Most of us build apps without thinking too much about how much memory the app will need. Sure sometimes you end up creating an app that is a real memory buster but that’s unusual. With virtual memory, gone are the days when your app would just run out of memory and crash, or are they?
Comments closedXojo Programming Blog Posts
While Xojo doesn’t currently provide a direct way of recursively deleting a folder, there are various options that will allow you to do this:
1. Recursively iterate through all the folders, deleting each one. You can read about that at our Developer Site, this is the best cross-platform way.
2. Use the Shell to recursively delete a folder (i.e. “del /s” on Windows, or “rm -rf” on OS X and Linux)
Windows specific ways:
3. SHFileOperation (an older API)
4. IFileOperation (the more modern API that Windows recommends over option #3)
I’ve decided to look at option #4, since this allows more customized options, like the ability to show a progress dialog. However, it is also the slightly more complicated option since it deals with COM & Delegates. The example illustrates this:
Comments closedPaul talks with Tim Parnell, creator of several Xojo add-ons and active Xojo forum contributor.
To listen to this podcast, download the mp3 now.
Comments closedMaybe you’ve heard the term SQL injection and how it can allow unintended database access. Here’s how a SQL Injection works and what you can do to avoid it.
1 CommentA couple years ago I wrote a post about Going Rogue with Xojo. It proved to be rather popular and I got some great stories back from how people were able to use Xojo in their organizations.
Comments closedHow do you format and organize your code? I’m here to tell you that your way is wrong and my way is right 🙂
Comments closedIn the blog post Smartphone Encryption is a Red Herring, I pointed out the folly of requiring an encryption back door for the Good Guys to use. So the question arises- “What can be done? If we don’t want a global encryption back door that can be used by anyone, can we still track the Bad Guys?”
The answer is yes. There are plenty of options that don’t require a global back door. I’m not passing judgment on whether these are inherently good or bad options, just that they are available when there is a reason to track a Bad Guy.
Comments closedAs the Founder and CEO of a software company that makes a development tool for mobile platforms, as well as for desktop and web, I have a lot of experience with encryption. The current controversy over encryption is really important to me. During World War II, the Germans created a way of sending encrypted messages to commanders in the field. The device came to be known as an Engima machine. It looked like a typewriter but had an encryption key that changed a message into unreadable noise. That message could only be decoded if you knew the key used to encrypt it. The Allies worked very hard to get their hands on one of these devices so they could learn how it works and be able to decrypt the messages and know what the German military plans. Ultimately the Allies figured it out and it helped them win the war. If this has peaked your curiosity, check out the movie U-571 (a fictional account of the effort to obtain an Enigma machine) and The Imitation Game about the team that figured out the encryption key.
Paul talks with Arthur Couture and Tom Rupprecht of ICAL Systems, a consulting company that does enterprise software development using Xojo.
Comments closedIf you work in the technologiy industry, I’m sure you’ve heard of the Daily WTF site. Their fun stories about technology gone wrong makes it one of my favorite web sites.
Comments closed