Continuing the "firehose" tradition of maximum information density, Xiph.Org's second video on digital media explores multiple facets of digital audio signals and how they really behave in the real world.What every software engineer should know about search
Ask a software engineer: “How would you add search functionality to your product?” or “How do I build a search engine?” You’ll probably immediately hear back something like: “Oh, we’d just launch an ElasticSearch cluster. Search is easy these days.Finding the First 10-digit Prime in (a Billion) Digits of e
Apollo 14 almost never made it to the lunar surface thanks to a hardware failure which caused a short circuit in the abort switch. With the computer seeing the abort switch enabled the software team back on earth had a limited amount of time to figure out how to make the computer ignore the erroneouImmutability: The way to remain unchanged
One of the cornerstones of Functional Programming is the idea of immutability. Although frequently misconstrued, Immutability is simply the concept that once we set a value, that object or variable will not change. Once we set that value, any attempts to change it will create a new object.Software development 450 words per minute
"Something's a little bit off here." That's what I predict your first thought to be upon seeing my cubicle for the first time. There's no screen or mouse in sight. Instead there's a guy hammering away on a keyboard, staring at seemingly nothing.201708 : apenwarr
Last November I went to an IETF meeting for the first time. The IETF is an interesting place; it seems to be about 1/3 maintenance grunt work, 1/3 extending existing stuff, and 1/3 blue sky insanity.Passwords Evolved: Authentication Guidance for the Modern Era
In the beginning, things were simple: you had two strings (a username and a password) and if someone knew both of them, they could log in. Easy. We're talking back in the 60's here so a fair bit has happened since then.Unleashing the Power of .NET Big Memory and Memory Mapped Files
Key Takeaways Web servers often have far more memory than the .NET GC can efficiently handle under normal circumstances. The performance benefits of a caching server are often lost due to increased network costs. Memory Mapped Files are often the fastest way to populate a cache after a restart.How to securely hash passwords?
If I hash passwords before storing them in my database, is that sufficient to prevent them being recovered by anyone? Of course any form of hash will not prevent those attacks.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.