Rob Janssen

An Introduction to User Experience Design

Donald Norman is often called the inventor of User Experience, and this review covers many important points from his seminal book.

Powered by 33 Million Code Completions: Codetrails Connect 1.2

Inversion of Control from First Principles - Top Gear Style

Tonight: James May writes "Hello, World!", Richard Hammond cleans up the mess and Clarkson does some shouting. When most people first try to apply good OO de...

Unit Testing and TDD: Why you should care and how to make it happen

Roy Osherove spoke at the Siemens Healthcare Testing Conference. more info at http://5whys.com by Roy Osherove

opserver/Opserver · GitHub

Opserver is a monitoring system by the team at Stack Exchange, home of Stack Overflow. It is a tool for monitoring: Known as “status” internally, Opserver provides a fast overall view of all our major systems that also allows drilling in for more detail.

Star Trek 1971 Text Game

A Bit of History Two years after the original series was canceled in 1969, high school senior Mike Mayfield was busy keeping the Star Trek universe alive by feeding punched paper tape into a Sigma 7 in an effort to bring the crew of the Enterprise and the Klingon Empire to life on a 10 character-

No More Callbacks: 10,000 Actors, 10,000 Threads, 10,000 Spaceships

I recently stumbled across this quote 1 by Doron Rajwan of Intel: “For the past 30 years, computer performance has been driven by Moore’s Law; from now on, it will be driven by Amdahl’s Law. Writing code that effectively exploits multiple processors can be very challenging.

Game Programming Patterns / Design Patterns Revisited / Command

I’m pumped about this chapter because Command is one of my favorite patterns. Most large programs I write, games or otherwise, end up using it somewhere. When I’ve used it in the right place, it’s neatly untangled some really gnarly code.

Capturing The Flag, SQLi-Style

Penetration tester and long-time security professional Sumit "Sid" Siddharth is a big believer in the importance of practicing exploitation to gain better insight about vulnerabilities. "The only way you can understand the true impact of vulnerabilities is by practicing exploitation.

The NSA back door to NIST

Thomas C. Hales (University of Pittsburgh) Use once. Die once. — activist saying about insecure communication

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.