background preloader

How to be a Programmer: A Short, Comprehensive, and Personal Summary

How to be a Programmer: A Short, Comprehensive, and Personal Summary
Debugging is the cornerstone of being a programmer. The first meaning of the verb to debug is to remove errors, but the meaning that really matters is to see into the execution of a program by examining it. A programmer that cannot debug effectively is blind. Idealists that think design, or analysis, or complexity theory, or whatnot, are more fundamental are not working programmers. The working programmer does not live in an ideal world. Even if you are perfect, your are surrounded by and must interact with code written by major software companies, organizations like GNU, and your colleagues. Debugging is about the running of programs, not programs themselves. To get visibility into the execution of a program you must be able to execute the code and observe something about it. The common ways of looking into the ‘innards’ of an executing program can be categorized as: Some beginners fear debugging when it requires modifying code. How to Debug by Splitting the Problem Space

http://samizdat.mines.edu/howto/HowToBeAProgrammer.html

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.

Sign In Don't have a Microsoft account? Sign up now Microsoft account What's this? Email or phone Password iPhone review, part 3: Apps and settings, camera, iTunes, wrap-up Sporting a bubbly, iChat-like interface, the SMS app mercifully threads messages, an idea Palm hatched for its Treo devices many moons ago. Users of the threaded setup became immediately addicted to it, making it difficult to move back to plain old flat SMS (darn you, Palm!) and leaving us wondering why other manufacturers didn't follow suit. Granted, the inherent 160-character limit and sometimes exorbitant per-text rates have always left traditional SMS with a paper disadvantage against data-based instant messaging, but ultimately the Short Message Service's worldwide ubiquity has crowned it the "killer app" for mobile textual communication anyway. So why not make it all purty? Indeed, if we had to boil the iPhone's SMS down to a one-word description, "purty" would certainly be a finalist.

C++ Programming/Exercises/Iterations Iterations[edit] Solutions requirements Solutions must: Use only standard C++.Be compilable.Be in accordance to general coding practices. (no esoteric demonstrations are required) Develop > CSS - .net magazine net magazine is the number one choice for the professional web designer and developer. It’s here that you find out about the latest new web trends, technologies and techniques – all in one handy package. Each issue boasts a wealth of expert tips and advice, including in-depth features and over 30 pages of advanced front- and backend tutorials on subjects as diverse as CSS, HTML, JavaScript, WordPress, PHP, and plenty more.

Information Security Policies and Procedures Part 3 This is part of an ongoing series on documentation development. Please be sure to read the previous posts in this series: Part 1 Part 2 While we are still at the beginning stages of preparing to develop policies, procedures, and related documentation, it is important to mention a few things not to do: Do Not Repurpose/Borrow the Work of Others Search engines are great, and place a vast body of human knowledge at your fingertips. This vast knowledge often includes the intellectual property of others.

How To Choose A FlatteringHaircut www I recently received an email from my friend who is getting her hair cut tomorrow afternoon & wanted to know how to choose a good haircut. She said: It might follow on from your recent mention of your own haircut… Stuff I love: Muji Chronotebook — jackcheng.com Start with the simplest thing imaginable: a blank sheet of paper. Add a rows of lines and it becomes a notebook. Add a grid instead and it becomes an drawing pad for architects. Add a few tiny boxes and it turns into a to-do list. Put in dates and you’ve got a calendar. But as they teach you in your high-school econ class, everything has a cost. Information Security Policies and Procedures Part 4 This is part of an ongoing series on documentation development. Please be sure to read the previous posts in this series: Part 1 Part 2 Part 3 The formatting and structure of documentation may not seem like the most enthralling topic, and in many (most) ways it is not. It is however one of the most important elements of effective documentation. Delivering information in a clear and consistent way is essential to ensure documents are easy to use and effective.

More on Planning I’ve received some questions (both publicly and privately) about the Oct 11 entry on planning, so I think a follow-up is in order to address them…. Planning is such hard work. And it’s hard to keep plans up to date. So why do it? DiGiovanni : Web Development with SharpDevelop, Web Matrix, and Visual Studio.NET 2003 makes development a whole lot easier than it ever was before. But what if you have to develop a web application and you do not have the power of VS.NET 2003 available to you? I would hate to be without Intellisense (I’m spoiled), debug support, and many of the other features that VS.NET 2003 provides. There is a way to accomplish this developmental challenge with the following three tools:

Information Security Policies and Procedures Part 5 This is part of an ongoing series on documentation development. Please be sure to read the previous posts in this series: Part 1 Part 2 Part 3 Part 4 In this installment, we will discuss fonts, and then move on to additional structural elements necessary in documentation, starting with policies.

Guide to flirting Why do we flirt? Flirting is much more than just a bit of fun: it is a universal and essential aspect of human interaction. Anthropological research shows that flirting is to be found, in some form, in all cultures and societies around the world. Flirting is a basic instinct, part of human nature.

Using Asynchronous Methods in ASP.NET 4.5 How Requests Are Processed by the Thread Pool On the web server, the .NET Framework maintains a pool of threads that are used to service ASP.NET requests. When a request arrives, a thread from the pool is dispatched to process that request.

Interesting information that can be used for projects later. by philipottinger Mar 12

Related:  benencinasFree online booksPLearning