MDM) has grown to a $2 billion industry in just a few years, and it's expected to grow to $4 billion by 2019.


Bidding farewell to Google Code
As developers migrated away from Google Code, a growing share of the remaining projects were spam or abuse. Lately, the administrative load has consisted almost exclusively of abuse management. After profiling non-abusive activity on Google Code, it has become clear to us that the service simply isn’t needed anymore. Beginning today, we have disabled new project creation on Google Code. We will be shutting down the service about 10 months from now on January 25th, 2016. Below, we provide links to migration tools designed to help you move your projects off of Google Code. We will also make ourselves available over the next three months to those projects that need help migrating from Google Code to other hosts.


20 years of a World Gone Digital
Here are some reflections on twenty years of a World gone social and digital, triggered by the fact that I passed the anniversary of my 8th year on Twitter at the weekend. Coincidentally, 14 February was the same day YouTube came in to being 10 years ago in 2005. It started me thinking about how so much of the social networking and mobile communications fabric that has changed our World and way of living and working so dramatically, only came in to being in the last 10 or 11 years. First let me say something about my 8 years living with Twitter. I’m a huge fan and a regular exponent. For those 3000 or so days I’ve tweeted on average more than 7 times a day.


Why IAM is topping security investments in 2015
Analyst and director at research firm Quocirca, Bob Tarzey, said IAM is key to implementing all IT security. “An increasing focus on IAM deployments is to extend them to outsiders and broaden the scope of access controls,” he said. According to Tarzey, this often means interfacing to multiple sources of identity or federating identity management.“This may well be the reason the UK is making IAM a higher priority than other European countries as UK organisations often take a lead in moving to online interaction with their customers,” he said.


Academic Study: Don't Bother To Refactor Code for Quality
The researchers defined refactoring as "the process of improving the design of existing code by changing its internal structure without affecting its external behavior, with the main aims of improving the quality of software product." "This study [indicates] that refactoring does not improve the code quality," concluded Sandeepa Harshanganie Kannagara and Dr. W. M. Janaka I. Wijayanayake in a reportpublished in January, titled "An Empirical Evaluation of Impact of Refactoring on Internal and External Measures of Code Quality." One measurement, however, indicated an improvement in a metric called the "maintainability index," which logically follows since refactored code should be easier to analyze and understand by humans and thus be easier to maintain.


How Do You Grade Out as a Negotiator?
"People do not do a good job learning from their experience," he says. "Some have gotten better about preparing for negotiation, but afterwards, they let the after-action review drop. It's all fine to read books and take courses, but we have this rich negotiation experience, and if we could tap it and analyze it in a meaningful way, it could lead to more improvement." With that in mind, Wheeler conceived of a new mobile app, Negotiation 360, which would supplement books and training courses to help people track their own negotiating experience. "A book is very linear," he says. Negotiation 360, by contrast, "is a template or matrix a user can make his or her own. It becomes their negotiating buddy."


How to break into the mobile app business with little cash and no programming skill
What if you're the one with the blockbuster idea and I, jaded old-school software entrepreneur that I am, just don't see it? In this article, I'm going to take you through the steps you need to get an app up on the Android and Apple app stores. I'll outline tools, resources, and steps you'll need to take. I'll even show you some tricks for building your own apps without any programming skill whatsoever. Whether you make any money is out of my hands. At least you'll have a starting point. Over the next weeks, I'll write more about how to really understand the software business. But for those of you who are impatient to get started, here's what you need to do.


Lawsuit seeks damages against automakers and their hackable cars
The suit claims that vehicles without proper electronics safeguards are "defective" and worth far less than similar non-defective vehicles and seeks unspecified monetary damages and injunctive relief. ... The lawsuit claims hackers could access ECUs on a vehicle's CAN bus and take control of basic functions such as braking, steering and acceleration, "and the driver of the vehicle would not be able to regain control. "Disturbingly, as defendants have known, their CAN bus-equipped vehicles for years have been (and currently are) susceptible to hacking, and their ECUs cannot detect and stop hacker attacks on the CAN buses. For this reason, defendants' vehicles are not secure, and are therefore not safe," the lawsuit states.


What Do We Know about Software Development in Startups?
In the startup context, customers often steer requirements, and developers must be ready to embrace change from day one. The use of architecture and design patterns to make features modular and independent is crucial when functionality is continuously updated or removed. Therefore, employing architectural practices and frameworks that enable easy extension of the design can dramatically benefit the alignment between the product and market uncertainty.9This requires some upfront effort but can prevent the growth of product complexity. Scientific evidence also points to the advantages of constant code refactoring. Reimplementing the whole system might be costly and risky if it must be immediately scalable to a growing number of users.



Quote for the day:

“A successful person is one who can lay a firm foundation with the bricks others have thrown at them" -- David Brinkley

No comments:

Post a Comment