-
How to get random numbers into Yahoo Pipes?
In what follows I will present two methods for obtaining random numbers inside a Yahoo Pipes setup. The first method is based on obtaining the current timestamp and using it your random number. The advantage of this method is that it is quick (you don’t need to access third-party websites). This disadvantage is that it’s…
-
A free, open-source, cross platform alternative to VirtualDub
I’ve been a long fan on VirtualDub, a great linear video-editing software (and it is also free and open source). The only thing which bothered me was the limited number of input/output formats supported. There were some forks of it, but they pretty much died off. However in the latest full circle magazine I think…
-
Random Database Blogging
From the Database and Performance blog: Queuing Theory & Resource Utilization – a lightweight introduction into the field which explains why you don’t have linear growth all the way – at a moment you hit a magic ceiling and things get much worse. PostgreSQL Replicator is an other way to replicate your PostgreSQL database. Now…
-
How to create nice surveys?
Disclaimer: I’m not a psychologist, this is just my personal opinion. There might be some reasons for this behavior, but it is still very annoying. Also, this is about free surveys where the people filling it out are making you a favor. If you provide some kind of compensation for their time (ie. pay them),…
-
PHP security is scary!
I knew that PHP limits the amount of memory that one script can allocate, so life is good, right? Right? Wrong! Reading the documentation it states: Changeable – PHP_INI_ALL, meaning that you can change it using ini_set from the script itself. Even worse, it goes on to say: “Note that to have no memory limit,…
-
Random Java blogging
From the JUnit FAQ: Each test runs in its own test fixture to isolate tests from the changes made by other tests. That is, tests don’t share the state of objects in the test fixture. Because the tests are isolated, they can be run in any order. Very important to keep in mind if you…
-
Instruction Manual for Life
Via Neural Market Trends: It is worth watching, and it went in a totally different direction than I anticipated after the first seconds.
-
Google broke the Internet!
Short summary: Google maintains a list of “malicious URL’s”. This list is used both to offer warnings on the search results and to warn users in third-party applications (like Firefox 3) via the Google Safe Browsing API. The format of the blacklist is such that arbitrary subelements of the URL can be used. This is…
-
Reason #341 for using stackoverflow.com
I’ve written about stackoverflow.com, a place to ask and answer programming questions. And here is an other reason to use it: they have great error pages 🙂 And today I’ve learned something new on SO from Oliver Giesen (also, his SO profile): you can’t delete executable files which are “in use” (programs are being run…
-
You say features, I say (possible) vulnerabilities
I was listening to a recent MindOfRoot podcast (good podcast BTW if you are interested in IT type topics) which included an interview with a Microsoftie about WS-MAN (sorry for not recalling the exact name of the person). If you don’t know (I didn’t) WS-MAN stands for (drum roll please): web services management. That’s right…