Rob Janssen

The limits of Google’s openness

You may be wondering what happened to the YouTube app for Windows Phone. Last May, after we launched a much improved app on our platform, Google objected on a number of grounds. We took our app down and agreed to work with Google to solve their issues.

Encryption is less secure than we thought

For 65 years, most information-theoretic analyses of cryptographic systems have made a mathematical assumption that turns out to be wrong. Information theory — the discipline that gave us digital communication and data compression — also put cryptography on a secure mathematical foundation.

Identicons for .NET

Don Park invented Identicons last week. An Identicon is a small, anonymized visual glyph that represents your IP address. Don explains it better than I do:

Identicons as Graphical Digital Fingerprints

How do you uniquely identify a person, without divulging the identity of that person? For example, given a set of personal artifacts, how would I arrange the set of artifacts grouped by the person to which they belonged?

50 Bytes of Code That Took 4 GB to Compile

While doing evil things with macros and the inline assembler (trying to run a weird test whose purpose is not really relevant) I managed to write a program that caused Visual Studio’s C++ compiler to allocate 4 GB of memory and then die.

Optimizing for Fan Noise

Typos were easy to make. That's the purpose of the "608" at the end of the line. It's a checksum verified by a separate "correctness checker" utility. There was a strong incentive for the authors of these games to optimize their code.

?? Responsible Refactoring

Emboldened by tests, and with the words “ruthless refactoring” in my head, I used to “improve” the codebase I was maintaining at a previous job. One day, my “cleanup” caused production to break. How could this be? I was being Agile. I was Testing. I was Merciless in my Refactoring.

Xerox scanners/photocopiers randomly alter numbers in scanned documents

Please see the “condensed time line” section (the next one) for a time line of how the Xerox saga unfolded. It for example depicts that I did not push the thing to the public right away, but gave Xerox a lot of time before I did so. Personally, I think this is important.

Damian Edwards: Don’t do that, do this! Recommendations from the ASP.NET team

ASP.NET’s been around for a number of years and the team’s developed some DOs and DON’Ts. Let’s explore out very best list of DON’Ts that you can apply today at work! Come see Damian Edwards, Senior Program Manager on the ASP.NET team, share internals, secrets and not-so-secrets of the ASP

bertjohnson/OpaqueMail · GitHub

.NET e-mail library with full support for IMAP, POP3, and SMTP. Provides S/MIME message signing, encryption, and decryption to foster better e-mail security and privacy. Supports MIME, Unicode, TNEF, and automatically embeds images into Text/HTML messages.

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.