The Art of Creative Coding

The goal of nearly all content is to convey a message and spark an emotion. In software, content is brought to life with interaction and animation, which join together to add further meaning to words by the software’s medium: the user interface. Maybe you want your interface to help the content move you when you see it, feel it when you click it, or grok it while you read it. In today’s digital age, software stands as one of our most expressive mediums brought to life for the user. Enter creative coding: a development approach or technique that unifies design and technology to portray your message with great depth.

Continue reading The Art of Creative Coding

Dine at The Nerdery for the Perfect Cause

Extra Life Nerds is pleased to offer the opportunity to attend a semi-formal, three-course dinner at The Nerdery’s Bloomington office on Saturday, August 15 at 5:30 p.m.

Continue reading Dine at The Nerdery for the Perfect Cause

Beacon Technology Q&A: Understanding Google’s “Eddystone”

On July 14, Google announced a new standard for beacon communication, Eddystone. If you’re not sure what a beacon is, think of it as a micro-transmitter that can broadcast simple information to known locations. Or, in simpler language, beacons are simply a “Here I am!” message broadcast to other devices within range. Currently, the most famous type of beacon is Apple’s iBeacon protocol, which launched in 2013.

As companies are beginning to realize the potential beacons have (as a customer engagement method for in-store shoppers, for example) Google’s announcement is noteworthy. But why, exactly? We turn to The Nerdery’s own Principal Software Engineer and Android expert, Patrick Fuentes, for answers.

Continue reading Beacon Technology Q&A: Understanding Google’s “Eddystone”

Code Adoption and Maintenance: Working with Existing Applications

While the majority of our clients come to us needing a website or application built from scratch, we also have many who come looking for help with something that’s already been built. Sometimes they need our expertise with ongoing technical issues, or want to build new features and functionality into their existing application. Other times it’s because their previous development partner went out of business, could no longer support the application as it grew, or never intended to be a long-term partner. Whatever the reason, we’re glad to step in and help.

Continue reading Code Adoption and Maintenance: Working with Existing Applications

The Legacy of Windows XP

Windows XP, as an operating system, has had an interesting life. From the moment of its release, it received a rock-star welcome, with over 17 million sales within two months of launch. In comparison, Lady Gaga’s first album, The Fame, sold 15 million copies.

After Windows XP’s meteoric rise, it put on its suit and tie and swiftly became the de-facto standard for enterprise operations. It brought such wonderful features as group policy – which allows administrators to prescribe how computers should look and behave on the network – USB 2.0 support, remote desktop, increased wi-fi support and much, much more.

Continue reading The Legacy of Windows XP

Coding, Cocktails & Women in Tech

At The Nerdery, one of our passions is supporting initiatives and events for women in technology. In Kansas City, we sponsor KC Women in Tech and host one of their newest efforts to expose women to technology: Coding and Cocktails. The first event at our KC office was held June 13, where 23 women participated with four mentors and two volunteer Nerds.

Continue reading Coding, Cocktails & Women in Tech

Cyber Security & Data Breach Facts at a Glance [Infographic]

Cyber security has been a hot button issue lately, for good reason. But how do hackers gain to access to databases? And who do they typically target? Read on to learn little-known facts about cyber security, and exactly how costly data breaches can be.

Continue reading Cyber Security & Data Breach Facts at a Glance [Infographic]

Cyber Security Q&A: How NOT to get Hacked

With all the press surrounding security breaches lately, you might be wondering how it’s possible for your business to operate without getting hacked. We sat down with one of our security experts, Senior Quality Assurance Engineer Chris Wade to ask what you need to know about cyber security, hackers and how to protect your business and yourself.

Continue reading Cyber Security Q&A: How NOT to get Hacked

WWDC: Going Past the Keynote

Apple’s Worldwide Developer Conference (WWDC) keynote address has long been a landmark event for anyone following the company. However, WWDC spans an entire week, and the big announcements from the keynote represent hundreds of thousands of hours of work from Apple’s development teams. Each day of the conference, Apple engineers present specific details about the new technology that help developers see what new opportunities have opened up, and what practices they’ll need to change in the year ahead.

If your only view of WWDC 2015 was the keynote address, you missed out on almost a week’s worth of important information for developers. Let’s take a closer look at a few features of iOS 9 that didn’t make it into those first two hours.

Continue reading WWDC: Going Past the Keynote

My 10 Step Guide to Winning a Scholarship and Attending WWDC

Recently, I was the lucky winner of an Apple scholarship that allowed me to attend the Apple Worldwide Developers Conference (WWDC) in San Francisco two weeks ago. Do you hope to attend a future WWDC? Here’s my 10 step guide to winning a ticket and attending the massive conference. Note: While these steps seemed to work for me – because hey, I won – your experience may vary.

Continue reading My 10 Step Guide to Winning a Scholarship and Attending WWDC