Rob Janssen

Inside one of the world's largest bitcoin mines

A week after I visited the last bitcoin mine in northeast China, I was able to arrange a trip to a larger, even more secretive operation. These exclusive photos provide a glimpse inside one of China’s largest bitcoin mines. Arriving at the site, I did not expect it to be so busy.

Microservices, or How I Learned To Stop Making Monoliths and Love Conway's Law

After reading this post I can’t help but feel that the author has missed the point of having a microservices architecture (he misses other things as well, particularly the fact that there’s a lot more folks out there writing software than just neckbeards and hipsters).

Microsoft’s new Web Server, Katana, Hits Version 3

Katana is Microsoft’s stand-alone implementation of OWIN, the Open Interface for .NET standard. It provides a lightweight alternative to IIS and System.Web when those features are not needed or desirable. With the release of version 3, Kanata is wholly to the asynchronous model offered by .NET 4.

FML. A silly virtual machine.

I have spent this summer designing and writing a virtual machine that no one will ever use. I have written roughly 6000 lines in an assembly language that no one else will ever learn. And it has been absolutely awesome. This machine has been named FML for reasons described in the background section.

Apple's Biggest Design Crime

Why can't Jony Ive of all people design a goddamn useable Shift key? Want to play a fun little game? Okay, great! Which of these iOS 7 keyboards has the Shift key pressed?

Protect your computer by monitoring your network

GlassWire displays your network activity on an easy to understand graph while searching for unusual Internet behavior that could indicate malware or violations of your privacy.

A Highlight and Note by Scott Nottingham

Wild Thing: A Novel (Dr. Pietro Brnwa) See this book on Amazon.

Decoraptor by Mark Seemann

This article describes a Dependency Injection design pattern called Decoraptor. It can be used as a solution to the problem: How can you address lifetime mismatches without introducing a Leaky Abstraction?

The poisoned NUL byte, 2014 edition

Back in this 1998 post to the Bugtraq mailing list, Olaf Kirch outlined an attack he called “The poisoned NUL byte”. It was an off-by-one error leading to writing a NUL byte outside the bounds of the current stack frame.

Work and open source

This blog post will be a small recap of the work day. After a few day break I resumed my work on Datazenit. I was occupied with other things and few conceptual projects for the past couple of days, but more on that later.

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.