As the Founder and CEO of a software company that makes a development tool for mobile platforms, as well as for desktop and web, I have a lot of experience with encryption. The current controversy over encryption is really important to me. During World War II, the Germans created a way of sending encrypted messages to commanders in the field. The device came to be known as an Engima machine. It looked like a typewriter but had an encryption key that changed a message into unreadable noise. That message could only be decoded if you knew the key used to encrypt it. The Allies worked very hard to get their hands on one of these devices so they could learn how it works and be able to decrypt the messages and know what the German military plans. Ultimately the Allies figured it out and it helped them win the war. If this has peaked your curiosity, check out the movie U-571 (a fictional account of the effort to obtain an Enigma machine) and The Imitation Game about the team that figured out the encryption key.
Comments closedYear: 2016
Paul talks with Arthur Couture and Tom Rupprecht of ICAL Systems, a consulting company that does enterprise software development using Xojo.
Comments closedIf you work in the technologiy industry, I’m sure you’ve heard of the Daily WTF site. Their fun stories about technology gone wrong makes it one of my favorite web sites.
Comments closedAs defined on Wikipedia, Automatic Reference Counting (or ARC) is a “memory management enhancement where the burden of keeping track of an object’s reference count is lifted from the programmer to the compiler.”
With object-oriented programming, each new object you create takes up space in memory. This memory needs to be managed somehow. In the beginning, this management of memory was left entirely to the programmer, such as with C++ or originally with Objective-C.
Comments closedWhat is Slackbot?
Slack has an API called “slash commands” that lets a user type a slash (/) followed by a command name in order to perform a special action. For example, Slack has many built-in slash commands, one example is /help. Here’s how you can easily add your own slash commands using a Xojo web app and the HandleSpecialURL (or HandleURL) method.
Your slash command makes an HTTP request to your Xojo web service app. The web services does its thing and then returns the result back to Slack to display.
Comments closed
Are you a consultant that uses FileMaker to create solutions for your clients? Do you work in an office and use FileMaker to run your company’s business?
Comments closedOn Tuesday, January 12th Microsoft is ending support for Internet Explorer 8, 9 and 10.
Comments closedAt Xojo, we work with a lot of HTTP REST APIs. So many in fact that I’ve spent time creating custom test harnesses to make sure that whatever I was currently coding would be compatible as well as being a test suite just in case the API changed in some subtle way (whether it be a bug fix or an API refactor gone awry). The problem with the custom test harnesses is that they’re not very portable and you end up having to create a new one for each API that you interface with.
Comments closedBy default the built-in Web Browser that is used on Windows to show web pages uses the Internet Explorer 7 rendering engine. Which means the Xojo HTMLViewer and the ActiveX WebBrowser controls also use this older rendering engine.
Comments closed