How do you format and organize your code? I’m here to tell you that your way is wrong and my way is right 🙂
Comments closedTag: Development
In the blog post Smartphone Encryption is a Red Herring, I pointed out the folly of requiring an encryption back door for the Good Guys to use. So the question arises- “What can be done? If we don’t want a global encryption back door that can be used by anyone, can we still track the Bad Guys?”
The answer is yes. There are plenty of options that don’t require a global back door. I’m not passing judgment on whether these are inherently good or bad options, just that they are available when there is a reason to track a Bad Guy.
Comments closedAs the Founder and CEO of a software company that makes a development tool for mobile platforms, as well as for desktop and web, I have a lot of experience with encryption. The current controversy over encryption is really important to me. During World War II, the Germans created a way of sending encrypted messages to commanders in the field. The device came to be known as an Engima machine. It looked like a typewriter but had an encryption key that changed a message into unreadable noise. That message could only be decoded if you knew the key used to encrypt it. The Allies worked very hard to get their hands on one of these devices so they could learn how it works and be able to decrypt the messages and know what the German military plans. Ultimately the Allies figured it out and it helped them win the war. If this has peaked your curiosity, check out the movie U-571 (a fictional account of the effort to obtain an Enigma machine) and The Imitation Game about the team that figured out the encryption key.
Comments closedDid you know that you can create scripts to control the Xojo IDE? And many of these scripts could be real time savers.
Comments closedPasswords are a problem, as we frequently see in the news when databases containing password and login information are hacked and exposed.
Though too much security is never enough, as developers, there are things we can do to keep our users’ passwords secure.
Comments closedThese days, businesses need to adapt to changes quickly and they need their software to do the same. They need it developed and updated in less and less time. This speed and adaptability is key to what Rapid Application Development tools offer developers.
Comments closedThis year’s Xojo Developer Conference was in Xojo’s hometown of Austin, Texas, at the newly renovated Radisson on Lady Bird Lake in Downtown.
Comments closedSQLite has the ability to do full text searching and this feature is available with Xojo. Read on to learn how to best use it!
Comments closedGood bug reports are like art or great code. Often you can’t say specifically what it is about the piece of art that appeals to you, or what makes a certain piece of code great- but you know them when you see them.
Comments closedNow that you have tried Xojo, you’re probably thinking of creating stand-alone apps. Maybe you are considering selling your app or maybe you just want to share your app with some friends.
So now you are ready to build and deploy your apps, and to do that you need a Xojo license. No problem, Xojo has a straightforward licensing scheme.