In this article I will explain how Spotify uses different mature and proven technologies in our backend service eco-system and architecture, and why we do so.
Framebase • The best programmers are the quickest to GoogleTL;DR - An attacker can bypass Google’s two-step login verification, reset a user’s master password, and otherwise gain full account control, simply by capturing a user’s application-specific password (ASP).
Domain Knowledge or a Lack ThereofI believe that a lack of domain knowledge is the root cause of a lot of very bad software that gets developed and I think that it is up to computer programmers and their managers to deal with this.
Latency Mitigation StrategiesVirtual reality (VR) is one of the most demanding human-in-the-loop applications from a latency standpoint.
Amdahl's law in reverse: the wimpy core advantageOnce a chip’s single-core performance lags by more than a factor to two or so behind the higher end of current-generation commodity processors, making a business case for switching to the wimpy system becomes increasingly difficult.
ClownspaceWhat does a buffoon do when his project is utterly out of code space, running late, and rather horribly extremely buggy? Why, he adds more features, of course! Contractor Figby: “Yes! Sure! Whatever you want!”
The StarCraft path-finding hackGame-unit path-finding is something that most players never notice until it doesn’t work quite right, and then that minor issue becomes a rage-inducing, end-of-the-world problem. During the development of StarCraft there were times when path-finding just didn’t work at all.
How we hacked Facebook with OAuth2 and Chrome bugsTL;DR We (me and @isciurus) chained several different bugs in Facebook, OAuth2 and Google Chrome to craft an interesting exploit. MalloryPage can obtain your signed_request, code and access token for any client_id you previously authorized on Facebook.
Data Serialization Is Different To Data Transfer!Nearly everyone at this stage has heard about the huge rails vulnerabilities that were discovered this month. However, there is a lot of confusion and misinformation on the net about it, and what the primary causes of them were.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.