Rob Janssen

All | Unread | Read

Mapping the whole internet with Hilbert curves

The internet is big. Really big. You just won’t believe how vastly, hugely, mind-bogglingly big it is. I mean, you may think the /22 you got as a LIR was big, but that’s just peanuts to the internet. Well, actually, it wasn’t in the long run, that’s why we need IPv6.

Enterprise Programming Tricks For Clean Code

It is all too easy to dismiss problematic codebases on some nebulous idea of bad practice or bad programmers. Poor code, however, is rarely arbitrary and random in its structure or formulation. Systems of code, well or poorly structured, emerge from systems of practice, whether effective or ineffect

Performance Improvements in .NET Core 2.1

Back before .NET Core 2.0 shipped, I wrote a post highlighting various performance improvements in .NET Core 2.0 when compared with .NET Core 1.1 and the .NET Framework. As .NET Core 2.

CLR Threads Via C# Part 1 – Thread Creation And The System.Threading.Thread Class

In this post I cover the basics of CLR threads, the System.Threading.Thread class, and thread creation and lifecycle in C# via the CLR, this is part 1 in a multi-part series on threading in the CLR.

CLR Threads Via C# Part 2 – The Thread Pool

In the last post I talked about the basics of CLR threads by taking a look at the Thread class. We discussed background and foreground threads as well, and that dovetails nicely into the thread pool, so I wanted to go ahead and cover the thread pool in this next part.

CLR Threads Via C# Part 3 – Race Conditions, Atomic Instructions With Interlocked, and Monitors

Part 3 of the CLR multi-threading series where I discuss shared resources, critical sections, race conditions, atomic instructions, the interlocked class and monitors. In the last post, we discussed the thread pool, and in the post prior to that, we discussed the System.Threading.Thread class.

Level Up Your Log Files

Analysing log files with a text editor takes a lot of time and patience. LogViewPlus does a better job because it parses your log files and understands the data. This gives you filtering and navigation options beyond those available in a typical text editor. Use a text editor to edit text.

Introducing Miscreant.NET and Noise.NET

One of the most common cryptographic tasks that programmers face is data encryption. Modern symmetric cryptography is built around AEAD (authenticated encryption with associated data) ciphers. If used correctly (i.e.

YOLO Object Detection

You Only Look Once - this object detection algorithm is currently the state of the art, outperforming R-CNN and it's variants. I'll go into some different object detection algorithm improvements over the years, then dive into YOLO theory and a programmatic implementation using Tensorflow!Code for th

Exercises in Programming Style

In the book club at work, we recently finished reading Exercises in Programming Style by Cristina Videira Lopes. The book consists of a simple program implemented in 33 different programming styles. It is a great way of showing the different styles, and the book was quite popular in the book club.

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.