[author : Jonathan Erickson] #Edito
To everyone's delight, it's back-to-school time.
[author : Michael Swaine]
Over the last half century, AI has had its ups and down. But for now, it's on the rise again.
[author : Daniel Stoleru]
Bit-Plane Complexity Segmentation lets you embed large amounts of data in images.
[author : Mohamed Abo El-Fotouh and Klaus Diepold]
To protect the confidentiality of data on hard disks, Windows Vista uses Bitlocker Drive Encryption, which is based on the AES-CBC + Elephant diffuser algorithm.
[author : Kirk J. Krauss]
In an ideal world, your programs gracefully handle out-of-memory conditions and keep running. But in the real world...
[author : Josh Reed]
PSICAT is an open-source, cross-platform Java tool for creating, viewing, and editing geological core description diagrams.
[author : Petru Marginean]
Logging is a critical technique for troubleshooting and maintaining software systems. Petru presents a C++ logging framework that is typesafe, thread-safe, and portable.
[author : Herb Sutter]
A "critical section" is a region of code that executes in isolation with respect to some or all other code in the program.
[author : Scott W. Ambler]
Scott argues that Agile is a discipline that requires discipline.
[author : James Reinders]
James shares his 8 rules for parallelization on multicore processors.
[author : edited by Michael Swaine]
Good tools and strong teams lead to top-notch software development projects.
[author : compiled by the DDJ Staff]
New development products and new releases of existing ones.
[author : Deirdre Blake]
Matt Moynahan defines on-demand security and examines the binary-code versus source-code analysis in terms of security.
[author : Michael Swaine]
Here are Michael's candidates for Microsoft's greatest hits of 2007.