Network Working Group M.
Clients are Jerks: aka How Halo 4 DoSed the Services at Launch & How We SurvivedAt 3am PST November 5th 2012 I sat fidgeting at my desk at 343 Industries watching graphs of metrics stream across my machine, Halo 4 was officially live in New Zealand, and the number of concurrent users began to gradually increase as midnight gamers came online and began to play.
Recognising a Bad User Interface at First GlanceWhen I wrote my previous blog post, it dawned on me that a trained eye can often spot unfriendly software a mile away. It’s just like forming and making a first impression when you meet someone new. Apparently, this takes about one-tenth of a second.
Man Noticed This Abandoned Hangar But Whats Inside Caught Him By SurpriseUrban explorer and photographer Ralph Mirebs found something very rare; a find unlike anything we’ve seen before. While venturing around Kazakhstan, Ralph came across an enormous abandoned building. At first, the building looked similar to a large airport hangar but much larger.
Breaking the house — MediumThis is the story of how we lost around $1 million worth of bitcoin to a hacker who exploited our online casino’s RNG system. This happened last year, but we’ve decided to share our experience for transparency and so that others can learn from our mistakes.
The Point Of InterfacesI used to think interfaces were a premature abstraction. In other words: something you did so that you could migrate or switch implementations/providers in some not so probable future.
Misconceptions about code reuseWe all have been taught that reusable code is good. We all know why we should do it but there are some misconceptions about how to do it. Mostly these misconceptions are the result of procedural thinking. People usually understand how certain object-oriented principles work.
Mock Server powered by Mountebank and DockerWhen building applications which are dependent on other systems e.g. for business logic or data integration purposes the question of testing without these systems arrises. In a classic approach we usually mock them out on a unit test or functional test basis.
Answers to password reset questions are passwords too — so why aren’t you treating them that way?If you’re a developer working on or maintaining a website catering to the general public, chances are you’ve implemented some form of password reset via security question-and-answer into your site.
Nee, je hebt wél iets te verbergenVan het massaal surveilleren van burgers door de Amerikaanse inlichtingendienst National Security Agency (NSA) tot de verplichte vingerafdruk in het paspoort: onze privacy staat onder druk. In Nederland worden de zorgen hierover niet breed gedeeld.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.