Archive for February, 2010
This might sound really strange…. but failing does not necessarily mean that you have a problem!
As some of you are aware, creating flawless software is a difficult and long process. Mistakes are common and your users will undoubtedly have some sort of bad experience somewhere along the way. No software is perfect! So if it is unavoidable, what do you need to do about it!? Well, preparation is key!
There is a time for constance and time for change. I have found myself in a place where I needed change. The past few years I’ve been working on and off and finished my bachelor (after some extra time spent doing other things then school). After my bachelor I carried on into a master that I was convinced suited me perfectly. I was right… a little too right!
After 8 years in the Dutch higher educational system I’ve had enough! I needed a change from being caught in between study and work.
Hacking… What is the first thing that comes to mind when you hear the work hacking? Well, most of you will probably think about getting illegal access to a secured system. I’m not talking about that kind of hacking!
Hacking is the beautiful art of using something in a way it was not intended by the creator of it. A great example are SMS text messages for mobile phones. These were originally developed to as a way for mobile operators to send service messages to there clients. Then somebody found out how to use it so send messages to somebody else. This was not intended by the creators of SMS. But it did become the main use for the that particular service!
One campus, 2 days + some nights, about 250 sessions and +5000 geeks. The European meet-up for the open-source people!
What was my part? Following sessions, supporting in one session and talking a lot to all the people I know and don’t know within the community.
What I took away from it? 4 t-shirts, 5 buttons, loads of stickers, new knowledge/information, new ideas and lots of new cont(r)acts.
The short story is: arrive Friday around 5pm, get to the Renaissance Brussels hotel, get something to eat before going to Delirium, finding people to talk/drink with, get to bed, wake up and get myself to campus, follow some sessions, support on the CBAC session, get myself to the joostians (former Joost Technologies employees) dinner, have some drinks with the joostians, get to bed, wake up and check out of the hotel, get myself to campus and plant myself in the back of the mozilla room, follow some other sessions afterwards!? and get my ass back on the train home.
Wanna know more? Read the rest of this entry »
Today I created the ALPHA stying for CBAC (Context Based Access Control). CBAC is a security gem for Ruby on Rails and adds an extra abstraction layer to the well known RBAC (Role Based Access Control). With CBAC you can add context based security to your Rails app in just a few simple steps. I’m proud to be the first to blog about this new security system for rails!