The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 4,262 other subscribers

Archive for February, 2017

Page dewarping

Posted by jpluimers on 2017/02/28

Flattening images of curled pages, as an optimization problem.

Source: Page dewarping [WayBack]

Great stuff what some day will be very useful as I’ve a truckload of books that need to be scanned someday.

via:

–jeroen

PS: via [WayBackG+ Joseph Mitzen: [WayBackFlameeyes’s Website — Unpaper (fork) repository at [WayBackFlameeyes/unpaper: Forked unpaper repository

Posted in Algorithms, Development, Software Development | Leave a Comment »

230 V safety on the work bench – Put your power supply in an old tablet container…

Posted by jpluimers on 2017/02/28

Great tip from Nelis Willers:

230 V safety on the work bench.
Put your power supply in an old tablet container. The high voltage is safely encapsulated and will not accidentally touch something. Of course don’t do this for a kW supply, only where low heat is generated, otherwise you might set a fire!

Source: 230 V safety on the work bench. Put your power supply in an old tablet container…

Posted in Development, Hardware Development, LifeHacker, Power User | Leave a Comment »

New book by +Nick Hodges tech preview by +Stefan Glienke – dependency injection in delphi

Posted by jpluimers on 2017/02/28

[WayBack] New book by +Nick Hodges tech preview by +Stefan Glienke https://leanpub.com/dependencyinjectionindelphivia Jeroen Wiert Pluimers – Google+:

This book covers Dependency Injection from A to Z.  In it you’ll learn about Constructor Injection, Property Injection, and Method Injection.  You’ll learn about the right and wrong way to use the Dependency Injection Container.

Source: Dependency Injection In Delphi by Nick Hodges [Leanpub PDF/iPad/Kindle]

This is the Chapter List:

  • What is Dependency Injection
  • Benefits of Dependency Injection
  • Constructor Injection
  • Property Injection
  • Method Injection
  • Using the Container
  • A Simple Migration Example
  • Advanced Uses of the Container
  • Dependency Injection Anti-patterns
  • A Full, Useful Example
  • Final Thoughts

–jeroen

Source: New book by +Nick Hodges tech preview by +Stefan Glienke https://leanpub.com/…

Posted in Delphi, Delphi 10 Seattle, Delphi 10.1 Berlin (BigBen), Delphi 2010, Delphi XE, Delphi XE2, Delphi XE3, Delphi XE4, Delphi XE5, Delphi XE6, Delphi XE7, Delphi XE8, Development, Software Development | Leave a Comment »

Interesting historic read of notes on end 1970s Apple SSAFE project – how it started and ended

Posted by jpluimers on 2017/02/27

This appeared a few days back: [WayBackhttp://bitsavers.trailing-edge.com/pdf/apple/ssafe/Apple_SSAFE_Project.pdf

It’s about “Software and Security from Apple Friends and Enemies” an early exchange of ideas and possibilities for DRM in the Apple ][ and Apple III era.

I got it via my bitsavers.org RSS subscription, but it has been over the net in quite a few other places as well:

I think the most important quote is from the one on reddit, submitted 20170223 by vadermeer  for which I added some WayBack/Archive.is links:

[WayBackFound Internal Apple Memos about copy protection for Apple II, SARA, LISA(self.VintageApple)

Yesterday at the Seattle Goodwill Outlet, where everything is sold by the pound, I noticed the Apple logo on letterhead sticking out from a bin of books, so I started digging. What I found were the 1979-1980 files of Jack MacDonald, manager of system software for the Apple II and /// at the time

They tell the story of project “SSAFE” or “Software Security from Apples Friends and Enemies.” This was a proposal to bring disk copy protection in-house to sell as a service to outside developers. Inter-office memos, meeting notes and progress reports all give a good idea of what a project lifecycle was like. Different schemes and levels of protection are considered, as well as implementation primarily on the Apple II+ and the upcoming SARA (The Apple ///) and Lisa computers. [WayBackRandy Wigginton is featured prominently throughout, along with mentions of Woz and many other familiar names.

The documents were all a jumble so I’ve put them in chronological order and scanned the collection, please enjoy. [Archive.is]

The reddit thread is very nice reading as it explains how close we are now to this Level 1:

Level 1. Totally secure. Absolutely no method of stealing the software. 100% effective. Note that the ideal, level 1, is achievable only through disallowing any access of any kind to the software and the computer. Not very practical in our circumstances.

and this one from boingboing:

It’s so neatly packaged and well-documented it could be a Harvard Business Review case-study.

–jeroen

Posted in 6502, Apple, Apple ][, History, Power User | Leave a Comment »

Maybe Probably Dance wrote the fastest hashtable implementation ever

Posted by jpluimers on 2017/02/27

Long read: well worth it. [WayBackI Wrote The Fastest Hashtable | Probably Dance

github repository: skarupke/flat_hash_map: A very fast hashtable

source download: https://github.com/skarupke/flat_hash_map/blob/master/flat_hash_map.hpp

–jeroen

Posted in C++, Development, Software Development | Leave a Comment »