An official letter from David Intersimone states that "Today, Wednesday February 8, 2006 at 1am Pacific Time, Borland announced plans to seek a buyer for our IDE product lines that include Delphi, C++Builder, C#Builder, JBuilder (and Peloton), InterBase, JDataStore, nDataStore, Kylix, and our older Borland and Turbo language products and tools. The goal is to create a standalone business focused on advancing individual developer productivity using the people inside Borland who are focused on the success of these award winning products." Bad news for developers and Fans, anyway,
inphone
Posts
-
Borland Sells Delphi and other IDEs -
Behaviors of the BlogosfereBlog visitors are 11 percent more likely than the average Internet user to have incomes of $75,000 or more.
50 million U.S. Internet users visited blog sites in the first quarter of 2005. That is 1 in 6 of the total U.S. population
A recent study of comScore called: "Behaviours of the blogosphere" [PDF] Shows that blog users spent more time online and bought more online. The study found a lot of interesting facts about blog users. The study found that that blog visitors are 30 percent more likely to buy products or services online. :)
-
125,552,893,920 eggs!!These is a very insightful way to measure the impact of China in world economics: http://ad.lnds.net/2006/01/125552893920_eggs.html ;)
-
Social Bookmarking and MSSQL 2005Thanks for your comments. The design was made by my pal Radu Dutzan http://hackand.blogspot.com/ If you want to contact him emailto:admin@blogmemes.com :)
-
Programming Styles and IdiomsLearning a programming language is much like learning a natural language. Knowledge of basic syntax lets a programmer write simple procedures and build them into nontrivial programs, just as someone with a vocabulary of a few hundred German words can write a story far richer than see-Dick-run. But mastery of language is quite another issue. read more ... :)
-
.NET Remoting vs. Web ServicesI see you are from Mexico, here is an article on spanish about this issue: http://metodos.lnds.net/2005/10/web\_services\_u\_object\_remoting.html
-
Google Ten Golden Rules[Here is](http://Here is) the secret of google success. :)
-
Google Privacy, and Government Access to Personal DataIn a strangulation-murder trial this month, prosecutors announced an unusual piece of evidence: Google searches allegedly done by the defendant that included the words "neck" and "snap." The data were taken from the defendant's computer, prosecutors say. But it might have come directly from Google.. :~
-
Spec# -
MSDE and SQL SErver Express 2005Is possible to keep MSDE on my machine, and install MS SQL EXPRESS 2005? I want to keep both engines.
-
Linux on Missiles?RedHawk Linux[^] selected for Lockheed Martin for missile testing X|
-
A real bionic hand?"The main objectives of the [CYBERHAND](<a href=)[^] Project are to increase the basic knowledge of neural regeneration, and sensory-motor control of the hand in humans and to exploit this knowledge to develop a new kind of hand prosthesis which will overcome some of the drawbacks of current systems." :cool:
-
Ajax Introduction linksLinks to articles on Ajax with ASP.NET :cool: -- moved at 17:31 Sunday 27th November, 2005
-
The Einstein's biggest blunder that wasn'tThe Einstein's biggest blunder that wasn't[^]. The genius of Albert Einstein, who added a "cosmological constant" to his equation for the expansion of the universe but later retracted it, may be vindicated by new research. :cool:
-
NASA's Spirit Rover Completes One Full Martian YearSpirit, the untiring robotic "wonder child" sent by NASA to explore the eerily earthlike fourth planet from the sun, has completed one martian year--that's almost two Earth years--on Mars. Designed to last only 90 martian days (sols), the six-wheeled marvel the size of a golf cart has pursued a steady course of solar-driven geologic fieldwork, bringing back some 70,000 images and a new understanding of Mars as a potential habitat. NASA's Spirit Rover Completes One Full Martian Year[^] NASA Feature[^]
-
Hide your crypto keys in your fingersYou are right, but you can implement this algorithm in an token with and embedded fingerprint sensor. The idea of the algorithm is to replace passwords, but you can use as a complement to passwords, too, so you can implements a two factor schema, something I know (the password), something I am (biometrics).
-
Hide your crypto keys in your fingersWell, your keys are public, there are some sensors that can detect live fingers, and can't be fouled with gummy fingers o things like that. The algorithm is not aware of the fingerprint capture technology, it just requires the image, or the minutia to work.
-
The eight fallacies of distributed computingThe eight fallacies of distributed computing 1. The network is reliable 2. Latency is zero 3. Bandwidth is infinite 4. The network is secure 5. Topology doesn't change 6. There is one administrator 7. Transport cost is zero 8. The network is homogeneous :)
-
ToonTalks for Kids ProgrammingIMHO is more fun ToonTalks (http://www.toontalk.com/) for kids that KPL (http://www.kidsprogramminglanguage.com/introforkids.htm)