The Ritual of the Calling of an Engineer is something that aims to bind engineers together, and the iron ring being part of the ritual certainly contributes to that effect. The iron ring is something that only Engineers and Engineering students in Canada have. It has been patented to ensure that it remains special and remains an unique reminder to …
read more »I haven’t got around to talk about my internship experience at Amazon, so here it is. Looking back now, I had a pretty good work term there. My recruiter put me under the very manager (Srikanth Thirumalai) that came to Waterloo to give a tech talk on the problems his team is trying to solve. I told the recruiter that …
read more »I mentioned earlier about GTK+ running natively on OSX without the use of X11. I was successful in getting a simple “hello world” application running, but I didn’t get GIMP working. Today I went back and compiled GIMP, fixed a compile error and there it is! GIMP running natively: The image showing on the screen is actually a photo I …
read more »As Peter said to me, “You’re addicted to real-time or something”. Haha, that’s because I’m in the lab every time he enters. However, I also have some cool stuff for show including the figure 8 video below. As fun as real-time is, I had stopped working on cs452 assignment 1 for several days because I was busy with 4th year …
read more »The famous CS Real-Time Programming course has just starting to extend its claws into my student life in my last school term. Assignment 1 which caused me to spend hours and hours in the trains lab is only a small part and the most easy portion of the course. For those unfamiliar with the course, see that there was an …
read more »First post with the new Security tag Yesterday I got sidetracked when going through my website and making sure that the site is not obviously vulnerable to attacks. I ended up wondering if Brian’s website has the common bugs that I’m trying to prevent on my own website. Guess what I found out. I found 2 bugs and couple bad …
read more »Every developer and software designer should have security in mind when designing and programming software. Software security must be considered both at code level (buffer overflow, heap overflow, etc) and at the design level. I came across this article: http://msmobiles.com/news.php/5474.html. It talks about mistakes that some Windows Mobile programs made. Things like storing password in plaintext, or using weak encryption …
read more »It’s soooo cute. See the tutorial at: http://forum.crystalxp.net/index.php?showtopic=8505 …
read more »As demonstrated on a binary version of Gentoo Linux, Kororaa. Linux has gotten some very cool eye candy. Some screenshots can be found here: http://www.tuxmachines.org/gallery/korxgl2 You’ll find that some of the effects are like Apple’s Expose and Cube effects. …
read more »This means we’ll get tighter integration of apps! Although still a work-in-progress, some code has already been checked in to GNOME CVS. At this time I can get simple apps running without any problem: More information can be found at Imendio AB’s website.
Here’s the announcement. Having to run GTK apps using Apple’s X11 environment has always bugged me, …