Rob Janssen

All | Unread | Read

Why blurring sensitive information is a bad idea

Undoubtedly you have all seen photographs of people on TV and online who have been blurred to hide faces.

Storing Your Data Securely: A Primer

Everybody agrees that it's important to keep our customers' data safe and secure from attackers. A breach would entail not only possible legal ramifications, but also a loss of reputation and of user trust.

What is memory safety?

I am in the process of putting together a MOOC on software security, which goes live in October. At the moment I’m finishing up material on buffer overflows, format string attacks, and other sorts of vulnerabilities in C.

The Face Recognition Algorithm That Finally Outperforms Humans — The Physics arXiv Blog — Medium

Everybody has had the experience of not recognising someone they know—changes in pose, illumination and expression all make the task tricky. So it’s not surprising that computer vision systems have similar problems.

Notification Styles Inspiration Simple ideas & effects for website notifications

Click on the button to show the notification:

JavaScript: The Good Parts

Google Tech Talks Web Exponents presented by Doug Crockford February 27, 2009 blog post: http://google-code-updates.blogspot.com/2009/03/doug-crockford-javas...

CPU Cache Flushing Fallacy

Even from highly experienced technologists I often hear talk about how certain operations cause a CPU cache to "flush". This seems to be illustrating a very common fallacy about how CPU caches work, and how the cache sub-system interacts with the execution cores.

How do you explain an OS kernel to a layperson? + an old text about The Matrix as an Operating System

Earlier this year I was a guest at a gathering of people who were mostly involved with social sciences and politics and a topic soon arised in which I had to explain some of the things I work with.

Writing High Performing Code

Over the years I’ve asked myself the question numerous times, “How do you produce code that performs well both from a business and IT perspective”. Unfortunately I keep stumbling across businesses who are in the process of re-writing their core business applications…. and I wonder why.

liuxinyu95/AlgoXY · GitHub

You can clone with HTTPS or Subversion.

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.