PHP 5.3 delivers several powerful new features to the PHP development world. Explore a few of the most notable, including namespaces, closures, and new ternary syntax.
<b>Tux Radar:</b> "To kill the time between now and the announcement of what's to come in the next version, we decided to take a look at the keywords used to describe previous Ubuntu releases to see how priorities have changed over the years"
The introduction of Project Lombok, a combination compile-time and development-time code generator, has made Java POJO verbosity history. Add Lombok to your daily coding practices, and you won't go back.
Upgrading to multi-core servers with higher performing, more efficient processors can accelerate data center ROI, saving on power and cooling, space, labor, and software licensing costs.
<b>LinuxUK:</b> "Take for instance a low powered, possibly mobile/embedded system with limited processing power and memory. A cloud based service for these devices could allow resource intensive tasks to be offloaded to an online server somewhere, greatly improving the UX"
<b>SF Gate:</b> "Police raided Gizmodo editor Jason Chen's home in Fremont, Calif. last week, seizing computers and other gadgets, as detectives probe how the gadget blog obtained an Apple iPhone prototype, which the blog first published photos and videos of last Monday."
The introduction of Project Lombok, a combination compile-time and development-time code generator, has made Java POJO verbosity history. Add Lombok to your daily coding practices, and you won't go back.
<b>LWN.net:</b> "One of the features expected with the upcoming Ubuntu 10.04 release is the Ubuntu One Music Store (UOMS). The UOMS is a mechanism by which Ubuntu users can purchase songs in the MP3 format, with some of the revenue going to support Canonical."
<b>The Register:</b> "Google's roving Street View spycam may blur your face, but it's got your number. The Street View service is under fire in Germany for scanning private WLAN networks, and recording users' unique Mac (Media Access Control) addresses, as the car trundles along."
Three Spanish hackers believed to be responsible for using a botnet to steal log-in credentials and customer banking data were arrested following a multinational investigation.
<b>Netstat -vat:</b> "With VP8, the promise from Google is a video codec on par with H.264 that will be available royalty-free. It's a good idea, but there might be a problem."
Adobe Acrobat and Reader PDF applications are vulnerable to a new attack that relies on social engineering to trick users into clicking on something they shouldn't.
Sometimes knowing who, what, where, and when is not such a good thing. Security consultant Diana Kelley explores the dangers of geo-location to your business's information security.