The code monkey’s guide to cryptographic hashes for content-based addressing

At long last, I've written and published the "compare-by-hash for programmers" article everyone's always been asking for. You can read it chopped into 17 pieces and partially obscured by floating ads here: http://www.linuxworld.com/news/2007/111207-hash.html (My editor says: Please please complain about this! No one believes me when I say this is bad!) Or you can read … Continue reading The code monkey’s guide to cryptographic hashes for content-based addressing

Truth in advertising

This morning, the phone rang (a rare occurrence in my household). I picked up my VoIP phone with caller ID, and saw: PROMO OFFER 1408(don't remember) Wow! A telemarketer with a descriptive caller ID and a valid-looking 408 phone number! It's like receiving spam entitled: "SPAM: Unsolicited commercial mailing" with a valid From: address. The … Continue reading Truth in advertising

Overheard in Portland

Scene: Busy Portland coffee shop, Sunday afternoon. VAL, a workaholic programmer transplanted from the Bay area, is typing intently on her laptop. Enter four middle-aged men, talking loudly. They choose the table next to VAL and engage in much good-natured (and loud and annoying) shuffling around and unpacking of laptops. Their leader finally calls them … Continue reading Overheard in Portland