Tags » Shared State

Model comparison

A long time overdue post…

One of my preferred slides when presenting my transactional model compares different locking models. I start with the most restrictive model, a single global lock: 735 more words


Security: debunking the 'weakest link' myth.

“The user is the weakest link”, “”Problem Exists Between Keyboard And Chair”, “Layer 8 issue”. We have all heard these mentioned hundreds of times. Most security specialist truly believe it to be true , but in this blog post I will not only show that NO, the user is not the weakest link, I hope to also show that in fact the ‘believe’ that the user is the weakest link may be the reason that our information security industry appears to be stuck in the 1990s. 1,252 more words

This week on twitter we find ourselves back on the subject of OWIN, and once again the battle lines are drawn and there is source of much consternation. 764 more words


RaiiCap pattern: Injected Singleton alternative for C++

The Singleton design pattern is a so called creational pattern from the venerable GoF design patterns book. While this book is often seen as something of a software engineering Bible, the Singleton pattern I dare say (at the risk of being stoned to dead by GoF bigots) is one that , while being widely used and being immensely popular in software design, is in fact a very controversial pattern. 1,279 more words

F# Epiphany

When I first started exploring F# – Microsoft’s .NET dialect of OCaml – I was mystified. How could a hybrid object-oriented / functional language even work? 228 more words



People who have read my blog, have read my article, of been at any of my public talks know about the problems of the unix $HOME and $TEMP facilities. 1,119 more words

Why Functional?


If you’ve read the first post, you’ll already know that I’m a fan of functional languages. Why would I have an interest in such an academic, ivory tower, funny-beard-and-sandals concept? 747 more words

General Principles