Hyperspace was hijacked by science fiction, but what is a space? Robert Miles explains with the use of small red rabbits and human faces.How Broadband ADSL Works: http://youtu.be/uwtGfyna62I Busy Beaver Turing Machines: http://youtu.be/CE8UhcyJS0I Public Key Cryptography: http://youtu.be/GSIDS_lvRv4
10 developer phrases that mean something completely differentHave you ever heard a colleague use the phrase “The code explains itself”? What your co-worker really means, is that they were not bothered to write any commentary. As you’ve probably noticed, what developers say and what they mean are usually two completely different things.
Tales of a Former Disassembly AddictThere wasn't much of a choice. I'd routinely look at the disassembled output of Pascal and C compilers and throw up my hands. It was often as if the code was some contrived example in Zen of Assembly Language, just to show how much opportunity there was for optimization.
WebGL Fluid ExperimentThe idea of distributed, componentized applications goes back a long way. Most notoriously, it emerged in the form of the SOA (service-oriented architecture) trend that peaked eight yeas ago. Now, it's back -- as microservices architecture. Microservices architecture and SOA aren't the same.
Improving GCC’s internalsIf you’ve done any C or C++ development on Fedora or Red Hat Enterprise Linux (RHEL), you’ll have used GCC, the GNU Compiler Collection.
The Database As Queue Anti-PatternWhen all you know is SQL Server, it’s tempting to try and solve every problem with a relational database, but often it’s not the best tool for the job. Today I want to introduce you to an excellent example of this, the ‘Database As Queue’ anti-pattern.
C# vNext (6.0) OverviewIn this presentation I'm covering features we can expect to see in the next version of C#. We're also looking at some of the features that we may see in the coming language update! As always, sit back, relax, enjoy some popcorn and enjoy the upcoming features of C# 6.0!
How Google Authenticator WorksTL;DR example code here. Most people use Google Authenticator to generate two-factor authentication (2FA) tokens on their phone, with Authy as a recent alternative. What's cool is that any service can make use of these apps as long as they are compatible.
So You Want To Write Your Own CSV code?So You Want To Write Your Own CSV code? Fields separated by commas and rows separated by newline. Easy right? You can write the code yourself in just a few lines. Hold on a second...
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.