The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,854 other subscribers

Archive for the ‘Development’ Category

Reminder to self: write Bookmarklet to assemble URL for Amazon Shipping ID

Posted by jpluimers on 2024/11/21

Example URL: [Wayback/Archive] track.amazon.com/tracking/NL2017506177

Via: [Wayback/Archive] Amazon Shipping

Related: Read the rest of this entry »

Posted in Bookmarklet, Development, JavaScript/ECMAScript, Scripting, Software Development, Web Browsers | Leave a Comment »

The Twelve-Factor App

Posted by jpluimers on 2024/11/21

Still relevant: [Wayback/Archive] The Twelve-Factor App and [Wayback/Archive] 12 Fractured Apps — Medium

Once Docker hit the scene the benefits of the 12 Factor App (12FA) really started to shine. For example, 12FA recommends that logging should be done to stdout and be treated as an event stream. Ever run the docker logs command? That’s 12FA in action!

Via

–jeroen

Posted in Back-End Development, Cloud Development, Communications Development, Conference Topics, Conferences, Deployment, Developing scalable systems, Development, DevOps, Distributed Computing, Event, Software Development | Leave a Comment »

GitHub – ggerganov/whisper.cpp: Port of OpenAI’s Whisper model in C/C++

Posted by jpluimers on 2024/11/20

For future experimentation transcribing voice conversations: [Wayback/Archive] GitHub – ggerganov/whisper.cpp: Port of OpenAI’s Whisper model in C/C++

Whisper (speech recognition system) usually runs in the cloud (someone else’s computers, often rentable for a substantial monthly sum).

Via

  1. [Wayback/Archive] Jeroen Wiert Pluimers: “Wat is een goede tool voor transcriptie van Nederlandse tekst voor hobbymatig gebruik?…” – Mastodon
  2. [Wayback/Archive] bert hubert 🇺🇦🇪🇺: “@wiert whisper.cpp als je handig bent…” – Fosstodon

Now hopefully Whisper works well with the Dutch language…

I later realised Jeff Geerling mentioned Whisper a while ago as well:

Read the rest of this entry »

Posted in AI and ML; Artificial Intelligence & Machine Learning, C++, Development, LifeHacker, Power User, Software Development | Leave a Comment »

Generate a GUID in Windows 10 (Globally Unique Identifier)

Posted by jpluimers on 2024/11/20

A while ago, I needed to generate GUIDs on any Windows console so performed a [Wayback/Archive] generate guid windows terminal – Google Search, found [Wayback/Archive] Generate a GUID in Windows 10 (Globally Unique Identifier) and came up with this generate-guid.bat file:

powershell [guid]::NewGuid()

–jeroen

Posted in CommandLine, Console (command prompt window), Development, PowerShell, PowerShell, Scripting, Software Development, Windows | Leave a Comment »

Un4seen.Bass Namespace – BASS.NET API for the Un4seen BASS Audio Library

Posted by jpluimers on 2024/11/19

A while ago, within a week time, I got reminded of a project I did some 15 years ago involving low-latency audio using the .NET platform on Windows XP Embedded.

For that I used the BASS.NET wrapper classes and P/Invoke methods around the Un4seen BASS Audio Library.

Back in those days there was not much documentation about this, but now there is more.

Some starting points are:

Via:

Related:

--jeroen

Posted in .NET, Audio, Conference Topics, Conferences, Development, Event, LifeHacker, Media, Power User, Software Development, Windows Development | Leave a Comment »

crt.sh allows you to search for the history of TLS certificates for domains (example: *.wiert.me)

Posted by jpluimers on 2024/11/19

I while ago, I bumped into [Wayback/Archive] crt.sh | Certificate Search that allows searching for (the history of) TLS certificates.

One example of what it returns is [Wayback/Archive] crt.sh | wiert.me (for my blog domain and subdomains).

The basic mechanism of crt.sh is to query various Certificate Transparency logs and Certificate revocation list, terms I vaguely knew, but never fully realised the vast usefulness of (including questions like [Wayback/Archive] How does crt.sh becomes aware of certificates that are in no CT logs?).

The cool thing is that most (everything?) of it is open source in the various repositories at [Wayback/Archive] Github: crt.sh.

There is also an advanced search page [Wayback/Archive] crt.sh | Certificate Search (a=1) with many more options (including linting) I really want to try later plus a bunch of background links (including the support forum at) of which some *.crt.sh returned a http 502 while writing this blog post. Will try later to see if they have started working again:

Read the rest of this entry »

Posted in Communications Development, Development, Encryption, HTTPS/TLS security, Internet protocol suite, Power User, Security, TCP, TLS | Leave a Comment »

Hans Otten @hansotten@mastodon.social on X: “PiDP-11/70 with a real PDP-11 CPU, a DCJ11-AF”

Posted by jpluimers on 2024/11/14

Where old history meets modern history: [Wayback/Archive] Hans Otten @hansotten@mastodon.social on X: “PiDP-11/70 with a real PDP-11 CPU, a DCJ11-AF”

Read the rest of this entry »

Posted in Development, Emulators, Hardware Development, History, Power User, Raspberry Pi | Leave a Comment »

Famous AI Artist Says He’s Losing Millions of Dollars From People Stealing His Work

Posted by jpluimers on 2024/11/13

Using generative AI for your work can very likely result into your work not being copyrightable, at least in the USA: [Wayback/Archive] Famous AI Artist Says He’s Losing Millions of Dollars From People Stealing His Work

The guy who used Midjourney to create an award-winning piece of AI art demands copyright protections.

Now, in an ironic twist, Allen is upset that his work—which was created via a platform that’s been accused of ripping off countless copyrighted works—cannot, itself, be copyrighted, and is thus getting ripped off. In March of last year, the U.S. Copyright Office ruled that work derived from AI platforms “contained no human authorship” and therefore could not be extended copyright protections. Allen has been trying, since late 2022, to register his painting as a copyrighted work.

Links from the above quote:

Via [Wayback/Archive] Fefes Blog: Not the Onion.

Wikipedia:

--jeroen

Posted in AI and ML; Artificial Intelligence & Machine Learning, Awareness, Conference Topics, Conferences, Event, Generative AI, LLM, Software Development | Leave a Comment »

GitHub – src-d/hercules: Gaining advanced insights from Git repository history.

Posted by jpluimers on 2024/11/12

[Wayback/Archive] GitHub – src-d/hercules: Gaining advanced insights from Git repository history.

This project, with the command-line tools hercules and labours is on my research list as it can get pretty good long-term insights on project health (the tool is programming language independent).

Especially the half-life of code is a good measurement, as well as the existence of code bursts (hello major version increments!).

This research part is important: [Wayback/Archive] Change Bursts as Defect Predictors – Publications – Software Engineering Chair (Prof. Zeller), by Nachiappan Nagappan, Andreas Zeller, Thomas Zimmermann, Kim Herzig, Brendan Murphy

Read the rest of this entry »

Posted in BASTA!, Conference Topics, Conferences, Development, DVCS - Distributed Version Control, EKON, git, ITDevCon, Software Development, Source Code Management, Static Code Analysis | Leave a Comment »

How to Weaponize the Yubikey – Black Hills Information Security

Posted by jpluimers on 2024/11/12

I totally missed this back in 2019 when having the first belly surgery (that eventually would lead up into discovering I had already had rectum cancer at that time) [Wayback/Archive] How to Weaponize the Yubikey – Black Hills Information Security.

Luckily I got a reminder: [Wayback/Archive] jilles.com on Twitter: “/me the asshole that spoils the magic trick …” after [Wayback/Archive] yan on Twitter: “who’s excited for defcon next week”

Read the rest of this entry »

Posted in 2FA/MFA, Authentication, Development, Hardware, Hardware Interfacing, Power User, Security, Software Development, U2F FIDO Security Keys, USB, USB | Leave a Comment »