All Posts (17)

  • Publisher's avatar
    Rustaceans
    ·
    Luhn's Algorithm

    Luhn's algorithm, also known as "modulus 10", is a checksum formula that is widely used across different industries, such as financial firm and governments.

    • encoding
    • hash
    • algorithm
  • Publisher's avatar
    UX Collective
    ·
    Antialiasing

    I've heard about the jargon anti-aliasing a lot but didn't gather enough courage to actually find out what it is as I thought it is something that only some deranged mathematician can understand. Turns out that I was wrong and it was dead simple.

    • graphics
    • game
    • algorithm
  • Publisher's avatar
    Rustaceans
    ·
    Cyclic Redundancy Check

    Cyclic Redundancy Check (CRC) is an algorithm that is used to detect errors in digital communication and storage systems. CRC comes with varying bit sizes that determine how long the checksum it produced. The commonly used CRC are 8-bit, 16-bit, 32-bit and 64-bit.

    • algorithm
    • hash
    • error
  • Publisher's avatar
    UX Collective
    ·
    Secure Shell (SSH)

    Secure Shell (SSH) is a cryptographic protocol that enables secure communication between two devices over an unsecured network. It is used for remote login, command execution and file transfer.

    • protocol
    • ssh
    • remote
  • Publisher's avatar
    Rustaceans
    ·
    Byte Order Mark

    Byte Order Mark (a.k.a BOM) is a special marker used in the encoding of a text file or a stream. It is represented as U+FEFF in unicode. It can be thought of just an arbitrary text appended to the original content of a file or a stream.

    • bytes
    • concepts
    • encoding
  • Publisher's avatar
    gitconnected
    ·
    Code Review

    Code review, or PR review is the process of exchanging information and improving the code that is proposed to be included in the newer version of a software system until all parties involved are satisfied with the changes.

    • engineering
    • pullrequest
  • Publisher's avatar
    Rustaceans
    ·
    Endianness

    In the classic novel Gulliver's Travels by Jonathan Swift (1726), there is a silly debate between two groups of people on whether to break an egg through the wider end or the narrower end. These two groups of people are called big-endians and little-endians respectively.

    • bytes
    • concepts
    • encoding
  • Publisher's avatar
    gitconnected
    ·
    Object Relationships

    In Object-Oriented concept, a relationship refers to the way in two or more classes interact with each other within a system.

    • theory
    • system
  • Publisher's avatar
    UX Collective
    ·
    Getting Started

    This template is best used for static sites such as documentation and portfolio showcase that can be benefited by using Markdown.

    • tutorial
    • guide
  • Publisher's avatar
    gitconnected
    ·
    Debugging with Git

    There are much more Git commands that can be quite handy apart from the usual fetch, commit, or push commands. This short article will introduce 3 useful Git commands namely bisect, grep and blame.

    • git
    • debugging
    • grep
  • Publisher's avatar
    gitconnected
    ·
    Python Interop with Julia

    Julia is extremely versatile when it comes to interop with other programming languages and environments such as C, Python, R and Java.

    • julia
    • python
    • interop
  • Publisher's avatar
    gitconnected
    ·
    Installing PySpark on Windows

    Getting started with PySpark in the local Windows machine can be a little bit tricky as it requires Apache Spark to be installed first and it has quite a number of dependencies that have complicated installation steps.

    • python
    • spark
    • setup
  • Publisher's avatar
    gitconnected
    ·
    Bloom Filter

    Bloom Filter is a data structure that allows rapid lookup on an element, say a string whether it is present in a set. Implementation-wise, it is a bit vector that contains an array of zeros and ones (booleans) with a fixed length. It is known for its space and time efficiency.

    • data
    • structure
    • hash
  • Publisher's avatar
    UX Collective
    ·
    Hosting a Minecraft Server Locally

    Hosting a Minecraft server can be expensive for casual players. Free services like Athernos are laggy at times. Moreover, the saved files might get lost on the server entirely. All the painstaking effort to the world has gone in vain. Hence, it is imperative for us to self-host the server ourselves.

    • minecraft
    • server
    • ngrok
  • Publisher's avatar
    gitconnected
    ·
    LaTeX

    LaTeX is a popular typesetting language that is used broadly in writing documentations and scientific papers. This is the basic structure of a LaTeX document.

    • science
    • latex
    • cheatsheet
  • Publisher's avatar
    gitconnected
    ·
    Obfuscation

    Obfuscation is the act of deliberately converting a piece of source code into codes that are difficult for human to understand to conceal its true purpose, but the functionality remains unchanged and are perfectly executable by computers.

    • encryption
    • c
    • security
  • Publisher's avatar
    UX Collective
    ·
    Quine

    A quine is referred to the code that upon execution, will produce the exact same code that was executed prior as the output. It exhibits the idempotency property. Quine is also known as "self-replicating programs" or "self-copying programs."

    • c
    • cpp
    • python