Forgot your password?
typodupeerror
IOS

7 Swift 2 Enhancements iOS Devs Will Love 123

snydeq writes: InfoWorld's Paul Solt outlines how Apple has made good on Swift's emphasis on performance, approachability, and ease in its latest update, offering up seven worthwhile enhancements to Swift 2, along with code samples. 'Many of the enhancements to Swift, through both the Swift 2.0 update and subsequent Swift 2.1 update, have made the language more explicit and intentional, and in turns, Swift 2 code will be safer and easier to maintain for years to come (especially now that Swift is open source). New language constructs (keywords) in Swift 2 improve the readability of control flow — the order in which lines of code are executed. Thanks to these new keywords, collaborating on Swift code will be much more productive and efficient.'

Submission + - Following the Chain - RFCs to Laws

AlexNicoll writes: "I recently completed a DNSSEC library for the .NET platform (thanks to Wouter @ NLNetLabs for his help!). While writing the library, I encounted the extremely entertaining concept of following the long chain of DNS related RFCs on the IETF website. Some RFCs were obsoleted, some were updated, some updates were obsoleted by other articles, and some were never really formally related or linked, so even finding them was a challenge in search-fu. Finally, I think I got the whole picture, but I'm not sure. Then I got to thinking — searching for the relevant RFCs in the IETF RFC chains was a lot like trying to figure out how (in the US) local, regional, state, and federal laws interact with themselves and each other. Since I just recently moved, I thought I ought to know the rules of the place I live in. It turns out to be just as non-trivial, if not more so, than parsing RFC chains. So here's the question — given that the processes are somewhat similar, does anyone know of a project that has tried to consolidate all the information in one place, so that it's in one comprehensive and up-to-date document, on the legal side or the RFC side?"

Submission + - Red Hat Prevails Against Patent Troll Acacia (marketwatch.com)

walterbyrd writes: Red Hat, Inc., the world's leading provider of open source solutions, announced that today a jury in federal court in Marshall, Texas, returned a verdict in favor of Red Hat, Inc. and Novell, Inc. in a case alleging patent infringement brought by IP Innovation LLC, a subsidiary of Acacia Research Corporation and Technology Licensing Corporation. The patents at issue were found to be invalid and worthless.
Australia

Submission + - AU govt to introduce filter legislation after all (smh.com.au)

Dracophile writes: Contrary to yesterday's article about The Australian newspaper's report that the Australian government had put on the back-burner their plans to introduce the internet filter legislation before the next election, The Sydney Morning Herald reports that the government rejected claims that it had abandoned such plans, and that "a spokeswoman for Communications Minister Stephen Conroy said the government remained committed to the policy". Unless the Australian Labor Party abandons the plan altogether, will the timing make any difference to voters?

Submission + - Mechwarrior 4 Free Release now available (mektek.net) 1

Mr. Sketch writes: "Finally, the long awaited moment has arrived!

Studio MekTek, in association with Smith and Tinker, INC., Virtual World Entertainment, LLC, Catalyst Game Labs, and Microsoft Games, is happy to announce the release of Mechwarrior4 Free.

Getting started is easy. Just download and install MTX, MekTek's free content delivery and updating system. Once installed, simply click the Games Available tab, select Mechwarrior4: Mercenaries and click install. The game will download and install, all within MTX, and as updates become available, MTX will help you keep your game up to date."

Comment Re:EAL6 + EAL4 = ?? (Score 1) 352

I see what you're saying, but if those multiple instances need access to the same data - say, avionics, the data is vulnerable at the risk level of the lowest assured entry point. The weight option is a given, you are correct - but them having a really, really, secure VM implementation doesn't make the multiple windows implementations running on them any more secure. If that were the case, why didn't the NSA stop with NetTop, and not bother pursuing the High Assurance Platform?

Comment EAL6 + EAL4 = ?? (Score 1) 352

This is silly. It is an EAL6+ operating system that will host EAL4+ guest operatnig systems, probably so that someone can actually do something useful with it. So, can someone explain to me how the data in that EAL4 operating system isn't vulnerable to a casual/incidental attacker? How does running a vulnerable OS on an invulnerable OS make the vulnerable one any safer? (I have the same problems with people claiming VMWare makes them more secure...)

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...