News broke today about a widespread security flaw in OAuth and OpenID. The written material is a bit short on actual explanations or actionable steps, which is unfortunate when the flaw claims to affect virtually all OAuth providers and must be patched in the OAuth client applications.
The Human Centipede Development MethodHuman centipede development is when one engineer is given half finished crap and and must half finish it further for the next engineer. This method is very efficient at producing high velocity crap and maximizing engineer misery.
John Fremlin's blog : The mmap patternThere are many choices in software engineering that are visible only to the developers on the project: for example, the separation of responsibilities into different parts of the program are (hopefully) invisible to the user.
10 Tools Every Software Developer Should Know, RevisitedAfter trade school, a mechanic needs to obtain their own set of tools. Garages only provide big equipment, such as lifts. Mechanics bring tools that they prefer/can afford to put in their toolbox. Likewise, software development shops do not dictate required tools to engineers.
Let's Write Some X86-64…“‘Our speech interposes itself between apprehension and truth like a dusty pane or warped mirror. The tongue of Eden was like a flawless glass; a light of total understanding streamed through it. Thus Babel was a second Fall.
One of the things I end up doing is do a lot of performance profiling on core…One of the things I end up doing is do a lot of performance profiling on core kernel code, particularly the VM and filesystem. And I tend to do it for the "good case" - when things are pretty much perfectly cached.
Using Facebook Notes to DDoS any websiteFacebook Notes allows users to include <img> tags. Whenever a <img> tag is used, Facebook crawls the image from the external server and caches it.
BitCoins Lost, MongoDB and Eventual ConsistencyThe recent theft from several BitCoin operators has sparkled a debate whether eventually consistent databases are useful or not for banking. On March 2, 2014 Flexcoin lost all its bitcoins due to a code flaw.
When a Space Is Not Just a SpaceDuring a recent email exchange with our search team, Nick Patch, our resident Unicode expert, offered the following advice for a chunk of Java code used to detect Japanese characters: > Pattern.
Want to introduce fewer bugs? Test through these five cases.Truth be told, DoneDone is a piece of software I want to use as infrequently as possible. If I use DoneDone a lot, it means I’m making (or finding) a lot of mistakes.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.