Rob Janssen

All | Unread | Read

The no-lock deadlock

People sometimes ask me if there is a cheap-and-easy way to guarantee thread safety.

Pages : The Butterfly Effect

Unity Technologies Programming Renaldas Zioma, Ole Ciliox, Paulius Liekis, Aras Pranckevicius, Andrius Keidonas, Robert Cupisz, Kuba Cupisz Technical Artist Erland Körner Lighting Artist Tommy Andersson Video Production Will Goldstone Project Management Steffen Toksvig Audio Mix Mason B. Fisher, East Coast Game Audio Passion Pictures Director Dan Sumich Producer Ryan Goodwin-Smith Head of CG Jason Nicholas VFX Supervisor Neil Riley CG Coordinator Aline Ngo Lead Character Modeller Cesar Nunes Character Modellers Michael Orbing, Mario Ucci Lead Environment Modeller Ian Brown Environment Modellers Nicolas Guiraud, Florent Rousseau Texture Artists Gabriel Loques, Emma Berkeley, Eleanor Bond

When Random Isn't Random Enough: Lessons from an Online Poker Exploit

Today I am going to retell a story from 1999, a story in which developers of a popular online poker platform implemented card-shuffling software with a handle of subtle but critical bugs. Although this story is 15 years old, the lessons it holds for algorithm developers are still relevant.

Checklist: What NOT to do in ASP.NET

Mapping Relational Databases and SQL to MongoDB

NoSQL databases have emerged tremendously in the last few years owing to their less constrained structure, scalable schema design, and faster access compared to traditional relational databases (RDBMS/SQL).

Bill Nye Debates Ken Ham - HD (Official)

Is creation a viable model of origins in today's modern, scientific era? Leading creation apologist and bestselling Christian author Ken Ham is joined at the Creation Museum by Emmy Award-winning science educator and CEO of the Planetary Society Bill Nye. To see Bill Nye's arguments debunked visit h

How BIG Is Google?

My Video On The Google Robots // http://www.youtube.com/watch?v=VUncbfJaf8Q Cut scene motion graphics by Riccardo Albertini: Website | http://therocketpanda....

PNG Image Metadata Leading to iFrame Injections

Researchers have discovered a relatively new way to distribute malware that relies on reading  JavaScript code stored in an obfuscated PNG file’s metadata to trigger iFrame injections.

PNG Image Metadata Leading to iFrame Injections

Researchers have discovered a relatively new way to distribute malware that relies on reading  JavaScript code stored in an obfuscated PNG file’s metadata to trigger iFrame injections.

8 Visual Studio debugging tips – debug like a boss

There are so many useful debugging features built into Visual Studio that aren’t well known. Here are a few my favorites including some recent finds in VS 2013. If you click the left gutter to set breakpoints you could be easily mislead into thinking breakpoints happen at line level.

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.