TweetFollow Us on Twitter

Feb 94 Challenge
Volume Number:10
Issue Number:2
Column Tag:Programmers’ Challenge

Programmers’ Challenge

By Nice Silk Man

Note: Source code files accompanying article are located on MacTech CD-ROM or source code disks.

The Rules

Here’s how it works: Each month there will be a different programming challenge presented here. First, you must write some code that solves the challenge. Second, you must optimize your code (a lot). Then, submit your solution to MacTech Magazine (formerly MacTutor). A winner will be chosen based on code correctness, speed, size and elegance (in that order of importance) as well as the postmark of the answer. In the event of multiple equally desirable solutions, one winner will be chosen at random (with honorable mention, but no prize, given to the runners up). The prize for the best solution each month is $50 and a limited edition “The Winner! MacTech Magazine Programming Challenge” T-shirt (not to be found in stores).

In order to make fair comparisons between solutions, all solutions must be in ANSI compatible C (i.e., don’t use Think’s Object extensions). Only pure C code can be used. Any entries with any assembly in them will be disqualified (except for those challenges specifically stated to be in assembly). However, you may call any routine in the Macintosh toolbox you want (i.e., it doesn’t matter if you use NewPtr instead of malloc). All entries will be tested with the FPU and 68020 flags turned off in THINK C. When timing routines, the latest version of THINK C will be used (with ANSI Settings plus “Honor ‘register’ first” and “Use Global Optimizer” turned on) so beware if you optimize for a different C compiler. All code should be limited to 60 characters wide. This will aid us in dealing with e-mail gateways and page layout.

The solution and winners for this month’s Programmers’ Challenge will be published in the issue two months later. All submissions must be received by the 10th day of the month printed on the front of this issue.

All solutions should be marked “Attn: Programmers’ Challenge Solution” and sent to Xplain Corporation (the publishers of MacTech Magazine) via “snail mail” or preferably, e-mail - AppleLink: MT.PROGCHAL, Internet: progchallenge@xplain.com, CompuServe: 71552,174 and America Online: MT PRGCHAL. If you send via snail mail, please include a disk with the solution and all related files (including contact information). See page 2 for information on “How to Contact Xplain Corporation.”

MacTech Magazine reserves the right to publish any solution entered in the Programming Challenge of the Month and all entries are the property of MacTech Magazine upon submission. The submission falls under all the same conventions of an article submission.

WE PRY ANY HEAP

Everyone likes anagrams. If you’ve ever had an anagram program and run your friends’ names through it then you know how excited people get when they see what their name can spell when the letters are rearranged. It’s one of those little things that computers can do that impresses non-computer people like my mom more than any amount of awesome 3-D rendering or clever computer animation. This month’s challenge is to write a fast anagram routine.

The prototype of the function you write is:

/* 1 */

unsigned long Anagram(inputText, 
 wordList, outputFile)
Str255  inputText;
FILE    *wordList;
FILE    *outputFile;

InputText is a Pascal string containing the text to anagram. It will be all lowercase letters (a..z) and may contain spaces, which you should ignore (i.e. your anagram may contain more or fewer spaces; it doesn’t matter). WordList is a standard C input stream containing the dictionary of valid words you can use to make your anagrammed output. The words in the dictionary will be all lowercase and sorted from ‘a’ to ‘z’ (and there will be about 20,000 of them). There is a 0x0D byte between each word. You should keep reading words from the stream until you reach the end of file. OutputFile is a standard C output stream that you should write your anagrams to, each one separated by a 0x0D byte. The return value of the function is the number of unique anagrams that were sent to the outputFile.

Good luck and Happy New Year!

TWO MONTHS AGO WINNER

Of the 11 entries I received for the Present Packing challenge, nine worked correctly. Congrats to James Goebel (location unknown) for having the highest average number of presents packed. James previously won the ASCII85 Encode challenge and now he is tied in a 3-way tie for the most number of 1st place Challenge showings.

This challenge was judged based on the highest average number of packages packed. The times and code+data sizes are given for interest only. Numbers in parens after a person’s name indicate how many times that person has finished in the top 5 places of all previous Programmer Challenges, not including this one.

Name packages time code+data

James Goebel (2) 95.8 4007 2506

Kevin Cutts (1) 94.3 67 10806

Robert Coie 93.8 5 900

Bob Boonstra (4) 93.7 6 5684

Dave Darrah 93.6 6 1002

Paul Pedriana 93.5 5 1442

Stefan Pantke 91.4 121 20552

Allen Stenger (2) 91.0 11439 360

Jeremy Vineyard (1) 67.3 562 664

My apologies for not considering that it would be nice if you could rotate a present 90 degrees as you packed it. Several people who entered wrote to me and asked me about that before entering. Unfortunately, Donald Knipp (location unknown) didn’t ask me and just assumed that he could rotate the presents. But since the storePresProc had no way of knowing that he had rotated them he ended up putting presents on top of each other, which invalidated his entry. I’m not happy about disqualifying Donald’s otherwise clever entry but I must in order to be fair to those who were told they couldn’t rotate. In the future, I urge everyone to e-mail me if something is ambiguous or if there are questions about what assumptions you can and cannot make in your solutions.

Here’s James’ winning solution. My apologies for removing some whitespace and comments in order to fit it in this column; James’ unedited code is on the source code disk.

/* 2 */

/* PackPresents() by Clement James Goebel III.
 This code accepts a number of presents one after another and
 attempts to store as MANY as possible
 in its storage area. 
 This routine starts with an array describing the expected 
 distribution of data and then slowly changes to use an array
 that describes the sizes of observed presents as the process
 continues. These arrays are used to decide which presents 
 are too big and should not be stored as they will cause us
 to throw away smaller 
 presents latter. The routine is slow 
 and methodical as it trys to pack presents into the smallest 
   spaces it can find. It also does an ok job of guessing which 
 packages to discard, a function that might not really be 
 needed with evenly distributed data sets. But the goal was
 to pack the most, so you can't be too careful. The matrix 
 that keeps track of stored presents contains zeros where 
 presents are stored, and all other locations contain a value
 that represents the amount of free space that is contiguous
 to that location. We will always try to fill small holes 
 first, a better way might be to look for presents that are
 half the size of the hole, but that would require many more
 special cases. And when placing presents we will always try
 to get as many surfaces to touch as possible.
*/

#define WID_DIM  100
#define LEN_DIM  100
#define MIN_GIFT_DIM 5
#define MAX_GIFT_DIM 15
#define LIKES_OTHERS 3
#define LIKES_WALLS2
#define SPACE_USED 0
#define MEASURING-1

static short sgsGiftsSeen, sgsGiftsStored, sgsLeftmostPresent,
 sgsTopmostPresent;
static long  sglExpectedCount, sglItemsOnStack,
 sglTotalAreaExpected;
static short *sgasStack, *sgasAreasSeen, *sgasAreasExpected;
static long  *sgalSpace;

typedef void (*NextPresProc)
 (unsigned short *pWidth, unsigned short *pLength );
typedef void (*StorePresProc)
 (unsigned short xPos, unsigned short yPos );

void PackPresents( unsigned short usNumGifts,
 NextPresProc pNextPresProc, StorePresProc pStorePresProc );
void MyPacker( unsigned short usNumGifts,
 long sgaalStorage[WID_DIM][LEN_DIM],
 NextPresProc pNextPresProc, StorePresProc pStorePresProc );

// PackPresents()
void PackPresents( unsigned short usNumGifts,
 NextPresProc pNextPresProc, StorePresProc pStorePresProc)
{
 long w, l, lBytes;
 sgsGiftsSeen = sgsGiftsStored = 0;
 sglItemsOnStack = 0;
 sgsLeftmostPresent = WID_DIM;
 sgsTopmostPresent = LEN_DIM;
 lBytes = (MAX_GIFT_DIM+1) 
 * (MAX_GIFT_DIM+1) * sizeof( short );
 sgasAreasSeen = (void*)NewPtrClear( lBytes );
 sgasAreasExpected = (void*)NewPtrClear( lBytes );
 sgasStack = (void*)NewPtrClear( (WID_DIM * LEN_DIM ) 
 * 2 * sizeof( short ) );
 sgalSpace = (void*)NewPtrClear( WID_DIM * LEN_DIM 
 * sizeof( long ) );
// Given the range of inputs we expect to see compute
// the number of presents of each size that we 
// expect to be offered.
 sgsGiftsSeen = sglExpectedCount = 0;
 sglTotalAreaExpected = 0;
 for ( w = MIN_GIFT_DIM; w <= MAX_GIFT_DIM; w++ ) {
 for ( l = MIN_GIFT_DIM;l<=MAX_GIFT_DIM; l++) {
 sgasAreasExpected[ w * l] ++;
 sglTotalAreaExpected += w * l;
 sglExpectedCount++;
 } }
 MyPacker( usNumGifts, (void*)sgalSpace, 
 pNextPresProc, pStorePresProc );
 DisposePtr( (Ptr)sgasAreasSeen );
 DisposePtr( (Ptr)sgasAreasExpected );
 DisposePtr( (Ptr)sgasStack );
 DisposePtr( (Ptr)sgalSpace );
}

// Utility routines called by packing routine.
Boolean BestPosition( long aalSpace[WID_DIM][LEN_DIM],
 unsigned short usSpaceRemaining, unsigned short usWidth,
 unsigned short usLength, short *pusX, short *pusY );
int LargestGiftDesired( unsigned short usSpaceLeft, 
 unsigned short usTotalGifts, unsigned short usGiftsRemaining,
 unsigned short usWidth, unsigned short usLength );
void RecomputeAreas( long aalSpace[WID_DIM][LEN_DIM],
 unsigned short *pusSpaceRemaining, int iHoleSize );

// MyPacker()
// After getting each present check to see what the 
// expected sizes of the next presents will be and
// pick a largest acceptable size.  If the present
// meets the size requirement then find the best 
// location for it (presents like to sit amoung
// friends or with thier back to the wall!), and 
// store it.
void MyPacker( unsigned short usNumGifts,
 long aalGiftStorage[WID_DIM][LEN_DIM],
 NextPresProc pNextPresProc, StorePresProc pStorePresProc )
{
 unsigned short usSpaceRemaining, usGiftsRemaining;
 unsigned short usWidth, usLength;
 int  iLargestGiftDesired, iArea, i, w, l, iHoleSize;
 short X, Y;
 
 usGiftsRemaining = usNumGifts;
 usSpaceRemaining = WID_DIM * LEN_DIM;
// Fill storage array with contiguous area values.
// In the beginning all space is empty and contiguous.
 for ( w = 0; w < WID_DIM; w++ )
 for ( l = 0; l < LEN_DIM; l++ )
 aalGiftStorage[w][l] = usSpaceRemaining;    
// Get the presents.
 while ( usGiftsRemaining ) {
 (pNextPresProc)( &usWidth, &usLength );
 usGiftsRemaining--;
 iLargestGiftDesired = LargestGiftDesired( 
   usSpaceRemaining, usNumGifts, 
   usGiftsRemaining, usWidth, usLength );
 iArea = usWidth * usLength;
 if ( iArea <= iLargestGiftDesired ) {
 if ( BestPosition( aalGiftStorage, 
   usSpaceRemaining, usWidth, usLength, &X, &Y ) ) {
 iHoleSize = aalGiftStorage[X][Y];
// Store a gift.
 for ( w = 0; w < usWidth; w++ ) {
 for ( l = 0; l < usLength; l++ ) {
 aalGiftStorage[X+w][Y+l] = SPACE_USED;
 } }
 pStorePresProc( (unsigned short)X, 
 (unsigned short)Y );
 sgsGiftsStored++;
 if ( sgsLeftmostPresent > X )
 sgsLeftmostPresent = X;
 if ( sgsTopmostPresent > Y )
 sgsTopmostPresent = Y;
 usSpaceRemaining -= iArea;
 RecomputeAreas( aalGiftStorage, 
   &usSpaceRemaining, iHoleSize );
 } }    
 if ( usSpaceRemaining == 0 ) return;
}}

// Push() & Pop() implement a stack for the 
// flood fill type algorithm FloodMark to store
// data points on instead of recursing into the heap.
Push( unsigned usX, unsigned usY )
{
 sgasStack[sglItemsOnStack] = usX;
 sgasStack[sglItemsOnStack+1] = usY;
 sglItemsOnStack += 2;
}
Boolean Pop( unsigned short *pusX, unsigned short *pusY )
{
 if ( sglItemsOnStack ) {
 sglItemsOnStack -= 2;
 *pusX = sgasStack[sglItemsOnStack];
 *pusY = sgasStack[sglItemsOnStack+1];
 return( TRUE );
 }
 return( FALSE );
}

// FloodMark()
// This is an implementation of the well documented
// Floodfill alorithm for fill irregular shapes with
// paint or other such graphically stuff.  Here we
// use it to measure the number of contigious values,
// that match the iValueToMatch, variable,
// in the array.  As it encounters each value it 
// marks it with the flag MEASURING so that we can 
// then go and place the new area value back into 
// those positions.
long FloodMark( int iValueToMatch,
 long aal[WID_DIM][LEN_DIM], unsigned short X,
 unsigned short Y, Boolean *pbCanFitMinGift )
{
 long lPixelsFilled = 0;
 int l, w, iV = iValueToMatch;
 Boolean bCanFitMinGift = FALSE;
 
 sglItemsOnStack = 0;
 if ( aal[X][Y] == iV )
 Push( X, Y );
 while ( Pop( &X, &Y ) ) {
 aal[X][Y] = MEASURING;
 lPixelsFilled++;
 if ( ! bCanFitMinGift ) {
 if ( X + MIN_GIFT_DIM - 1 > WID_DIM )
 goto FAILED_MIN_TEST;
 if ( Y + MIN_GIFT_DIM - 1 > LEN_DIM )
 goto FAILED_MIN_TEST;
 for ( w = 0; w < MIN_GIFT_DIM; w++ )
 for ( l = 0; l < MIN_GIFT_DIM; l++ ) 
 if ( aal[X+w][Y+l] == SPACE_USED )
 goto FAILED_MIN_TEST;
 bCanFitMinGift = TRUE;
 }
FAILED_MIN_TEST:;
 if ( Y > 0 && aal[X][Y-1] == iV )
 Push( X, Y-1 );
 if ( Y+1 < LEN_DIM && aal[X][Y+1] == iV )
 Push( X, Y+1 );
 if ( X > 0 && aal[X-1][Y] == iV )
 Push( X-1, Y );
 if ( X+1 < WID_DIM && aal[X+1][Y] == iV )
 Push( X+1, Y );
 }
 *pbCanFitMinGift = bCanFitMinGift;
 return( lPixelsFilled );
}

// RecomputeAreas()
// The matrix that holds the current state of stored
// presents contains zeros were presents are located,
// and every other location contains a value that
// describes the area of the contigious region of 
// which it is a part.  After placing a present in an 
// empty region of size X, call this routine with
// iHoleSize = X, so that the area map can be brought
// up to date.
void RecomputeAreas( long aalSpace[WID_DIM][LEN_DIM],
 unsigned short *pusSpaceRemaining, int iHoleSize )
{
 int  i,j,k,l, iSmallest;
 long lArea;
 Boolean bCanFitMinGift;

 for ( i = 0; i < WID_DIM; i++ ) {
   for ( j = 0; j < LEN_DIM; j++ ) {
     if ( aalSpace[i][j] == iHoleSize ) {
   lArea = FloodMark( iHoleSize, aalSpace, i, j,
   &bCanFitMinGift );
   
   if ( ! bCanFitMinGift ) {
// Remove areas smaller than smallest present.
     for( k = 0; k < WID_DIM; k++ )
       for ( l = 0; l < LEN_DIM; l++ )
     if ( aalSpace[k][l] == MEASURING )
   aalSpace[k][l] = SPACE_USED;
     (*pusSpaceRemaining) -= lArea;
   } else {
     for( k = 0; k < WID_DIM; k++ )
       for ( l = 0; l < LEN_DIM; l++ )
     if ( aalSpace[k][l] == MEASURING )
   aalSpace[k][l] = lArea;
}} } } }

// NeighborCount()
// As we all know presents like lots of friends and
// are agoraphobic, so pack them in tight leaving as
// few exposed surfaces as possible.  Being next to
// a friend is better than a cold wall, but better to
// cover your rear with a wall then leave it out in 
// the open.
int NeighborCount( long aalSpace[WID_DIM][LEN_DIM],
 unsigned short usWidth, unsigned short usLength,
 unsigned short usX, unsigned short usY )
{
 unsigned short w, l;
 int iNeighbors;

 iNeighbors = 0;
 if ( usX + usWidth - 1 < sgsLeftmostPresent ) {
 if ( usX == 0 )
 iNeighbors += (LIKES_WALLS * usLength);
 if ( usX+usWidth == WID_DIM )
 iNeighbors += (LIKES_WALLS * usLength);
 } else {
 for ( l = 0; l < usLength; l++ ) {
 if ( usX == 0 )
 iNeighbors += LIKES_WALLS;
 else if ( aalSpace[usX-1][usY+l] == SPACE_USED )
 iNeighbors += LIKES_OTHERS;
 
 if ( usX+usWidth == WID_DIM )
 iNeighbors += LIKES_WALLS;
 else if ( aalSpace[usX+usWidth][usY+l] == SPACE_USED )
 iNeighbors += LIKES_OTHERS;
 } }
 if ( usY + usLength - 1 < sgsTopmostPresent ) {
 if ( usY == 0 )
 iNeighbors += (LIKES_WALLS * usWidth);
 if ( usY+usLength == LEN_DIM )
 iNeighbors += (LIKES_WALLS * usWidth);
 } else {
 for ( w = 0; w < usWidth; w++ ) {
 if ( usY == 0 )
 iNeighbors += LIKES_WALLS;
 else if ( aalSpace[usX+w][usY-1] == SPACE_USED )
 iNeighbors += LIKES_OTHERS;
 
 if ( usY+usLength == LEN_DIM )
 iNeighbors += LIKES_WALLS;
 else if ( aalSpace[usX+w][usY+usLength] == SPACE_USED )
 iNeighbors += LIKES_OTHERS;
 } }
 return( iNeighbors );
}
 
// BestPosition()
// Find the "best" position for this size present.
// If the present does not fit then return FALSE.
// Find the smallest open area that can accomadate
// this package then position it so that it is
// adjacent to as many others, or edges, as possible.
Boolean BestPosition( long aalSpace[WID_DIM][LEN_DIM],
 unsigned short usSpaceRemaining, unsigned short usWidth,
 unsigned short usLength, short *psX, short *psY )
{
 Boolean bFits = FALSE;
 short sX, sY, w, l;
 int iNeighbors, iMostNeighbors = -1;
 long lThisHole,lSmallestHole = 0x7FFFFFFF;
 
// 1st package always to the lower right corner.
 if ( sgsGiftsStored == 0 ) {
 *psX = WID_DIM - usWidth;
 *psY = LEN_DIM - usLength;
 return( TRUE );
 }

// Check all potential positions for open space.
 for ( sX = WID_DIM - usWidth; sX >= 0 ; sX-- ) {
 for ( sY = LEN_DIM - usLength; sY >= 0 ; sY-- ) {
 lThisHole = aalSpace[sX][sY];
 if ( lThisHole != SPACE_USED
 && lSmallestHole >= lThisHole ) {

 for ( w = 0; w < usWidth; w++ ) {
 for ( l = 0; l < usLength; l++ ) {
 if ( aalSpace[sX+w][sY+l] == 
    SPACE_USED ) {
 sY -= ( usLength - l );
 sY ++;
 goto SPACE_NOT_AVAILABLE;
 } }  }
 
// Count the neighbors, since presents need friends.
 iNeighbors = NeighborCount( aalSpace,
 usWidth, usLength, sX, sY );
 if ( iNeighbors > iMostNeighbors 
 || lSmallestHole > lThisHole ) {
 bFits = TRUE;
 *psX = sX;
 *psY = sY;
 iMostNeighbors = iNeighbors;
 lSmallestHole = lThisHole;
 } }
 SPACE_NOT_AVAILABLE:;
 } }
 return( bFits );
}

// LargestGiftDesired()
// To find the largest gift that we wish to accept
// we total all of the areas from smallest to largest
// of the gifts that we expect to get.  When the 
// expected total approaches the space remaining
// we choose that size as the largest gift to accept.
int LargestGiftDesired( unsigned short usSpaceLeft,
 unsigned short usTotalGifts, unsigned short usGiftsRemain,
 unsigned short usWidth, unsigned short usLength ) 
{
 long lExpected1000, lSpcLeft1000;
 long lRandomModel, lObserved;
 int    iSize, iMaxSize;
 sgsGiftsSeen++;
 if ( usWidth > MAX_GIFT_DIM 
 || usLength > MAX_GIFT_DIM )
 return( 0 );
 sgasAreasSeen[usWidth * usLength] += 1;
 if ( usGiftsRemain <= 5 )
 return( usSpaceLeft );
 iSize = MIN_GIFT_DIM * MIN_GIFT_DIM - 1;
 iMaxSize = MAX_GIFT_DIM * MAX_GIFT_DIM;
 lExpected1000 = 0;
 lSpcLeft1000 = usSpaceLeft * 1000L;
 while ( lExpected1000 + iSize * 3 * 1000L 
   <= lSpcLeft1000 && iSize <= iMaxSize ) {
 iSize++;
 lRandomModel = 1000L * 
 sgasAreasExpected[iSize] * iSize;
 lObserved = 1000L * sgasAreasSeen[iSize] * iSize;
 
 if ( lRandomModel || lObserved ) {
 lRandomModel = usGiftsRemain * lRandomModel 
 / sglExpectedCount;
 lObserved = usGiftsRemain * lObserved 
 / sgsGiftsSeen;
// Distribute weight between expected model and 
// observed sizes by the proportion of the totals
// gifts that we have already seen.
 lRandomModel *= usGiftsRemain;
 lRandomModel /= usTotalGifts;
 lObserved *= (usTotalGifts-usGiftsRemain);
 lObserved /= usTotalGifts;
 lExpected1000 += lObserved + lRandomModel;
 } }
 return( iSize );
}







  
 

Community Search:
MacTech Search:

Software Updates via MacUpdate

Sibelius 2020.6 - Music notation solutio...
Sibelius is the world's best-selling music notation software for Mac. It is as intuitive to use as a pen, yet so powerful that it does most things in less than the blink of an eye. The demo includes... Read more
Bookends 13.4.2 - Reference management a...
Bookends is a full-featured bibliography/reference and information-management system for students and professionals. Bookends uses the cloud to sync reference libraries on all the Macs you use.... Read more
OmniGraffle Pro 7.16 - Create diagrams,...
OmniGraffle Pro helps you draw beautiful diagrams, family trees, flow charts, org charts, layouts, and (mathematically speaking) any other directed or non-directed graphs. We've had people use... Read more
Drive Genius 6.1.0 - $79.00
Drive Genius features a comprehensive Malware Scan. Automate your malware protection. Protect your investment from any threat. The Malware Scan is part of the automated DrivePulse utility. DrivePulse... Read more
Tor Browser 9.5 - Anonymize Web browsing...
The Tor Browser Bundle is an easy-to-use portable package of Tor, Vidalia, Torbutton, and a Firefox fork preconfigured to work together out of the box. It contains a modified copy of Firefox that... Read more
VueScan 9.7.28 - Scanner software with a...
VueScan is a scanning program that works with most high-quality flatbed and film scanners to produce scans that have excellent color fidelity and color balance. VueScan is easy to use, and has... Read more
OmniGraffle 7.16 - Create diagrams, flow...
OmniGraffle helps you draw beautiful diagrams, family trees, flow charts, org charts, layouts, and (mathematically speaking) any other directed or non-directed graphs. We've had people use Graffle to... Read more
WALTR 2 2.6.26 - $39.95
WALTR 2 helps you wirelessly drag-and-drop any music, ringtones, videos, PDF, and ePub files onto your iPhone, iPad, or iPod without iTunes. It is the second major version of Softorino's critically-... Read more
Airmail 4.1 - Powerful, minimal email cl...
Airmail is an mail client with fast performance and intuitive interaction. Support for iCloud, MS Exchange, Gmail, Google Apps, IMAP, POP3, Yahoo!, AOL, Outlook.com, Live.com. Airmail was designed... Read more
Iridient Developer 3.3.12 - Powerful ima...
Iridient Developer (was RAW Developer) is a powerful image-conversion application designed specifically for OS X. Iridient Developer gives advanced photographers total control over every aspect of... Read more

Latest Forum Discussions

See All

Willy Jetman: Astromonkey's Revenge...
Barcelona-based developer Last Chicken Games are set to bring their game Willy Jetman: Astromonkey's Revenge to both iOS and Android on 9th July. The Metroidvania is already available on the likes of PS4, Switch and PC but now mobile folk will be... | Read more »
The 5 Best Mobile Real Time Strategy Gam...
Real-time strategy games feel like they’d be a perfect fit for mobile, but they’re trickier to pull off that you might think. The traditional mold of base-building and micro management can work on touch screens, but needs to be carefully honed so... | Read more »
Using your phone in a protest
I can't write about games today. There is a struggle happening in the streets right now and it needs everyone's attention. Here's some good info on how you can use your iOS device safely amidst a protest. | Read more »
Dungonian is a card-based dungeon crawle...
Dungonian is a card-based dungeon crawler from developer SandFish Games that only recently launched as a free-to-play title. It offers an extensive roster of playable heroes to collect and enemies to take down, and it's available right now for iOS... | Read more »
Steam Link Spotlight - Signs of the Sojo...
Steam Link Spotlight is a feature where we look at PC games that play exceptionally well using the Steam Link app. Our last entry was XCOM: Chimera Squad. Read about how it plays using Steam Link's new mouse and keyboard support over here. | Read more »
Steampunk Tower 2, DreamGate's sequ...
Steampunk Tower 2 is a DreamGate's follow up to their previous tower defence game. It's available now for both iOS and Android as a free-to-play title and will see players defending their lone base by kitting it out with a variety of turrets. [... | Read more »
Clash Royale: The Road to Legendary Aren...
Supercell recently celebrated its 10th anniversary and their best title, Clash Royale, is as good as it's ever been. Even for lapsed players, returning to the game is as easy as can be. If you want to join us in picking the game back up, we've put... | Read more »
Pokemon Go Fest 2020 will be a virtual e...
Niantic has announced that Pokemon Go Fest will still take place this year although understandably it won't be a physical event. Instead, it will become a virtual celebration and is set to be held on 25th and 26th July. [Read more] | Read more »
Marvel Future Fight's major May upd...
Marvel Future Fight's latest update has now landed, and it sounds like a big one. The focus this time around is on Marvel's Guardians of the Galaxy, and it introduces all-new characters, quests, and uniforms for players to collect. [Read more] | Read more »
SINoALICE, Yoko Taro and Pokelabo's...
Yoko Taro and developer Pokelabo's SINoALICE has now opened for pre-registration over on the App Store. It's already amassed 1.5 million Android pre-registrations, and it's currently slated to launch on July 1st. [Read more] | Read more »

Price Scanner via MacPrices.net

Apple restocks 27″ iMacs, Certified Refurbish...
Apple has restocked Certified Refurbished 2019 27″ iMacs starting at $1529 and up to $350 off the cost of new models. Apple’s one-year warranty is standard, shipping is free, and each iMac features a... Read more
Apple’s new 2020 13″ 4-Core MacBook Airs on s...
B&H Photo has Apple’s new 2020 13″ 4-Core MacBook Airs on sale today for $100 off Apple’s MSRP, only $1199. Expedited shipping is free to many addresses in the US. The MacBook Airs are the same... Read more
New Verizon promo: $150 off any Apple Watch w...
Verizon is offering $150 off any Apple Watch when purchased alongside an iPhone through June 10, 2020. They’re also offering up to $100 on any Apple Watch trade-in. Here are the details: “Get $150... Read more
Last year’s 13″ 2.4GHz MacBook Pros are avail...
Apple has Certified Refurbished 2019 13″ 2.4GHz/256GB 4-Core Touch Bar MacBook Pros available for $1359, $440 off original MSRP. Apple’s one-year warranty is included, shipping is free, and each... Read more
Apple’s new 2020 13″ MacBook Pros on sale for...
Apple reseller Abt Electronics has new 2020 13″ MacBook Pros on sale today for up to $140 off MSRP, starting at $1208. Shipping is free, and most configurations are in stock today. Note that Abt’s... Read more
Apple CEO Reacts To Nationwide Protests Over...
NEWS: 06.03.20 – With the recent death of a black man in the custody of a white police officer igniting outrage among Americans from all walks of life, which resulted in protests and civil unrest... Read more
At up to $420 off MSRP, these Certified Refur...
Apple has Certified Refurbished 2019 16″ MacBook Pros available for up to $420 off the cost of new models, starting at $2039. Each model features a new outer case, shipping is free, and an Apple 1-... Read more
Apple restocks refurbished 3rd generation 12....
Apple restocked select 3rd generation 12.9″ WiFi iPad Pros starting at only $699 and up to $330 off original MSRP. Each iPad comes with a standard Apple one-year warranty, outer cases are new, and... Read more
These wireless carriers are offering Apple’s...
Looking for a deal on Apple’s new iPhone SE? Apple itself offers the unlocked 64GB iPhone SE for $399 or $16.62/month. If you’re willing to try a new carrier, two of Apple’s wireless carriers are... Read more
Save $80 on the 64GB 10.5″ iPad Air with this...
Apple has 10.5″ 64GB WiFi iPad Airs models available for $80 off MSRP, Certified Refurbished. Each iPad comes with Apple’s standard one-year warranty and includes a new outer case. Shipping is free... Read more

Jobs Board

*Apple* Architect - SAIC (United States)
**Description** We are currently seeking a motivated, career and customer oriented Apple Architect to join our team in Washington, DC to begin an exciting and Read more
*Apple* Support Engineer - SAIC (United Stat...
**Description** We are currently seeking a motivated, career and customer oriented Apple Support Engineer to join our team in Washington, DC to begin an exciting and Read more
Perioperative RN - ( *Apple* Hill Surgical C...
Perioperative RN - ( Apple Hill Surgical Center) Tracking Code 60593 Job Description Monday - Friday - Full Time Days Possible Saturdays General Summary: Under the Read more
Senior Practice Manager - *Apple* Hill Eye...
Senior Practice Manager - Apple Hill Eye Center Tracking Code 61713 Job Description Apple Hill Medical Center General Summary: Under general supervision, manages Read more
*Apple* Mac Desktop Support - Global Dimensi...
…Operate and support an Active Directory (AD) server-client environment for all Apple devices operating on the BUMED network + Leverage necessary industry enterprise Read more
All contents are Copyright 1984-2011 by Xplain Corporation. All rights reserved. Theme designed by Icreon.