
Luhn's algorithm, also known as "modulus 10", is a checksum formula that is widely used across different industries, such as financial firm and governments.
- encoding
- hash
- algorithm

Luhn's algorithm, also known as "modulus 10", is a checksum formula that is widely used across different industries, such as financial firm and governments.

I've heard about the jargon anti-aliasing a lot but didn't gather enough courage to actually find out what it is as I thought it is something that only some deranged mathematician can understand. Turns out that I was wrong and it was dead simple.

Cyclic Redundancy Check (CRC) is an algorithm that is used to detect errors in digital communication and storage systems. CRC comes with varying bit sizes that determine how long the checksum it produced. The commonly used CRC are 8-bit, 16-bit, 32-bit and 64-bit.

Secure Shell (SSH) is a cryptographic protocol that enables secure communication between two devices over an unsecured network. It is used for remote login, command execution and file transfer.

Byte Order Mark (a.k.a BOM) is a special marker used in the encoding of a text file or a stream. It is represented as U+FEFF in unicode. It can be thought of just an arbitrary text appended to the original content of a file or a stream.

Code review, or PR review is the process of exchanging information and improving the code that is proposed to be included in the newer version of a software system until all parties involved are satisfied with the changes.

In the classic novel Gulliver's Travels by Jonathan Swift (1726), there is a silly debate between two groups of people on whether to break an egg through the wider end or the narrower end. These two groups of people are called big-endians and little-endians respectively.

In Object-Oriented concept, a relationship refers to the way in two or more classes interact with each other within a system.

This template is best used for static sites such as documentation and portfolio showcase that can be benefited by using Markdown.

There are much more Git commands that can be quite handy apart from the usual fetch, commit, or push commands. This short article will introduce 3 useful Git commands namely bisect, grep and blame.

Julia is extremely versatile when it comes to interop with other programming languages and environments such as C, Python, R and Java.

Getting started with PySpark in the local Windows machine can be a little bit tricky as it requires Apache Spark to be installed first and it has quite a number of dependencies that have complicated installation steps.

Bloom Filter is a data structure that allows rapid lookup on an element, say a string whether it is present in a set. Implementation-wise, it is a bit vector that contains an array of zeros and ones (booleans) with a fixed length. It is known for its space and time efficiency.

Hosting a Minecraft server can be expensive for casual players. Free services like Athernos are laggy at times. Moreover, the saved files might get lost on the server entirely. All the painstaking effort to the world has gone in vain. Hence, it is imperative for us to self-host the server ourselves.

LaTeX is a popular typesetting language that is used broadly in writing documentations and scientific papers. This is the basic structure of a LaTeX document.

Obfuscation is the act of deliberately converting a piece of source code into codes that are difficult for human to understand to conceal its true purpose, but the functionality remains unchanged and are perfectly executable by computers.

A quine is referred to the code that upon execution, will produce the exact same code that was executed prior as the output. It exhibits the idempotency property. Quine is also known as "self-replicating programs" or "self-copying programs."