Replace Evernote with Spidernote

Sunday 2014-03-02

Resistance is futile

In the past I have used Evernote extensively, it really helped me in my research for this blog and keeping track of meeting notes, todo lists and even making pictures of whiteboards at work searchable. As a product, there is no note taking app that can beat Evernote. But there is a little problem that has become a deal breaker for me, and that is basically the NSA and the way Americans, and particularly the American government seems to think about people’s privacy and online security.

Evernote is an American company, which sadly has to comply with whatever ridiculous request by the U.S. government to turn over data of innocent people all over the world (yes, even outside the U.S. border, I know, it’s amazing). This, combined with the fact that Evernote clearly can not use zero-knowledge encryption because of the services it provides, makes that all the data you and I put into Evernote are at NSA’s fingertips at all times. If you find that as scary as I do, and you have a Mac, there is a way to solve this. Read the rest of this entry »

From the Finder to the Shell (and back)

Friday 2013-12-20

A quick tip for OSX users out there who frequently need to open a Terminal window for the current location in the finder, or the other way around:

Go2Shell and Back

Install the free application from the App Store: Go2Shell. It will give you an icon on the toolbar of your Finder, and pressing it will open a Terminal window and automatically change it’s directory to match the Finder’s location.

The other way around is easier; you can already do that on any Mac. Simply type “open .” (that’s the word “open”, followed by a space and a period). This command will open a Finder window for the directory location your Terminal window is in.

Bonus tip: Also check the “open -t [filename]” command, it will open your system’s default text editor with the given file.

Anonimatron: Quick Start

Sunday 2013-11-03

Anonymous customerAfter reading my last blogpost on Anonimatron, you must have asked yourself “Great, but how do I actually use Anonimatron to de-personalize my database”? I tried my best to make basic Anonimatron configuration as self-explanatory as possible, just start it without any command line arguments and it will tell you.

Less adventurous or in a big hurry? This blogpost will show how simple it is to install and configure Anonimatron on an example MySQL database.

Read the rest of this entry »

Anonimatron: Overview

Thursday 2013-10-31

It's the LawIn every software project, there comes a time where a bug pops up, nobody knows how to reproduce it, and somebody says “I know, let’s test this against a copy of the production database”. Even with the best intentions, once production data leaves the production machine with all its safeguards it becomes really hard to do access control on that data.

Most of the time, it’s not even needed to have that data. Developers just need a data set which resembles the production scenario close enough. Some brave souls have mixed succes with data generators, but those generators usually are tedious to maintain and die a slow death under the pressure of the daily grind.

In some ambitious projects automated integration testcases are built on top of the data which was inserted by the data generators. As the generators die, so die the tests. If you recognize this pattern, Anonimatron might be the answer for you.

Read the rest of this entry »

iOS7 hidden features

Saturday 2013-09-28

ios-7-logoIf you’ve just installed iOS7 and like it as much as I do, you are probably interested in all the new features of it, and where to find them. On behalf of Apple, I’ll be happy to point out where all those neat new features are, and share my happiness about this wonderful new magical market-leading mobile OS.

Read the rest of this entry »

Non-Java Binary Dependencies in Maven

Thursday 2013-07-18

binary-pillowSuppose you have a Java Server application, and some of the runtime binaries in that application are external to your application. Generated image files, compiled Silverlight components in your pages, or resource files which are managed by an external team.

Much like the jar files used by your application, these external binaries can be seen as dependencies, with versions. This blogpost assumes your project is built with Maven 2, because the real world isn’t always a greenfield project.

Because Maven is designed around jar file dependencies, and a lot of it’s internal decisions are based on file extensions, it looks like this problem can not be tackled with Maven. But there is a way to do this. It will decouple your sub-projects and make version and dependency management much better.

Read the rest of this entry »

How big is 5 Zettabyte?

Sunday 2013-06-23

Spy vs SpySince the interview of Edward Snowden with the Guardian, the discussion about privacy and companies storing and sharing unencrypted private data is picking up. Particularly Americans are worried about what it does for their National security and their private data. But that’s actually a naive thought, given the NSA stores worldwide data.

In a recent coverage on (a rather tabloid-looking news station in the U.S.), the interviewers are shocked to see that the NSA spies on “every American”.

This is a limited view of the world and failing to see the importance of spying on people outside the U.S., but lets start with technical side of things first. What data are they storing and how big is their hard-disk?

Read the rest of this entry »


Get every new post delivered to your Inbox.

Join 31 other followers