Skip to main content

Posts

What will software engineering be like in 2022?

The proliferation of languages and frameworks makes it unnecessarily difficult to choose a technology stack and makes it unnecessarily difficult for developers to choose which skills to learn. This is not good for the industry. There will be consolidation around frameworks and libraries. We have seen too many slightly different variations of the wheel being invented. Innovation would be better focused on improving and extending a few major frameworks and libraries (for example, React and Angular in the Web space) than writing new ones. There will be consolidation around languages. We don’t really need more than two variations on JVM languages, for example. My picks would be regular Java and Scala. Tried and true software engineering practices like type safety will come back into fashion because they actually help when building large software systems. This implies that TypeScript will overtake plain-old JavaScript in serious Web development and, hopefully, Scala or some other lan...
Recent posts

Can I use a computer without a RAM?

Contrary to popular belief, yes you can. In fact, many existed and did very important. Perhaps one of the most well known is the ENIAC (Mauchly pronouned it En-ee-ack not EEn-ee-ack who can argue with its primary designer?). ENIAC The ENIAC had flip-flops stored in a ring counter that accumulated (or counted) pulses sent to it. Each ring had ten flip-flops that represented a value from zero (0) to nine (9) and there were ten rings in order to store ten digits (range is 0 to 9,999,999,999). One last flip-flop stored the sign. Each of the cabinets above that the ladies are busy programming (yes they are) is essentially analogous to a CPU accumulator which was an early type of register that always added the number it stored to anything “moved” or “stored” into it. Each cabinet has a complete circuit of 10 ring counters (later 20 digits). The ENIAC was a digital computer but not a binary computer as it used base ten. Programming the ENIAC involed using a portable function table ...

How can someone hack a cellphone?

Operating system flaws Despite the best intentions of smartphone manufacturers, vulnerabilities are found which could let attackers in. "We see that the average ratio is that more than one vulnerability being publicly disclosed every day, and 10 percent of those are critical vulnerabilities, vulnerabilities that allow someone remotely to gain access to your device and control it," Sharabani said. Device manufacturers release operating system updates frequently to protect users. "All of those updates have really important security fixes in them and people are worried well maybe this is going to impact how I use my phone or maybe my phone isn't compatible. They need to apply those updates as soon as they come out," said McGeorge. Experts advise you install operating system updates as soon as they are available. Once updates are released, hackers know about vulnerabilities and attempt to breach out-of-dates device. Malicious apps Applications add...

Can a Facebook account be hacked?

Top 15 Ways How Hackers Hack Facebook Accounts #1 Hack Facebook Account Password By Phishing : Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In simple phishing attacks, a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim logs in through the fake page the, the victims “Email Address” and “Password” is stored into a text file, and the hacker then downloads the text file and gets his hands on the victim’s credentials. How To Avoid Phishing Attacks Never Login your Facebook account on other devices Use Chrome, it identifies the phishing page. Avoid emails that ask you to log in your facebook account #2 Hack Facebook Account Password By Keylogging : Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers...

Between Java and Python, which one is better to learn first and why?

Python. Don’t even think about it to select another language as your first. Why? Well, Python is  easy.  Trust me on this one. My first major language was C++ and it lead me to contemplating suicide. Here’s a short snipped of C++ code for displaying “Hello world” on the screen - #include <iostream> using namespace std ; int main () { cout << "Hello world!" << endl ; return 0 ; } Here’s the same thing in Python print ( "Hello world!" ) Python is dynamically typed. What in the world is that? Okay, so computers are dumb. They aren’t smart enough to know that  [math]1[/math]  is a number, or specifically, an integer and that “hello” is a word or “string” in computer talk. So because of that some programming languages needed to specify the kind of stuff they were working with. For example if you needed to add two numbers in Java, here’s what you’ll have to do - class AddNums (){ public static void mai...

How long would humans survive if the sun disappeared?

Well, we wouldn't die instantly. We already survive every day for 8-16 hours without the sun (depending on the season and location). I'm assuming the intent here is to ask what would happen if the sun were to just suddenly cease to exist entirely. In that case, it would take about 8 minutes for anything to happen to us, since the sun's light and gravity both propagate at that speed. At that point the Earth and moon would just continue on in a straight line, no longer in orbit around the sun. Losing the sun's pull might have some nasty effects on plate tectonics, but I'm not sure about that. The earth would slowly begin to cool. It wouldn't be instantaneous; the atmosphere does a decent job of retaining heat for a time. How long you have here depends on the climate and season where you are. If it's the dead of a snowy winter, temperatures would become nearly unbearable in 24-48 hours. If it's summer, you might have several days. This alone ...

How to crack WinRAR password?

there are a number of different applications, some free but most for a small price, to crack document passwords. Something to keep in mind though, is that a RAR file uses substantially more complicated encryption type by default, such as AES-256. Whereas a zip file, only in recent years, even has actual encryption on their files. Zip 1.0 ‘encryption’ was pretty much just a flag set saying not to open unless they put in a password. This was known as a vulnerability of the worst kind. You could just instantly unlock it with a tiny free application. Now it’s a bit more complicated, because depending on what you use to create a zip file, you can set all sorts of encryption options if you want, even though the defaults are fairly weak encryption. A RAR file generally uses AES-256 encryption by default, and allows for any number of mind numbing alterations to it. Furthermore, any vulnerabilities found in RAR encryption over the years have been corrected by an active team, where as zip...