ThinkinG outside The box - =
|
|
- Ethelbert Powell
- 5 years ago
- Views:
Transcription
1 ThinkinG outside The box - =
2 Hello, I'm Armin! I do Computers - with Python. Currently at Fireteam / Splash Damage. We do Internet for Pointy Shooty Games. c w
3 j t q t j d
4 X the box is comfortable
5 l the comfort is dangerous
6 5 0 the 9 dots puzzle (and things of similar nature) j
7 connect the dots h < - W h using exactly 4 straight lines, without retracing å U or removing one's pen from the paper j
8 connect the dots h < - W h using exactly 4 straight lines, without retracing å U or removing one's pen from the paper j
9 g i know it's cliché Ç
10 the six thinking hats J
11 the six thinking hats This guy J
12 z the majority is always wrong: congratulations; you're now a cynical asshole 7
13 m 1 a change of environment z
14 c computer games
15 4 Online infrastructure h Game Code * this graph is not very scientific
16 4 python!!!11 Online infrastructure h Game Code * this graph is not very scientific
17 Î community influences your thinking. - a
18 C++ good; Scripting Languages Bad u
19 E... if it takes you 30 minutes to do a one line change then you obviously would not want to have runtime type checks...
20 it's too easy to dismiss something on fringe or outdated experience alone
21 never underestimate how much your environment/community influences you 1
22 never underestimate how much your environment/community influences you (unfortunately that also includes things like the GIL is not a problem") 1
23 5 2 asking the right questions j
24 4 - the wrong questions are easy to spot on othersa
25 <redacted> how do I do something after return render_template(...) if I don't want to register teardown_request for all requests. J
26 he was looking for celery / message queue
27 first expectation was that the user wanted to change the HTTP response 0
28 teardown_request would not have worked anyways O
29 better: I don't want my user to wait while I do some processing on his data v
30 j t the box was Flask
31 B how to ask the right questions 2-5
32 assume you already started out wrong describe the actual problem =
33 How do I use Websockets with Flask? z
34 better: How do I notify my user about changes with low latency. 6
35 5 question leaves room for the answer
36 (a) Server-sent events via WSGI (b) application <-> redis <-> persistent connection server bit.ly/pypush Ô
37 < > Jump on IRC help out other people
38 m 3 questioning the right things z
39 the worst parts in my libraries are the ones where I took the design from elsewhere O
40 Ò it's not because I know better...
41 most things have some design behind as people copy it, the original design gets obscured and forgotten the original design might no longer apply 1
42 starting something new? question everything!
43 not with the intention of proving existing design wrong; with the intention of understanding it. 9
44 9 4 paradigm shifts F
45 Many times we don't even realize that things were an example of thinking outside the box. (a) "echo" -> Request/Response objects (b) Interactive Interpreters 9
46 That's also what makes it hard to find examples now... 9
47 every idea is a rehash don't get too excited when you feel all "obviously..." sometimes all that's necessary is transposing a concept from one industry to the other. 9
48 9 5 interesting examples F
49 Mill Processor: Basic Block: One entry, one exit. Break instruction bundles in half Two decoders, one moves left from EBB entry point, one moves to the right =
50 Mill Processor: Basic Block: One entry, one exit. Break instruction bundles in half Two decoders, one moves left from EBB entry point, one moves to the right two independent units, two separate caches =
51 High-level Queues for Request Handling Stateful Frontend Servers Stateless Workers =a
52 Sending around signed data Cookies Access/Refresh Tokens Activation Links Offers ˆ
53 The Rust Programming Language Memory ownership tracking (and otherwise just steal from C++, C, Python, Ruby, Haskell and Scheme) 1
54 Spotify's Native/Web Bridge spawns HTTP server on localhost:xxxxx provides OAuth bridge JavaScript authenticates with local server, sends commands and retrieves updates. c
55 y That's it; Now ask lucumr.pocoo.org/talks gittip.com/mitsuhiko y d? y
56 calibration slide 2 2 c
Writing Secure APIs. Armin Ronacher for PyCon.ru 2014
Writing Secure APIs Armin Ronacher for PyCon.ru 2014 Armin Ronacher Independent Contractor for Splash Damage / Fireteam Doing Online Infrastructure for Computer Games lucumr.pocoo.org/talks but does it
More informationmodern and different PostgreSQL a talk by Armin Ronacher for DUMP 2014 (Russia)
modern and different PostgreSQL a talk by Armin '@mitsuhiko' Ronacher for DUMP 2014 (Russia) That's me. I do Computers. Currently at Fireteam / Splash Damage. We do Internet for Pointy Shooty Games. Aside
More informationCS252 Advanced Programming Language Principles. Prof. Tom Austin San José State University Fall 2013
CS252 Advanced Programming Language Principles Prof. Tom Austin San José State University Fall 2013 What are some programming languages? Why are there so many? Different domains Mobile devices (Objective
More informationThe State of Python. and the web. Armin Ronacher
The State of Python and the web Armin Ronacher // @mitsuhiko Who am I Armin Ronacher (@mitsuhiko) Founding Member of the Pocoo Team we're doing Jinja2, Werkzeug, Flask, Pygments, Sphinx and a bunch of
More informationWeek - 04 Lecture - 01 Merge Sort. (Refer Slide Time: 00:02)
Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 04 Lecture - 01 Merge Sort (Refer
More informationIt's Time To Get Functional 이건희
It's Time To Get Functional 20071032 이건희 1 Context Intro Performance Popularity Network Effect Why Is It Time To Get Functional? 2 Intro 3 Architect You are the architect (or carpenter). 4 Tools Can you
More informationBuilding a Real-time Notification System
Building a Real-time Notification System September 2015, Geneva Author: Jorge Vicente Cantero Supervisor: Jiri Kuncar CERN openlab Summer Student Report 2015 Project Specification Configurable Notification
More informationA Python for Future Generations. Ronacher
A Python for Future Generations Armin @mitsuhiko Ronacher Hi, I'm Armin... and I do Open Source, lots of Python and SaaS Flask Sentry and here is where you can find me twitter.com/@mitsuhiko github.com/mitsuhiko
More informationArtificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras
Artificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras (Refer Slide Time: 00:17) Lecture No - 10 Hill Climbing So, we were looking
More information4. Write sets of directions for how to check for direct variation. How to check for direct variation by analyzing the graph :
Name Direct Variations There are many relationships that two variables can have. One of these relationships is called a direct variation. Use the description and example of direct variation to help you
More informationImpossible Programs. Tom Stuart
Impossible Programs Tom Stuart IMPOSSIBLE PROGRAMS @tomstuart / GOTO Chicago / 2015-05-11 PROGRAMS CAN T DO EVERYTHING IMPOSSIBLE PROGRAMS @tomstuart / GOTO Chicago / 2015-05-11 how can a PROGRAM be IMPOSSIBLE?
More informationPROBLEMS IN PRACTICE: THE WEB MICHAEL ROITZSCH
Faculty of Computer Science Institute of Systems Architecture, Operating Systems Group PROBLEMS IN PRACTICE: THE WEB MICHAEL ROITZSCH THE WEB AS A DISTRIBUTED SYSTEM 2 WEB HACKING SESSION 3 3-TIER persistent
More informationMidterm Logistics. Midterm tonight, 7PM 10PM Exam location by last name:
File Processing Midterm Logistics Midterm tonight, 7PM 10PM Exam location by last name: Last names starts with A-J: Hewlett 200 Last names starts with K-O: Braun Auditorium Last names starts with P-S:
More informationDirect Variations DIRECT AND INVERSE VARIATIONS 19. Name
DIRECT AND INVERSE VARIATIONS 19 Direct Variations Name Of the many relationships that two variables can have, one category is called a direct variation. Use the description and example of direct variation
More informationClose Your File Template
In every sale there is always a scenario where I can t get someone to respond. No matter what I do. I can t get an answer from them. When people stop responding I use the Permission To. This is one of
More informationDepartment of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall 2011.
Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.858 Fall 2011 Quiz I: Solutions Please do not write in the boxes below. I (xx/20) II (xx/10) III (xx/16)
More informationMITOCW watch?v=zm5mw5nkzjg
MITOCW watch?v=zm5mw5nkzjg The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More informationMITOCW watch?v=0jljzrnhwoi
MITOCW watch?v=0jljzrnhwoi The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More informationIntroducing: main Function, Comments, Statements
Once you're seated, please respond to the poll at pollev.com/compunc If you are not registered for PollEverywhere, please go ahead and do so before class begins! Lecture 01 Take on Me Practice: Primitive
More informationIERG 4080 Building Scalable Internet-based Services
Department of Information Engineering, CUHK MScIE 2 nd Semester, 2015/16 IERG 4080 Building Scalable Internet-based Services Lecture 9 Web Sockets for Real-time Communications Lecturer: Albert C. M. Au
More informationCS/IT 114 Introduction to Java, Part 1 FALL 2016 CLASS 2: SEP. 8TH INSTRUCTOR: JIAYIN WANG
CS/IT 114 Introduction to Java, Part 1 FALL 2016 CLASS 2: SEP. 8TH INSTRUCTOR: JIAYIN WANG 1 Notice Class Website http://www.cs.umb.edu/~jane/cs114/ Reading Assignment Chapter 1: Introduction to Java Programming
More informationCompiler Design Spring 2018
Compiler Design Spring 2018 Thomas R. Gross Computer Science Department ETH Zurich, Switzerland 1 Logistics Lecture Tuesdays: 10:15 11:55 Thursdays: 10:15 -- 11:55 In ETF E1 Recitation Announced later
More informationMatrex Table of Contents
Matrex Table of Contents Matrex...1 What is the equivalent of a spreadsheet in Matrex?...2 Why I should use Matrex instead of a spreadsheet application?...3 Concepts...4 System architecture in the future
More informationWEB SECURITY WORKSHOP TEXSAW Presented by Solomon Boyd and Jiayang Wang
WEB SECURITY WORKSHOP TEXSAW 2014 Presented by Solomon Boyd and Jiayang Wang Introduction and Background Targets Web Applications Web Pages Databases Goals Steal data Gain access to system Bypass authentication
More information6.033 Computer System Engineering
MIT OpenCourseWare http://ocw.mit.edu 6.033 Computer System Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 6.033 2009 Lecture
More informationThe Crossed Swords wargame: Catching NATO red teams with cyber deception
The Crossed Swords wargame: Catching NATO red teams with cyber deception 2015-2018 Cymmetria Inc. All rights reserved. 2 BACKSTORY Once a year, the pentesters* and red teams of the countries of NATO descend
More informationA PROGRAM IS A SEQUENCE of instructions that a computer can execute to
A PROGRAM IS A SEQUENCE of instructions that a computer can execute to perform some task. A simple enough idea, but for the computer to make any use of the instructions, they must be written in a form
More informationWEB SECURITY: XSS & CSRF
WEB SECURITY: XSS & CSRF CMSC 414 FEB 22 2018 Cross-Site Request Forgery (CSRF) URLs with side-effects http://bank.com/transfer.cgi?amt=9999&to=attacker GET requests should have no side-effects, but often
More informationUI Review. The Good: Winamp
UI Review The Good: Winamp Winamp is a music player like itunes or the Windows Media Player. It plays music, creates playlists, and lets you edit metadata for media files. I like the winamp interface for
More informationAuthentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1
Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1 CIA Triad Confidentiality Prevent disclosure of information to unauthorized parties Integrity Detect data tampering Availability
More informationXcode Encountered An Internal Logic Error >>>CLICK HERE<<<
Xcode Encountered An Internal Logic Error Choose Continue The biggest problem is that "XCODE" doesn't run and give the following error: Xcode encountered an internal logic error. Choose "Continue" to continue
More informationImprove WordPress performance with caching and deferred execution of code. Danilo Ercoli Software Engineer
Improve WordPress performance with caching and deferred execution of code Danilo Ercoli Software Engineer http://daniloercoli.com Agenda PHP Caching WordPress Page Caching WordPress Object Caching Deferred
More informationCreational. Structural
Fitness for Future of Design Patterns & Architectural Styles Design patterns are difficult to teach, so we conducted a class collaboration where we all researched and reported on a variety of design patterns
More informationRKN 2015 Application Layer Short Summary
RKN 2015 Application Layer Short Summary HTTP standard version now: 1.1 (former 1.0 HTTP /2.0 in draft form, already used HTTP Requests Headers and body counterpart: answer Safe methods (requests): GET,
More informationScreen Scraping. Screen Scraping Defintions ( Web Scraping (
Screen Scraping Screen Scraping Defintions (http://www.wikipedia.org/) Originally, it referred to the practice of reading text data from a computer display terminal's screen. This was generally done by
More informationSecurity. SWE 432, Fall 2017 Design and Implementation of Software for the Web
Security SWE 432, Fall 2017 Design and Implementation of Software for the Web Today Security What is it? Most important types of attacks Authorization oauth 2 Security Why is it important? Users data is
More information1 Getting used to Python
1 Getting used to Python We assume you know how to program in some language, but are new to Python. We'll use Java as an informal running comparative example. Here are what we think are the most important
More informationTCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series In Networking) Ebooks Free
TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series In Networking) Ebooks Free With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands
More informationUnit 6 - Software Design and Development LESSON 4 DATA TYPES
Unit 6 - Software Design and Development LESSON 4 DATA TYPES Previously Paradigms Choice of languages Key features of programming languages sequence; selection eg case, if then else; iteration eg repeat
More informationEventually, you'll be returned to the AVD Manager. From there, you'll see your new device.
Let's get started! Start Studio We might have a bit of work to do here Create new project Let's give it a useful name Note the traditional convention for company/package names We don't need C++ support
More informationHow Rust is Tilde s Competitive Advantage
Jan. 2018 Rust Case Study: How Rust is Tilde s Competitive Advantage The analytics startup innovates safely with the help of Rust Copyright 2018 The Rust Project Developers All rights reserved graphics
More informationCMPUT 396 Sliding Tile Puzzle
CMPUT 396 Sliding Tile Puzzle Sliding Tile Puzzle 2x2 Sliding Tile States Exactly half of the states are solvable, the other half are not. In the case of 2x2 puzzles, I can solve it if I start with a configuration
More informationI'm Andy Glover and this is the Java Technical Series of. the developerworks podcasts. My guest is Brian Jakovich. He is the
I'm Andy Glover and this is the Java Technical Series of the developerworks podcasts. My guest is Brian Jakovich. He is the director of Elastic Operations for Stelligent. He and I are going to talk about
More informationPython Basics. level 1 Chris Roffey
Coding Club Python Basics level 1 Chris Roffey Coding Club Python Basics level 1 Chris Roffey cambridge university press Cambridge, New York, Melbourne, Madrid, Cape Town, Singapore, São Paulo, Delhi,
More informationGraph Theory. 26 March Graph Theory 26 March /29
Graph Theory 26 March 2012 Graph Theory 26 March 2012 1/29 Graph theory was invented by a mathematician named Euler in the 18th century. We will see some of the problems which motivated its study. However,
More informationIntroduction to Scientific Computing
Introduction to Scientific Computing Dr Hanno Rein Last updated: October 12, 2018 1 Computers A computer is a machine which can perform a set of calculations. The purpose of this course is to give you
More informationHow To Test Your Code A CS 1371 Homework Guide
Introduction After you have completed each drill problem, you should make it a habit to test your code. There are good ways of testing your code and there are bad ways of testing your code. This guide
More informationPROGRAMMING GOOGLE APP ENGINE WITH PYTHON: BUILD AND RUN SCALABLE PYTHON APPS ON GOOGLE'S INFRASTRUCTURE BY DAN SANDERSON
PROGRAMMING GOOGLE APP ENGINE WITH PYTHON: BUILD AND RUN SCALABLE PYTHON APPS ON GOOGLE'S INFRASTRUCTURE BY DAN SANDERSON DOWNLOAD EBOOK : PROGRAMMING GOOGLE APP ENGINE WITH PYTHON: Click link bellow and
More informationLesson 4 Transcript: DB2 Architecture
Lesson 4 Transcript: DB2 Architecture Slide 1: Cover Welcome to Lesson 4 of the DB2 on campus series. Today we are going to talk about the DB2 architecture. My name is Raul Chong and I am the DB2 on Campus
More informationPopcorn's ini Tutorial
Popcorn's ini Tutorial Last update: November 30 th 2006. There are lot's of ways to save information into a file in The Games Factory 2 and Multimedia Fusion 2. This tutorial will teach you the basics
More informationLab assignment 1. TI /18;; ti1506-students.slack.com
Lab assignment 1 TI1506 2017/18;; ti1506-students.slack.com Introduction The first part of this assignment gives you hands-on experience in http. In the second part you will make a head-start with the
More informationMITOCW watch?v=se4p7ivcune
MITOCW watch?v=se4p7ivcune The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More informationMongoDB Schema Design for. David Murphy MongoDB Practice Manager - Percona
MongoDB Schema Design for the Click "Dynamic to edit Master Schema" title World style David Murphy MongoDB Practice Manager - Percona Who is this Person and What Does He Know? Former MongoDB Master Former
More informationCSCI-1680 WWW Rodrigo Fonseca
CSCI-1680 WWW Rodrigo Fonseca Based partly on lecture notes by Scott Shenker and John Jannotti Precursors 1945, Vannevar Bush, Memex: a device in which an individual stores all his books, records, and
More informationDevelopment of web applications using Google Technology
International Journal of Computer Engineering and Applications, ICCSTAR-2016, Special Issue, May.16 Development of web applications using Google Technology Vaibhavi Nayak 1, Vinuta V Naik 2,Vijaykumar
More informationAzon Master Class. By Ryan Stevenson Guidebook #11 Squidoo Marketing
Azon Master Class By Ryan Stevenson https://ryanstevensonplugins.com/ Guidebook #11 Squidoo Marketing Table of Contents 1. Getting Started With Squidoo 2. Lens Research & Targeting 3. Lens Creation Tutorial
More informationBRING THE NOISE! MAKING SENSE OF A HAILSTORM OF METRICS. Abe Jon
BRING THE NOISE! MAKING SENSE OF A HAILSTORM OF METRICS Abe Stanway @abestanway Jon Cowie @jonlives Ninety minutes is a long time. This talk: ~10 ~25 ~30 ~10 ~15 - motivations - skyline - oculus - demo!
More informationCSCI-1680 WWW Rodrigo Fonseca
CSCI-1680 WWW Rodrigo Fonseca Based partly on lecture notes by Sco2 Shenker and John Janno6 Administrivia HW3 out today Will cover HTTP, DNS, TCP TCP Milestone II coming up on Monday Make sure you sign
More informationDefining Done in User Stories
This article originally appeared on Artima Developer on Wednesday, January 6, 2010. To access it online, visit: http://www.artima.com/articl es/defining_done.html Defining Done in User Stories By Victor
More informationMITOCW ocw f99-lec12_300k
MITOCW ocw-18.06-f99-lec12_300k This is lecture twelve. OK. We've reached twelve lectures. And this one is more than the others about applications of linear algebra. And I'll confess. When I'm giving you
More informationLesson 3 Transcript: Part 2 of 2 Tools & Scripting
Lesson 3 Transcript: Part 2 of 2 Tools & Scripting Slide 1: Cover Welcome to lesson 3 of the DB2 on Campus Lecture Series. Today we are going to talk about tools and scripting. And this is part 2 of 2
More informationtostatichtml() for Everyone!
tostatichtml() for Everyone! About DOMPurify, Security in the DOM, and Why We Really Need Both A talk by Dr.-Ing. Mario Heiderich, Cure53 mario@cure53.de @0x6D6172696F 1 of 45 Here is Alice. She wants
More informationFinal Project Report
Jun Mak Sean Lee Bikas Tomkoria Fahd Elbolichikhi Final Project Report Project Title: ETA Electronic Travel Assistance for Group 4. Online Doc.: http://inst.eecs.berkeley.edu/~swlee/assignment5.html 1.
More informationGraphics Performance Benchmarking Framework ATI. Presented to: Jerry Howard. By: Drew Roberts, Nicholas Tower, Jason Underhill
Graphics Performance Benchmarking Framework ATI Presented to: Jerry Howard By: Drew Roberts, Nicholas Tower, Jason Underhill Executive Summary The goal of this project was to create a graphical benchmarking
More informationUTF and Turkish. İstinye University. Representing Text
Representing Text Representation of text predates the use of computers for text Text representation was needed for communication equipment One particular commonly used communication equipment was teleprinter
More informationPrivacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras
Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 08 Tutorial 2, Part 2, Facebook API (Refer Slide Time: 00:12)
More informationApplication Layer -1- Network Tools
EITF25 Internet: Technology and Applications Application Layer -1- Network Tools 2013, Lecture 06 Kaan Bür, Stefan Höst Previously on EITF25 Transport Layer Addressing above IP Ports, sockets Process-to-process
More informationLaboratory 5: Implementing Loops and Loop Control Strategies
Laboratory 5: Implementing Loops and Loop Control Strategies Overview: Objectives: C++ has three control structures that are designed exclusively for iteration: the while, for and do statements. In today's
More informationPHP Programming With MySQL: The Web Technologies Series Ebooks Free
PHP Programming With MySQL: The Web Technologies Series Ebooks Free This book covers the basics of PHP and MySQL along with introductions to advanced topics including object-oriented programming and how
More information2. On the ensuing screen provide any name you click and then click Create Survey:
Creating a Qualtrics Survey These exercises assume that you have already created an account at Qualtrics. If not, please consult our separate documentation on how to create one. These exercises are divided
More informationProducer sends messages to the "hello" queue. The consumer receives messages from that queue.
Simple Message Queue using the Pika Python client (From https://www.rabbitmq.com/tutorials/tutorial-one-python.html) A producer (sender) that sends a single message and a consumer (receiver) that receives
More informationAdobe InDesign CS4 Classroom In A Book Ebooks Free
Adobe InDesign CS4 Classroom In A Book Ebooks Free The fastest, easiest, most comprehensive way to learn Adobe InDesign CS4 Adobe InDesign CS4 Classroom in a Book contains 14 lessons. The book covers the
More informationCONTENTS: What Is Programming? How a Computer Works Programming Languages Java Basics. COMP-202 Unit 1: Introduction
CONTENTS: What Is Programming? How a Computer Works Programming Languages Java Basics COMP-202 Unit 1: Introduction Announcements Did you miss the first lecture? Come talk to me after class. If you want
More informationProfile Can't Be Found Jenkins
Iphone Books Code Sign Error Provisioning Profile Can't Be Found Jenkins Code signing is required for product type Unit Test Bundle in SDK ios 8.0 profile accordingly, installed both, but can't get past
More informationJava: framework overview and in-the-small features
Chair of Software Engineering Carlo A. Furia, Marco Piccioni, Bertrand Meyer Java: framework overview and in-the-small features Chair of Software Engineering Carlo A. Furia, Marco Piccioni, Bertrand Meyer
More informationIntroduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras
Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 09 Now, we discuss about the insecurity of passwords.
More informationWeek - 01 Lecture - 04 Downloading and installing Python
Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 04 Downloading and
More informationRepresenting Characters and Text
Representing Characters and Text cs4: Computer Science Bootcamp Çetin Kaya Koç cetinkoc@ucsb.edu Çetin Kaya Koç http://koclab.org Winter 2018 1 / 28 Representing Text Representation of text predates the
More informationBlitz2D Newbies: Definitive Guide to Types by MutteringGoblin
Blitz2D Newbies: Definitive Guide to Types by MutteringGoblin Types are probably the hardest thing to understand about Blitz Basic. If you're using types for the first time, you've probably got an uneasy
More informationeb Security Software Studio
eb Security Software Studio yslin@datalab 1 OWASP Top 10 Security Risks in 2017 Rank Name 1 Injection 2 Broken Authentication and Session Management 3 Cross-Site Scripting (XSS) 4 Broken Access Control
More informationA Seminar report On LAMP Technology
A Seminar report On LAMP Technology Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED
More informationCHAPTER 3 RESOURCE MANAGEMENT
CHAPTER 3 RESOURCE MANAGEMENT SUBTOPIC Understand Memory Management Understand Processor Management INTRODUCTION Memory management is the act of managing computer memory. This involves providing ways to
More informationP2_L8 - Hashes Page 1
P2_L8 - Hashes Page 1 Reference: Computer Security by Stallings and Brown, Chapter 21 In this lesson, we will first introduce the birthday paradox and apply it to decide the length of hash, in order to
More informationSoftware Testing Prof. Meenakshi D Souza Department of Computer Science and Engineering International Institute of Information Technology, Bangalore
Software Testing Prof. Meenakshi D Souza Department of Computer Science and Engineering International Institute of Information Technology, Bangalore Lecture 04 Software Test Automation: JUnit as an example
More informationRead & Download (PDF Kindle) Data Structures And Other Objects Using Java (4th Edition)
Read & Download (PDF Kindle) Data Structures And Other Objects Using Java (4th Edition) Data Structures and Other Objects Using Java is a gradual, "just-in-time" introduction to Data Structures for a CS2
More informationCS 360 Programming Languages Interpreters
CS 360 Programming Languages Interpreters Implementing PLs Most of the course is learning fundamental concepts for using and understanding PLs. Syntax vs. semantics vs. idioms. Powerful constructs like
More informationWeek - 01 Lecture - 03 Euclid's Algorithm for gcd. Let us continue with our running example of gcd to explore more issues involved with program.
Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 03 Euclid's Algorithm
More information29-27 May 2013 CERN WEB FRAMEWORKS. Adrian Mönnich
First Indico Workshop 29-27 May 2013 CERN WEB FRAMEWORKS Adrian Mönnich Framework? What? Do we have one? Do we need one? A web application framework is a software framework that is designed to support
More informationMeasuring in Pixels with Scratch
In the Primary division, a big mathematical idea is understanding how to measure correctly, using both non standard and standardized measurements. Many students struggle with measuring because they fail
More informationIntroductionToRobotics-Lecture02
IntroductionToRobotics-Lecture02 Instructor (Oussama Khatib):Okay. Let's get started. So as always, the lecture starts with a video segment, and today's video segment comes from 1991, and from the group
More informationB - Broken Track Page 1 of 8
B - Broken Track There's a gap in the track! We need to make our robot even more intelligent so it won't get stuck, and can find the track again on its own. 2017 https://www.hamiltonbuhl.com/teacher-resources
More informationFunctional Programming Invades Architecture. George Fairbanks SATURN May 2017
Functional Programming Invades Architecture George Fairbanks SATURN 2017 3 May 2017 1 Programming in the Large Yesterday: Functional Programming is PITS, i.e., just inside modules Today: FP is also PITL
More informationShree.Datta Polytechnic College,Dattanagar, Shirol. Class Test- I
Shree. Datta S.S.S.K. Charitable Trust s Shree.Datta Polytechnic College,Dattanagar, Shirol Class Test- I Course Code:CO6E Subject:-SOFTWARE TESTING Marks:-25 Semester:-VI Subject code:-12258 Date:- Institute
More informationKaazing Gateway: An Open Source
Kaazing Gateway: An Open Source HTML 5 Websocket Server Speaker Jonas Jacobi Co-Founder: Kaazing Co-Author: Pro JSF and Ajax, Apress Agenda Real-Time Web? Why Do I Care? Scalability and Performance Concerns
More informationPractical Rendering And Computation With Direct3D 11 Free Pdf Books
Practical Rendering And Computation With Direct3D 11 Free Pdf Books Direct3D 11 offers such a wealth of capabilities that users can sometimes get lost in the details of specific APIs and their implementation.
More informationMultimedia im Netz Online Multimedia Winter semester 2015/16. Tutorial 03 Minor Subject
Multimedia im Netz Online Multimedia Winter semester 2015/16 Tutorial 03 Minor Subject Ludwig- Maximilians- Universität München Online Multimedia WS 2015/16 - Tutorial 03-1 Today s Agenda Quick test Server
More informationCloud Foundry Bootcamp
Cloud Foundry Bootcamp GOTO 2012 Josh Long Spring Developer Advocate josh.long@springsource.com 2012 VMware, Inc. All rights reserved Josh Long Spring Developer Advocate josh.long@springsource.com About
More informationCPS 170: Artificial Intelligence Search
CPS 170: Artificial Intelligence http://www.cs.duke.edu/courses/spring09/cps170/ Search Instructor: Vincent Conitzer Search We have some actions that can change the state of the world Change resulting
More informationDatacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score
Datacenter Care The things I love about Datacenter Care is the a la carte nature of the offering. The contract is really flexible and the services delivered correspond exactly to what we bought. The contract
More informationNaming Things in Adafruit IO
Naming Things in Adafruit IO Created by Adam Bachman Last updated on 2016-07-27 09:29:53 PM UTC Guide Contents Guide Contents Introduction The Two Feed Identifiers Name Key Aside: Naming things in MQTT
More information