Rob Janssen

All | Unread | Read

How does SQLite work? Part 2: btrees! (or: disk seeks are slow don't do them!)

Welcome back to fun with databases! In Part 1 of this series, we learned that: Let’s understand a little bit more about how these btrees work! First, some theory.

Notebook

The recent disclosure of a critical security flaw in the widely used bash command-line shell for Unix operating systems sent many technology professionals scrambling to update their systems. We were certainly among them.

StephenWattam.com

If you've worked with text data long enough, you've probably come across issues with garbled characters and character set incompatibilities.

New experimental console features in Windows "Threshold"

Microsoft is expected to deliver its first technical preview release of Windows codenamed "Threshold" tomorrowish. And while the usual outlets will be covering the big changes, I wanted to document a relatively smaller set of welcome changes to the Command Prompt (and the underlying Console Host).

This is what happens when two pixel-mashing bots get in a Twitter fight

This week saw a truly bizarre twitter fight between two image-mashing bots. In the red corner, there was @pixelsorter, designed to create relaxed, fuzzy remixes of photos, like the one above.

Mining Bitcoin with pencil and paper: 0.67 hashes per day

I decided to see how practical it would be to mine Bitcoin with pencil and paper. It turns out that the SHA-256 algorithm used for mining is pretty simple and can in fact be done by hand. Not surprisingly, the process is extremely slow compared to hardware mining and is entirely impractical.

Introduction to: Linked Data Platform

In its ongoing mission to lead the World Wide Web to its full potential, the W3C recently released the first specification for an entirely new kind of system. Linked Data Platform 1.0 defines a read-write Linked Data architecture, based on HTTP access to web resources described in RDF.

linux : What is a specific example of how the shellshock bash bug could be exploited?

With access to bash, even from the POV of a web user, the options are endless. For example, here's a fork bomb: Just put that in a user agent string on a browser, go to your web page, and instant DoS on your web server.

Required Fields Should Be Marked NOT NULL

Despite some exciting advances in the field, like Node, Redis, and Go, a well-structured relational database fronted by a Rails or Sinatra (or Django, etc.) app is still one of the most effective toolsets for building things for the web.

Scorpion Brings the Stupidest, Most Batshit Insane Hacker Scene Ever

So Scorpion debuted last night on CBS, bringing us the thrilling tale of "geniuses" who help DHS by setting up wifi access points in restaurants. Yes, that is a true plot point.

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.