“Chimpanzees are people too, you know. Ok, not exactly. But lawyer Steven Wise has spent the last 30 years working to change these animals’ status from “things” to “persons.” It’s not a matter of legal semantics; as he describes in this fascinating talk, recognizing that animals like chimps have extraordinary cognitive capabilities and rethinking the way we treat them — legally — is no less than a moral duty…”
“Many developers, users, and entire industries rely on virtualization, as provided by software like Xen, QEMU/KVM, or kvmtool. While QEMU can run a software-based virtual machine, and Xen can run cooperating paravirtualized OSes without hardware support, most current uses and deployments of virtualization rely on hardware-accelerated virtualization, as provided on many modern hardware platforms. Linux supports hardware virtualization via the Kernel Virtual Machine (KVM) API. In this article, we’ll take a closer look at the KVM API, using it to directly set up a virtual machine without using any existing virtual machine implementation…”
“NordicAPIs and Stockholm Java Meetup, joins up to talk about JVM languages.
In this talk Travis Spencer, (CEO – Twobo Technologies AB) talks about “Using Kotlin in an existing Java code base”…
“Perl has a long tradition of giving nicknames to some of its operators (possibly a form of Huffmanisation). These nicknames are based on the appearance of the operator, rather than its function. The well-known examples are the diamond operator (
<>), nicknamed by Geneva Wall and the spaceship operator (
<=>), nicknamed by Randal Schwartz. Some lesser known Perl operators with a nickname are the fat comma (
=>) and yada yada (
The Perl “secret operators” have been discovered (or created) by Perl obfuscators and golfers, usually when looking for a shorter way to perform a given operation. Secret operators are not actually secret, and they are not actually operators either. The perl parser does not specifically recognise them, and no one is trying to hide them from you. But they are like operators in the sense that these Perl programmers see them often enough to recognize them without thinking about their smaller parts, and eventually add them to their toolbox. And they are like secrets in the sense that they have to be discovered by their future user (or be transmitted by a fellow programmer), because they are not explicitly described in the Perl core documentation.
Because secret operators are not operators they don’t have real names, and so they need nicknames. Like the above Perl operators, their name is usually related to their shape.
The term “secret operator” was probably coined by Abigail in a
comp.lang.perl.misc post in January 2003…”
“This guide will help software developers and system administrators become experts at using logs to better run their systems. This is a vendor-neutral, community effort featuring examples from a variety of solutions. Each guide includes…”
“Java 8 was released last year adding lambdas, streams, and many other language improvements. Java 9 is already in the works, but with over half of Android devices stuck using Java 6, will we ever get to use a modern language?
In this talk from Droidcon NYC 2015, Michael Pardo introduces Kotlin: a statically typed JVM language backed by JetBrains. With features like lambdas, class extensions, and null-safety, it aims to be concise, expressive, and highly interoperable — a powerful addition to your Android tool belt…”