Rob Janssen

.NET Atomics and Memory Model Semantics

This is just a short blog post to clarify the actual semantics of the atomic functions exposed in the .NET Framework - those on the Thread, Interlocked, and Volatile classes, as well as the concrete behavior of C#’s volatile keyword and CIL’s volatile. prefix instruction.

Here be Dragons - The Interesting Realm of Floating Point Operations

In every programmer’s life there comes a time when he has to leave the realm of integers and tread into the dangerous land of rational numbers.

Ranking Functions in SQL Server with example

There are four types of Ranking Functions in SQL. All the Ranking Functions are used with Over ClauseRow_Number: The row_number function gives each a row in a table a serial number.

In the Defense of Spaghetti Code

Have you ever seen a function that spans 1500 lines of code?

It’s time to encrypt VoIP

In part because of Edward Snowden, we know that Microsoft cooperates closely with the U.S. government in handing over data, and that Skype calls in particular are collected under PRISM, with their logo featuring prominently in the slides.

Microsoft makes source code for MS-DOS and Word for Windows available to public

The following post is from Roy Levin, distinguished engineer and managing director, Microsoft Research Silicon Valley. On Tuesday, we dusted off the source code for early versions of MS-DOS and Word for Windows.

Journey to the Stack, Part I

Earlier we’ve explored the anatomy of a program in memory, the landscape of how our programs run in a computer. Now we turn to the call stack, the work horse in most programming languages and virtual machines, to examine it in detail.

Anatomy of a Program in Memory

Memory management is the heart of operating systems; it is crucial for both programming and system administration. In the next few posts I’ll cover memory with an eye towards practical aspects, but without shying away from internals.

Crypto Fails — Telegram's Cryptanalysis Contest

Telegram is an encrypted instant messaging app for iOS and Android devices. Obviously, I wouldn’t mention it on this blog if its crypto was perfect. In fact, it’s far from perfect. It’s almost horrifying.

Least Authority

BLAKE was the best-rated hash function in the SHA-3 competition NIST, in the final report of the SHA-3 competition, said this about the finalists (which included BLAKE, Keccak, Skein, and Grøstl): BLAKE had a security margin — the gap between a known-weak reduced version and the full version

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.