Skip to content

Tag: Development

End your Summer with Xojo

My kids both recently finished their summer band camps. My son plays the trombone and my daughter plays the saxophone and trumpet. As one of the instructors at band camp said, even if you don’t take up a career in music, learning and playing music exercises important parts of your brain that are useful for learning other things. In fact, some have wondered if learning music helps with math skills.

I think the same thing can be said about coding. In fact, there is research that found students with computer programming skills scored higher on cognitive ability tests than students without any programming skills. Coding teaches you skills that are valuable even if you don’t plan on being a professional software developer. Being able to code means utilizing incredible attention to detail and thinking about problems abstractly, useful skills for anyone – student or professional.

Remember, Summertime isn’t just an opportunity for the kids to learn new things. You’ve still got a month of Summer left, plenty of time to expand your own skill set. While the kids are at band camp or swim camp send yourself to programming camp from the comfort of your air-conditioned home.

1 Comment

Xojo Programming Language: 6 Fascinating Facts

Xojo is similar to VB, Java and C#

The Xojo programming language is fully object-oriented and uses an object model that is quite similar to VB, Java and C#. If you are used those languages at all, you’ll be right at home with Xojo.

Available since 1998, Xojo was one of the first languages to use Automatic Reference Counting (ARC), something that other languages such as Swift and Objective-C now use. Xojo is type-safe and fully object-oriented making it easy to learn and use, but it also has advanced features such as namespaces, extension methods, exception handling, introspection, delegates and more.

Comments closed

If Smartphone Encryption Is A Red Herring, How Do We Track The Bad Guys?

In the blog post Smartphone Encryption is a Red Herring, I pointed out the folly of requiring an encryption back door for the Good Guys to use. So the question arises- “What can be done? If we don’t want a global encryption back door that can be used by anyone, can we still track the Bad Guys?”

The answer is yes. There are plenty of options that don’t require a global back door. I’m not passing judgment on whether these are inherently good or bad options, just that they are available when there is a reason to track a Bad Guy.

Comments closed

Smartphone Encryption is a Red Herring

EnigmaMachine.pngAs the Founder and CEO of a software company that makes a development tool for mobile platforms, as well as for desktop and web, I have a lot of experience with encryption. The current controversy over encryption is really important to me. During World War II, the Germans created a way of sending encrypted messages to commanders in the field. The device came to be known as an Engima machine. It looked like a typewriter but had an encryption key that changed a message into unreadable noise. That message could only be decoded if you knew the key used to encrypt it. The Allies worked very hard to get their hands on one of these devices so they could learn how it works and be able to decrypt the messages and know what the German military plans. Ultimately the Allies figured it out and it helped them win the war. If this has peaked your curiosity, check out the movie U-571 (a fictional account of the effort to obtain an Enigma machine) and The Imitation Game about the team that figured out the encryption key.

Comments closed