The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,860 other subscribers

Archive for December, 2014

Which Delphi extensions to (not) put in version control: Delphi File Extensions – Delphi Programming (via Delphi.wikia.com)

Posted by jpluimers on 2014/12/10

Convenient list to decide what to put in your version control system: Delphi File Extensions – Delphi Programming.

–jeroen

Posted in Delphi, Delphi 1, Delphi 2, Delphi 2005, Delphi 2006, Delphi 2007, Delphi 2009, Delphi 2010, Delphi 3, Delphi 4, Delphi 5, Delphi 6, Delphi 7, Delphi 8, Delphi x64, Delphi XE, Delphi XE2, Delphi XE3, Delphi XE4, Delphi XE5, Delphi XE6, Delphi XE7, Development, Software Development | Leave a Comment »

Blast from the past: Deleting empty Delphi .ddp files

Posted by jpluimers on 2014/12/09

In Delphi 6 and 7, .ddp files were used to store the Delphi Diagram Portfolios.
Often these files were created empty like `Empty.ddp`, so it pays to clean up those.

The below batch file (part of the free BeSharp.net code repository) will help with that. Make sure you download this Empty.ddp file and put it in the same directory as the batch file.

Call the batch file with the path to the directory tree you want to delete the Empty .ddp files from. Read the rest of this entry »

Posted in Delphi, Delphi 6, Delphi 7, Development, Software Development | 1 Comment »

Add a Security Key to your Google Account: FIDO U2F Security Key

Posted by jpluimers on 2014/12/08

I just added a FIDO U2F Security Key | Yubico as a FIDO second factor to my Google Account: Add a Security Key to your Google Account – Accounts Help.

The cool thing: if you don’t have your FIDO U2F key with you, you can fall back to Google two step verification mechanisms like Authenticator, SMS/Phone or pre-generated backup security codes.

–jeroen

Posted in Chrome, Google, Google Apps, GoogleAuthenticator, Power User, Security, U2F FIDO Security Keys | 4 Comments »

Embedding a Gist in WordPress is easy (via: Support — WordPress.com)

Posted by jpluimers on 2014/12/08

Boy, I wish I had found out about this a long time ago.

Embedding source code in WordPress web sites has always been a pain, as the Jekyll & Hyde faces of the WordPress Visual & Text keep fighting about the content.

A few artefacts I stumbled upon on a regular base:

Not so any more: just put your code in a public gist, then put the Gist url in the code without making it an actual link. Read the rest of this entry »

Posted in Power User, SocialMedia, WordPress | Leave a Comment »

Durable OnePlus One cases I found so far – via: 1+1 Reddit; cases that compare to an Otterbox?

Posted by jpluimers on 2014/12/05

Via Any durable cases that compare to an Otterbox? : oneplus.

I found these durable cases for the OnePlus One:

–jeroen

Posted in Android Devices, OnePlus One, Power User | Leave a Comment »

StackPrinter: StackOverflow in printable way

Posted by jpluimers on 2014/12/05

Will one day come in handy: About – StackPrinter.

Especially their deleted questions section (if you have 10k + rep that is).

–jeroen

Posted in Pingback, Power User, Stackoverflow, Web Browsers | Leave a Comment »

MVVM, MVP, MVC, OOD, etc: it is all about structure and using common sense.

Posted by jpluimers on 2014/12/04

I’ve done partitioned programming (using various layers for different kinds of functionality) for ages.

The first time I can remember of official terms for it, I already used patterns like that for a couple of years.

Back then the parts were from Object-Oriented Design: Peter Coad, Edward Yourdon, back in a time when each part – back then not called common layer – was called “component”: Read the rest of this entry »

Posted in Delphi, Development, Pascal, Software Development, Turbo Pascal | 2 Comments »

Some links on SSPI/NTLM base64

Posted by jpluimers on 2014/12/03

I bumped into some issues for a client/server project that tried to perform its own SSPI/NTLM base64 authentication on the server side.

Some links that helped me debug that combo:

–jeroen

Posted in Development, SOAP/WebServices, Software Development, Web Development | Leave a Comment »

.NET/C#: some starting posts on the `async` and `await` keywords

Posted by jpluimers on 2014/12/02

Last year’s summer, I posted some .NET/C#: some starting posts on the yield keyword and mentioned that async and await might be the most complicated compiler transform.

So here are some posts to learn more about async and await: Read the rest of this entry »

Posted in .NET, .NET 4.0, .NET 4.5, C#, C# 5.0, Development, Jon Skeet, Software Development | 1 Comment »

Danny Thorpe active on various Bitcoin reposiories – via: Best C# Article of October 2014 Nicolas Dorier – NBitcoin : Build Them All…

Posted by jpluimers on 2014/12/01

Via Best C# Article of October 2014 Nicolas Dorier – NBitcoin I learned that dthorpe (yes, that is indeed Danny Thorpe many people know him from the Delphi, C# and Google world) is active as Contributors to NicolasDorier/NBitcoin and on quite some Bitcoin related repositories.

When we met last summer, he was visiting the Bitcoin 2014 conference in Amsterdam. It is really good to see his activity, and I really hope his Opex.io venture (see his LinkedIn profile) will take off, as his ideas are sound.

–jeroen

Posted in .NET, Bitcoin, C#, Cryptocurrency, Delphi, Development, History, Power User, Software Development, Windows Azure | 3 Comments »